Skip to main content

2017 | OriginalPaper | Buchkapitel

Outsourcing of Verifiable Attribute-Based Keyword Search

verfasst von : Go Ohtake, Reihaneh Safavi-Naini, Liang Feng Zhang

Erschienen in: Secure IT Systems

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In integrated broadcast-broadband services, viewers receive content via the airwaves as well as additional content via the Internet. The additional content can be personalized by using the viewing histories of each viewer. Viewing histories however contain private data that must be handled with care. A verifiable attribute-based keyword search (VABKS) scheme allows data users (service providers), whose attributes satisfy a policy that is specified by the data owner (viewer), to securely search and access stored data in a malicious cloud server, and verify the correctness of the operations by the cloud server. VABKS, however, requires data owners who have computationally weak terminals, such as television sets, to perform heavy computations due to the attribute-based encryption process. In this paper, we propose a new VABKS scheme where such heavy computations are outsourced to a cloud server and hence the data owner is kept as light as possible. Our scheme is provably secure against two malicious cloud servers in the random oracle model: one performing the attribute-based encryption process, and the other performing the keyword search process on the encrypted data. We implement our scheme and the previous VABKS scheme and show that our scheme significantly reduces the computation cost of the data owner.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Beimel, A.: Secure schemes for secret sharing and key distribution. Ph.D. thesis, Israel Institute of Technology (1996) Beimel, A.: Secure schemes for secret sharing and key distribution. Ph.D. thesis, Israel Institute of Technology (1996)
2.
Zurück zum Zitat Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: Proceedings of IEEE S&P 2007, pp. 321–334 (2007) Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: Proceedings of IEEE S&P 2007, pp. 321–334 (2007)
3.
Zurück zum Zitat Green, M., Hohenberger, S., Waters, B.: Outsourcing the decryption of ABE ciphertexts. In: Proceedings of USENIX Security Symposium (2011) Green, M., Hohenberger, S., Waters, B.: Outsourcing the decryption of ABE ciphertexts. In: Proceedings of USENIX Security Symposium (2011)
4.
Zurück zum Zitat Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of ACMCCS 2006, pp. 89–98 (2006) Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of ACMCCS 2006, pp. 89–98 (2006)
5.
Zurück zum Zitat ETSI: TS 102 796: hybrid broadcast broadband TV, V1.3.1 ETSI: TS 102 796: hybrid broadcast broadband TV, V1.3.1
6.
Zurück zum Zitat Hohenberger, S., Waters, B.: Online/Offline attribute-based encryption. In: Proceedings of PKC 2014, pp. 293–310 (2014) Hohenberger, S., Waters, B.: Online/Offline attribute-based encryption. In: Proceedings of PKC 2014, pp. 293–310 (2014)
9.
Zurück zum Zitat Li, J., Jia, C., Li, J., Chen, X.: Outsourcing encryption of attribute-based encryption with MapReduce. In: Proceedings of ICICS 2012, pp. 191–201 (2012) Li, J., Jia, C., Li, J., Chen, X.: Outsourcing encryption of attribute-based encryption with MapReduce. In: Proceedings of ICICS 2012, pp. 191–201 (2012)
10.
Zurück zum Zitat Ohtake, G., Safavi-Naini, R., Zhang, L.: Outsourcing scheme of ABE encryption secure against malicious adversary. In: Proceedings of ICISSP 2017, pp. 71–82 (2017) Ohtake, G., Safavi-Naini, R., Zhang, L.: Outsourcing scheme of ABE encryption secure against malicious adversary. In: Proceedings of ICISSP 2017, pp. 71–82 (2017)
11.
Zurück zum Zitat Shi, J., Lai, J., Li, Y., Deng, R., Weng, J.: Authorized keyword search on encrypted data. In: Proceedings of ESORICS 2014, pp. 419–435 (2014) Shi, J., Lai, J., Li, Y., Deng, R., Weng, J.: Authorized keyword search on encrypted data. In: Proceedings of ESORICS 2014, pp. 419–435 (2014)
12.
Zurück zum Zitat Sun, W., Yu, S., Lou, W., Hou, Y., Li, H.: Protecting your right: attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. In: Proceedings of IEEE Infocom 2014, pp. 226–234 (2014) Sun, W., Yu, S., Lou, W., Hou, Y., Li, H.: Protecting your right: attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. In: Proceedings of IEEE Infocom 2014, pp. 226–234 (2014)
13.
Zurück zum Zitat Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Proceedings of Eurocrypt 2005, pp. 457–473 (2005) Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Proceedings of Eurocrypt 2005, pp. 457–473 (2005)
14.
Zurück zum Zitat Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. eprint 2008/290 Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. eprint 2008/290
15.
Zurück zum Zitat Wang, C., Li, W., Li, Y., Xu, X.: A ciphertext-policy attribute-based encryption scheme supporting keyword search function. In: Proceedings of CSS 2013, pp. 377–386 (2013) Wang, C., Li, W., Li, Y., Xu, X.: A ciphertext-policy attribute-based encryption scheme supporting keyword search function. In: Proceedings of CSS 2013, pp. 377–386 (2013)
17.
Zurück zum Zitat Zhou, Z., Huang, D.: Efficient and secure data storage operations for mobile cloud computing. eprint 2011/185 Zhou, Z., Huang, D.: Efficient and secure data storage operations for mobile cloud computing. eprint 2011/185
18.
Zurück zum Zitat Zheng, Q., Xu, S., Ateniese, G.: VABKS: verifiable attribute-based keyword search over outsourced encrypted data. In: Proceedings of IEEE Infocom 2014, pp. 522–530 (2014) Zheng, Q., Xu, S., Ateniese, G.: VABKS: verifiable attribute-based keyword search over outsourced encrypted data. In: Proceedings of IEEE Infocom 2014, pp. 522–530 (2014)
Metadaten
Titel
Outsourcing of Verifiable Attribute-Based Keyword Search
verfasst von
Go Ohtake
Reihaneh Safavi-Naini
Liang Feng Zhang
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-70290-2_2