DOAS: Efficient data owner authorized search over encrypted cloud data
Data outsourcing service can shift the local data storage and maintenance to cloud service provider (CSP) to ease the burden from data owner, but it brings the data security threats as CSP is always considered to honest-but-curious. Therefore, searchable encryption (SE) technique which allows cloud...
Saved in:
Main Authors: | , , , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2018
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/3628 https://ink.library.smu.edu.sg/context/sis_research/article/4629/viewcontent/DOAS_2016_afv.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-4629 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-46292019-03-19T03:07:46Z DOAS: Efficient data owner authorized search over encrypted cloud data MIAO, Yibin MA, Jianfeng LIU, Ximeng LIU, Zhiquan ZHANG, Junwei WEI, Fushan Data outsourcing service can shift the local data storage and maintenance to cloud service provider (CSP) to ease the burden from data owner, but it brings the data security threats as CSP is always considered to honest-but-curious. Therefore, searchable encryption (SE) technique which allows cloud clients (including data owner and data user) to securely search over ciphertext through keywords and selectively retrieve files of interest is of prime importance. However, in practice, data user’s access permission always dynamically varies with data owner’s preferences. Moreover, existing SE schemes which are based on attribute-based encryption (ABE) incur heavy computational burden through attribution revocation and policy updating. To allow data owner to flexibly grant access permissions, we design a secure cryptographic primitive called as efficient data owner authorized search over encrypted data scheme through utilizing identity-based encryption (IBE) technique. The formal security analysis proves that our scheme is secure against chosen-plaintext attack (CPA) and chosen-keyword attack (CKA) without random oracle. Besides, empirical experiments over real-world dataset show that our scheme is efficient and feasible with regard to data access control. 2018-05-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/3628 info:doi/10.1007/s12083-016-0523-7 https://ink.library.smu.edu.sg/context/sis_research/article/4629/viewcontent/DOAS_2016_afv.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Chosen-keyword attack Chosen-plaintext attack Cloud computing Data owner authorized search Searchable encryption Computer Sciences Information Security |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Chosen-keyword attack Chosen-plaintext attack Cloud computing Data owner authorized search Searchable encryption Computer Sciences Information Security |
spellingShingle |
Chosen-keyword attack Chosen-plaintext attack Cloud computing Data owner authorized search Searchable encryption Computer Sciences Information Security MIAO, Yibin MA, Jianfeng LIU, Ximeng LIU, Zhiquan ZHANG, Junwei WEI, Fushan DOAS: Efficient data owner authorized search over encrypted cloud data |
description |
Data outsourcing service can shift the local data storage and maintenance to cloud service provider (CSP) to ease the burden from data owner, but it brings the data security threats as CSP is always considered to honest-but-curious. Therefore, searchable encryption (SE) technique which allows cloud clients (including data owner and data user) to securely search over ciphertext through keywords and selectively retrieve files of interest is of prime importance. However, in practice, data user’s access permission always dynamically varies with data owner’s preferences. Moreover, existing SE schemes which are based on attribute-based encryption (ABE) incur heavy computational burden through attribution revocation and policy updating. To allow data owner to flexibly grant access permissions, we design a secure cryptographic primitive called as efficient data owner authorized search over encrypted data scheme through utilizing identity-based encryption (IBE) technique. The formal security analysis proves that our scheme is secure against chosen-plaintext attack (CPA) and chosen-keyword attack (CKA) without random oracle. Besides, empirical experiments over real-world dataset show that our scheme is efficient and feasible with regard to data access control. |
format |
text |
author |
MIAO, Yibin MA, Jianfeng LIU, Ximeng LIU, Zhiquan ZHANG, Junwei WEI, Fushan |
author_facet |
MIAO, Yibin MA, Jianfeng LIU, Ximeng LIU, Zhiquan ZHANG, Junwei WEI, Fushan |
author_sort |
MIAO, Yibin |
title |
DOAS: Efficient data owner authorized search over encrypted cloud data |
title_short |
DOAS: Efficient data owner authorized search over encrypted cloud data |
title_full |
DOAS: Efficient data owner authorized search over encrypted cloud data |
title_fullStr |
DOAS: Efficient data owner authorized search over encrypted cloud data |
title_full_unstemmed |
DOAS: Efficient data owner authorized search over encrypted cloud data |
title_sort |
doas: efficient data owner authorized search over encrypted cloud data |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2018 |
url |
https://ink.library.smu.edu.sg/sis_research/3628 https://ink.library.smu.edu.sg/context/sis_research/article/4629/viewcontent/DOAS_2016_afv.pdf |
_version_ |
1770573364691206144 |