DOAS: Efficient data owner authorized search over encrypted cloud data

Data outsourcing service can shift the local data storage and maintenance to cloud service provider (CSP) to ease the burden from data owner, but it brings the data security threats as CSP is always considered to honest-but-curious. Therefore, searchable encryption (SE) technique which allows cloud...

Full description

Saved in:
Bibliographic Details
Main Authors: MIAO, Yibin, MA, Jianfeng, LIU, Ximeng, LIU, Zhiquan, ZHANG, Junwei, WEI, Fushan
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2018
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/3628
https://ink.library.smu.edu.sg/context/sis_research/article/4629/viewcontent/DOAS_2016_afv.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-4629
record_format dspace
spelling sg-smu-ink.sis_research-46292019-03-19T03:07:46Z DOAS: Efficient data owner authorized search over encrypted cloud data MIAO, Yibin MA, Jianfeng LIU, Ximeng LIU, Zhiquan ZHANG, Junwei WEI, Fushan Data outsourcing service can shift the local data storage and maintenance to cloud service provider (CSP) to ease the burden from data owner, but it brings the data security threats as CSP is always considered to honest-but-curious. Therefore, searchable encryption (SE) technique which allows cloud clients (including data owner and data user) to securely search over ciphertext through keywords and selectively retrieve files of interest is of prime importance. However, in practice, data user’s access permission always dynamically varies with data owner’s preferences. Moreover, existing SE schemes which are based on attribute-based encryption (ABE) incur heavy computational burden through attribution revocation and policy updating. To allow data owner to flexibly grant access permissions, we design a secure cryptographic primitive called as efficient data owner authorized search over encrypted data scheme through utilizing identity-based encryption (IBE) technique. The formal security analysis proves that our scheme is secure against chosen-plaintext attack (CPA) and chosen-keyword attack (CKA) without random oracle. Besides, empirical experiments over real-world dataset show that our scheme is efficient and feasible with regard to data access control. 2018-05-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/3628 info:doi/10.1007/s12083-016-0523-7 https://ink.library.smu.edu.sg/context/sis_research/article/4629/viewcontent/DOAS_2016_afv.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Chosen-keyword attack Chosen-plaintext attack Cloud computing Data owner authorized search Searchable encryption Computer Sciences Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Chosen-keyword attack
Chosen-plaintext attack
Cloud computing
Data owner authorized search
Searchable encryption
Computer Sciences
Information Security
spellingShingle Chosen-keyword attack
Chosen-plaintext attack
Cloud computing
Data owner authorized search
Searchable encryption
Computer Sciences
Information Security
MIAO, Yibin
MA, Jianfeng
LIU, Ximeng
LIU, Zhiquan
ZHANG, Junwei
WEI, Fushan
DOAS: Efficient data owner authorized search over encrypted cloud data
description Data outsourcing service can shift the local data storage and maintenance to cloud service provider (CSP) to ease the burden from data owner, but it brings the data security threats as CSP is always considered to honest-but-curious. Therefore, searchable encryption (SE) technique which allows cloud clients (including data owner and data user) to securely search over ciphertext through keywords and selectively retrieve files of interest is of prime importance. However, in practice, data user’s access permission always dynamically varies with data owner’s preferences. Moreover, existing SE schemes which are based on attribute-based encryption (ABE) incur heavy computational burden through attribution revocation and policy updating. To allow data owner to flexibly grant access permissions, we design a secure cryptographic primitive called as efficient data owner authorized search over encrypted data scheme through utilizing identity-based encryption (IBE) technique. The formal security analysis proves that our scheme is secure against chosen-plaintext attack (CPA) and chosen-keyword attack (CKA) without random oracle. Besides, empirical experiments over real-world dataset show that our scheme is efficient and feasible with regard to data access control.
format text
author MIAO, Yibin
MA, Jianfeng
LIU, Ximeng
LIU, Zhiquan
ZHANG, Junwei
WEI, Fushan
author_facet MIAO, Yibin
MA, Jianfeng
LIU, Ximeng
LIU, Zhiquan
ZHANG, Junwei
WEI, Fushan
author_sort MIAO, Yibin
title DOAS: Efficient data owner authorized search over encrypted cloud data
title_short DOAS: Efficient data owner authorized search over encrypted cloud data
title_full DOAS: Efficient data owner authorized search over encrypted cloud data
title_fullStr DOAS: Efficient data owner authorized search over encrypted cloud data
title_full_unstemmed DOAS: Efficient data owner authorized search over encrypted cloud data
title_sort doas: efficient data owner authorized search over encrypted cloud data
publisher Institutional Knowledge at Singapore Management University
publishDate 2018
url https://ink.library.smu.edu.sg/sis_research/3628
https://ink.library.smu.edu.sg/context/sis_research/article/4629/viewcontent/DOAS_2016_afv.pdf
_version_ 1770573364691206144