Attribute-based encryption with expressive and authorized keyword search
To protect data security and privacy in cloud storage systems, a common solution is to outsource data in encrypted forms so that the data will remain secure and private even if storage systems are compromised. The encrypted data, however, must be pliable to search and access control. In this paper,...
Saved in:
Main Authors: | , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2017
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/3816 https://ink.library.smu.edu.sg/context/sis_research/article/4818/viewcontent/101007_2F978_3_319_60055_0_6.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-4818 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-48182020-03-30T05:49:32Z Attribute-based encryption with expressive and authorized keyword search CUI, Hui DENG, Robert H. LIU, Joseph K. LI, Yingjiu To protect data security and privacy in cloud storage systems, a common solution is to outsource data in encrypted forms so that the data will remain secure and private even if storage systems are compromised. The encrypted data, however, must be pliable to search and access control. In this paper, we introduce a notion of attribute-based encryption with expressive and authorized keyword search (ABE-EAKS) to support both expressive keyword search and fine-grained access control over encrypted data in the cloud. In ABE-EAKS, every data user is associated with a set of attributes and is issued a private attribute-key corresponding to his/her attribute set, and each data owner encrypts the message using attribute-based encryption and attaches the encrypted message with encrypted keywords related with the message, and then uploads the encrypted message and keywords to the cloud. To access encrypted messages containing certain keywords satisfying a search policy, a data user generates a trapdoor for the search policy using his/her private attribute-key and sends it to the cloud server equipped to the cloud. The cloud server searches over encrypted data stored in the cloud for the encrypted messages containing keywords satisfying the search policy and sends back the results to the data user who then decrypts the returned ciphertexts to obtain the underlying messages. We present a generic construction for ABE-EAKS, formally prove its security, give a concrete construction, and then extend the concrete ABE-EAKS scheme to support user revocation. Also, we implement the proposed ABE-EAKS scheme and its extension and study their performance through experiments. 2017-07-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/3816 info:doi/10.1007/978-3-319-60055-0_6 https://ink.library.smu.edu.sg/context/sis_research/article/4818/viewcontent/101007_2F978_3_319_60055_0_6.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Cloud storage Data security and privacy Keyword search Attribute-based encryption Access control Data Storage Systems Information Security |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Cloud storage Data security and privacy Keyword search Attribute-based encryption Access control Data Storage Systems Information Security |
spellingShingle |
Cloud storage Data security and privacy Keyword search Attribute-based encryption Access control Data Storage Systems Information Security CUI, Hui DENG, Robert H. LIU, Joseph K. LI, Yingjiu Attribute-based encryption with expressive and authorized keyword search |
description |
To protect data security and privacy in cloud storage systems, a common solution is to outsource data in encrypted forms so that the data will remain secure and private even if storage systems are compromised. The encrypted data, however, must be pliable to search and access control. In this paper, we introduce a notion of attribute-based encryption with expressive and authorized keyword search (ABE-EAKS) to support both expressive keyword search and fine-grained access control over encrypted data in the cloud. In ABE-EAKS, every data user is associated with a set of attributes and is issued a private attribute-key corresponding to his/her attribute set, and each data owner encrypts the message using attribute-based encryption and attaches the encrypted message with encrypted keywords related with the message, and then uploads the encrypted message and keywords to the cloud. To access encrypted messages containing certain keywords satisfying a search policy, a data user generates a trapdoor for the search policy using his/her private attribute-key and sends it to the cloud server equipped to the cloud. The cloud server searches over encrypted data stored in the cloud for the encrypted messages containing keywords satisfying the search policy and sends back the results to the data user who then decrypts the returned ciphertexts to obtain the underlying messages. We present a generic construction for ABE-EAKS, formally prove its security, give a concrete construction, and then extend the concrete ABE-EAKS scheme to support user revocation. Also, we implement the proposed ABE-EAKS scheme and its extension and study their performance through experiments. |
format |
text |
author |
CUI, Hui DENG, Robert H. LIU, Joseph K. LI, Yingjiu |
author_facet |
CUI, Hui DENG, Robert H. LIU, Joseph K. LI, Yingjiu |
author_sort |
CUI, Hui |
title |
Attribute-based encryption with expressive and authorized keyword search |
title_short |
Attribute-based encryption with expressive and authorized keyword search |
title_full |
Attribute-based encryption with expressive and authorized keyword search |
title_fullStr |
Attribute-based encryption with expressive and authorized keyword search |
title_full_unstemmed |
Attribute-based encryption with expressive and authorized keyword search |
title_sort |
attribute-based encryption with expressive and authorized keyword search |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2017 |
url |
https://ink.library.smu.edu.sg/sis_research/3816 https://ink.library.smu.edu.sg/context/sis_research/article/4818/viewcontent/101007_2F978_3_319_60055_0_6.pdf |
_version_ |
1770573797875777536 |