REKS: Role-based Encrypted Keyword Search with enhanced access control for outsourced cloud data

Keyword-based search over encrypted data is an important technique to achieve both data confidentiality and utilization in cloud outsourcing services. While commonly used access control mechanisms, such as identity-based encryption and attribute-based encryption, do not generally scale well for hier...

Full description

Saved in:
Bibliographic Details
Main Authors: MIAO, Yibin, LI, Feng, JIA, Xiaohua, WANG, Huaxiong, LIU, Ximeng, CHOO, Kim-Kwang Raymond, DENG, Robert H.
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2023
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/8268
https://ink.library.smu.edu.sg/context/sis_research/article/9271/viewcontent/REKS_av.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-9271
record_format dspace
spelling sg-smu-ink.sis_research-92712023-11-10T08:48:15Z REKS: Role-based Encrypted Keyword Search with enhanced access control for outsourced cloud data MIAO, Yibin LI, Feng JIA, Xiaohua WANG, Huaxiong LIU, Ximeng CHOO, Kim-Kwang Raymond DENG, Robert H. Keyword-based search over encrypted data is an important technique to achieve both data confidentiality and utilization in cloud outsourcing services. While commonly used access control mechanisms, such as identity-based encryption and attribute-based encryption, do not generally scale well for hierarchical access permissions. To solve this problem, we propose a Role-based Encrypted Keyword Search (REKS) scheme by using the role-based access control and broadcast encryption. Specifically, REKS allows owners to deploy hierarchical access control by allowing users with parent roles to have access permissions from child roles. Using REKS, we further facilitate token generation preprocessing and efficient user management, thereby significantly reducing the users' final token generation and index update overheads, respectively. Formal security analysis proves that REKS is secure against chosen keyword and internal keyword guessing attacks, and findings from the empirical evaluations demonstrate that REKS is efficient and practical. 2023-01-01T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/8268 info:doi/10.1109/TDSC.2023.3324640 https://ink.library.smu.edu.sg/context/sis_research/article/9271/viewcontent/REKS_av.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Access control Access control attribute-based encryption Cloud computing Encryption identity-based encryption Indexes Keyword search keyword-based search role-based access control Security Servers Databases and Information Systems Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Access control
Access control
attribute-based encryption
Cloud computing
Encryption
identity-based encryption
Indexes
Keyword search
keyword-based search
role-based access control
Security
Servers
Databases and Information Systems
Information Security
spellingShingle Access control
Access control
attribute-based encryption
Cloud computing
Encryption
identity-based encryption
Indexes
Keyword search
keyword-based search
role-based access control
Security
Servers
Databases and Information Systems
Information Security
MIAO, Yibin
LI, Feng
JIA, Xiaohua
WANG, Huaxiong
LIU, Ximeng
CHOO, Kim-Kwang Raymond
DENG, Robert H.
REKS: Role-based Encrypted Keyword Search with enhanced access control for outsourced cloud data
description Keyword-based search over encrypted data is an important technique to achieve both data confidentiality and utilization in cloud outsourcing services. While commonly used access control mechanisms, such as identity-based encryption and attribute-based encryption, do not generally scale well for hierarchical access permissions. To solve this problem, we propose a Role-based Encrypted Keyword Search (REKS) scheme by using the role-based access control and broadcast encryption. Specifically, REKS allows owners to deploy hierarchical access control by allowing users with parent roles to have access permissions from child roles. Using REKS, we further facilitate token generation preprocessing and efficient user management, thereby significantly reducing the users' final token generation and index update overheads, respectively. Formal security analysis proves that REKS is secure against chosen keyword and internal keyword guessing attacks, and findings from the empirical evaluations demonstrate that REKS is efficient and practical.
format text
author MIAO, Yibin
LI, Feng
JIA, Xiaohua
WANG, Huaxiong
LIU, Ximeng
CHOO, Kim-Kwang Raymond
DENG, Robert H.
author_facet MIAO, Yibin
LI, Feng
JIA, Xiaohua
WANG, Huaxiong
LIU, Ximeng
CHOO, Kim-Kwang Raymond
DENG, Robert H.
author_sort MIAO, Yibin
title REKS: Role-based Encrypted Keyword Search with enhanced access control for outsourced cloud data
title_short REKS: Role-based Encrypted Keyword Search with enhanced access control for outsourced cloud data
title_full REKS: Role-based Encrypted Keyword Search with enhanced access control for outsourced cloud data
title_fullStr REKS: Role-based Encrypted Keyword Search with enhanced access control for outsourced cloud data
title_full_unstemmed REKS: Role-based Encrypted Keyword Search with enhanced access control for outsourced cloud data
title_sort reks: role-based encrypted keyword search with enhanced access control for outsourced cloud data
publisher Institutional Knowledge at Singapore Management University
publishDate 2023
url https://ink.library.smu.edu.sg/sis_research/8268
https://ink.library.smu.edu.sg/context/sis_research/article/9271/viewcontent/REKS_av.pdf
_version_ 1783955661553401856