REKS: Role-based Encrypted Keyword Search with enhanced access control for outsourced cloud data
Keyword-based search over encrypted data is an important technique to achieve both data confidentiality and utilization in cloud outsourcing services. While commonly used access control mechanisms, such as identity-based encryption and attribute-based encryption, do not generally scale well for hier...
Saved in:
Main Authors: | , , , , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2023
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/8268 https://ink.library.smu.edu.sg/context/sis_research/article/9271/viewcontent/REKS_av.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-9271 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-92712023-11-10T08:48:15Z REKS: Role-based Encrypted Keyword Search with enhanced access control for outsourced cloud data MIAO, Yibin LI, Feng JIA, Xiaohua WANG, Huaxiong LIU, Ximeng CHOO, Kim-Kwang Raymond DENG, Robert H. Keyword-based search over encrypted data is an important technique to achieve both data confidentiality and utilization in cloud outsourcing services. While commonly used access control mechanisms, such as identity-based encryption and attribute-based encryption, do not generally scale well for hierarchical access permissions. To solve this problem, we propose a Role-based Encrypted Keyword Search (REKS) scheme by using the role-based access control and broadcast encryption. Specifically, REKS allows owners to deploy hierarchical access control by allowing users with parent roles to have access permissions from child roles. Using REKS, we further facilitate token generation preprocessing and efficient user management, thereby significantly reducing the users' final token generation and index update overheads, respectively. Formal security analysis proves that REKS is secure against chosen keyword and internal keyword guessing attacks, and findings from the empirical evaluations demonstrate that REKS is efficient and practical. 2023-01-01T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/8268 info:doi/10.1109/TDSC.2023.3324640 https://ink.library.smu.edu.sg/context/sis_research/article/9271/viewcontent/REKS_av.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Access control Access control attribute-based encryption Cloud computing Encryption identity-based encryption Indexes Keyword search keyword-based search role-based access control Security Servers Databases and Information Systems Information Security |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Access control Access control attribute-based encryption Cloud computing Encryption identity-based encryption Indexes Keyword search keyword-based search role-based access control Security Servers Databases and Information Systems Information Security |
spellingShingle |
Access control Access control attribute-based encryption Cloud computing Encryption identity-based encryption Indexes Keyword search keyword-based search role-based access control Security Servers Databases and Information Systems Information Security MIAO, Yibin LI, Feng JIA, Xiaohua WANG, Huaxiong LIU, Ximeng CHOO, Kim-Kwang Raymond DENG, Robert H. REKS: Role-based Encrypted Keyword Search with enhanced access control for outsourced cloud data |
description |
Keyword-based search over encrypted data is an important technique to achieve both data confidentiality and utilization in cloud outsourcing services. While commonly used access control mechanisms, such as identity-based encryption and attribute-based encryption, do not generally scale well for hierarchical access permissions. To solve this problem, we propose a Role-based Encrypted Keyword Search (REKS) scheme by using the role-based access control and broadcast encryption. Specifically, REKS allows owners to deploy hierarchical access control by allowing users with parent roles to have access permissions from child roles. Using REKS, we further facilitate token generation preprocessing and efficient user management, thereby significantly reducing the users' final token generation and index update overheads, respectively. Formal security analysis proves that REKS is secure against chosen keyword and internal keyword guessing attacks, and findings from the empirical evaluations demonstrate that REKS is efficient and practical. |
format |
text |
author |
MIAO, Yibin LI, Feng JIA, Xiaohua WANG, Huaxiong LIU, Ximeng CHOO, Kim-Kwang Raymond DENG, Robert H. |
author_facet |
MIAO, Yibin LI, Feng JIA, Xiaohua WANG, Huaxiong LIU, Ximeng CHOO, Kim-Kwang Raymond DENG, Robert H. |
author_sort |
MIAO, Yibin |
title |
REKS: Role-based Encrypted Keyword Search with enhanced access control for outsourced cloud data |
title_short |
REKS: Role-based Encrypted Keyword Search with enhanced access control for outsourced cloud data |
title_full |
REKS: Role-based Encrypted Keyword Search with enhanced access control for outsourced cloud data |
title_fullStr |
REKS: Role-based Encrypted Keyword Search with enhanced access control for outsourced cloud data |
title_full_unstemmed |
REKS: Role-based Encrypted Keyword Search with enhanced access control for outsourced cloud data |
title_sort |
reks: role-based encrypted keyword search with enhanced access control for outsourced cloud data |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2023 |
url |
https://ink.library.smu.edu.sg/sis_research/8268 https://ink.library.smu.edu.sg/context/sis_research/article/9271/viewcontent/REKS_av.pdf |
_version_ |
1783955661553401856 |