Advertisement

An Efficient Multi-keyword Searchable Encryption Supporting Multi-user Access Control

  • Chuxin Wu
  • Peng Zhang
  • Hongwei Liu
  • Zehong Chen
  • Zoe L. Jiang
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11337)

Abstract

Due to the strong storage capacity and calculating power of cloud computing, more and more users outsource their data to the cloud. To avoid users’ data exposed to cloud, searchable encryption which can search over the encrypted data is studied. In this paper, based on the multi-keyword searchable encryption proposed by Cash et al., through enforcing access control for users, we present an efficient multi-keyword searchable encryption supporting multi-user access control(MMSE). MMSE supports multi-user scenarios, and only the users whose attributes satisfy the policy can generate the search token, no matter the data owner is online or not. The security and performance analysis shows that the proposed MMSE is secure and efficient.

Keywords

Searchable encryption Multi-keyword search Multi-user search Access control 

Notes

Acknowledgements

This work was supported by the National Natural Science Foundation of China (61702342), the Science and Technology Innovation Projects of Shenzhen (JCYJ20170302151321095, JCYJ20160318094015947) and Tencent “Rhinoceros Birds” - Scientific Research Foundation for Young Teachers of Shenzhen University.

References

  1. 1.
    Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 7th IEEE Symposium on Security and Privacy, pp. 321–334. IEEE Computer Society (2007)Google Scholar
  2. 2.
    Boneh, D.: The decision Diffie-Hellman problem. In: Buhler, J.P. (ed.) Algorithmic Number Theory, pp. 48–63. Springer, Heidelberg (1998).  https://doi.org/10.1007/BFb0054851CrossRefGoogle Scholar
  3. 3.
    Cash, D., Jarecki, S., Jutla, C.-S., Krawczyk, H., Rosu, M., Steiner, M.: Highly-scalable searchable symmetric encryption with support for boolean queries. Advances in Cryptology-CRYPTO, pp. 353–373. Springer, Berlin, Heidelberg (2013).  https://doi.org/10.1007/978-3-642-40041-4_20CrossRefGoogle Scholar
  4. 4.
    Huang, M., Xie, W., Zhang, P.: Efficient fuzzy keyword search over encrypted medical and health data in hybrid cloud. J. Med. Imaging Health Inform. 7(4), 867–874 (2017)CrossRefGoogle Scholar
  5. 5.
    Li, H., Liu, D., Dai, Y., Luan, T.-H., Shen, X.-S.: Enabling efficient multi-keyword ranked search over encrypted mobile cloud data through blind storage. IEEE Trans. Emerg. Top. Comput. 3(1), 127–138 (2015)CrossRefGoogle Scholar
  6. 6.
    Li, H., Yang, Y., Dai, Y., Bai, J., Yu, S., Xiang, Y.: Achieving secure and efficient dynamic searchable symmetric encryption over medical cloud data. IEEE Trans. Cloud Comput. 99, 1–1 (2017)Google Scholar
  7. 7.
    Li, J., Chen, X., Chow, S.-S.-M., Huang, Q., Wong, D.-S., Liu, Z.: Multi-authority fine-grained access control with accountability and its application in cloud. J. Netw. Comput. Appl. 112, 89–96 (2018)CrossRefGoogle Scholar
  8. 8.
    Li, J., Wang, Q., Wang, C., Cao, N., Ren, K., Lou, W.: Fuzzy keyword search over encrypted data in cloud computing. In: 29th IEEE International Conference on Computer Communications, pp. 441–445. IEEE, San Diego (2010)Google Scholar
  9. 9.
    Song, D.-X., Wagner, D.-A., Perrig, A.: Practical techniques for searches on encrypted data. In: IEEE Symposium on Security and Privacy, pp. 44–55. IEEE Computer Society (2000)Google Scholar
  10. 10.
    Sun, S.-F., Liu, J.K., Sakzad, A., Steinfeld, R., Yuen, T.H.: An efficient non-interactive multi-client searchable encryption with support for boolean queries. In: Askoxylakis, I., Ioannidis, S., Katsikas, S., Meadows, C. (eds.) ESORICS 2016. LNCS, vol. 9878, pp. 154–172. Springer, Cham (2016).  https://doi.org/10.1007/978-3-319-45744-4_8CrossRefGoogle Scholar
  11. 11.
    Sun, W., Yu, S., Lou, W., Hou, Y.T., Li, H.: Protecting your right: verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. IEEE Trans. parallel Distrib. Syst. 27(4), 1187–1198 (2016)CrossRefGoogle Scholar
  12. 12.
    Wang, C., Li, W., Li, Y., Xu, X.: A ciphertext-policy attribute-based encryption scheme supporting keyword search function. In: Wang, G., Ray, I., Feng, D., Rajarajan, M. (eds.) CSS 2013. LNCS, vol. 8300, pp. 377–386. Springer, Cham (2013).  https://doi.org/10.1007/978-3-319-03584-0_28CrossRefGoogle Scholar
  13. 13.
    Xia, Z., Wang, X., Sun, X., Wang, Q.: A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. parallel Distrib. Syst. 27(2), 340–352 (2016)CrossRefGoogle Scholar
  14. 14.
    Zhang, P., Chen, Z., Liang, K., Wang, S., Wang, T.: A cloud-based access control scheme with user revocation and attribute update. In: 21st Australasian Information Security and Privacy, pp. 525–540. Springer, Berlin, Heidelberg (2016).  https://doi.org/10.1007/978-3-319-40253-6_32CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2018

Authors and Affiliations

  • Chuxin Wu
    • 1
  • Peng Zhang
    • 1
  • Hongwei Liu
    • 1
    • 2
  • Zehong Chen
    • 1
  • Zoe L. Jiang
    • 3
  1. 1.ATR Key Laboratory of National Defense Technology, College of Information EngineeringShenzhen UniversityShenzhenChina
  2. 2.Shenzhen Technology UniversityShenzhenChina
  3. 3.Harbin Institute of TechnologyShenzhenChina

Personalised recommendations