Skip to main content

Coarser-Grained Multi-user Searchable Encryption in Hybrid Cloud

  • Chapter
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((TCCI,volume 9380))

Abstract

The task of searchable encryption schemes in multi-user setting is to handle the problem of dynamical user injection and revocation with consideration of feasibility. Especially, we have to make sure that user revocation will not cause security problem, such as leakage of secret key. Recently, fine-grained access control using trusted third party is proposed to resolve this issue. However, it increases the management complexity for maintaining massive authentication information of users.

We present a new concept of coarse-grained access control for the first time and use it to construct a multi-user searchable encryption model in hybrid cloud. In our construction, there are two typical schemes, one is broadcast encryption (BE) scheme to simplify access control, the other is a single-user searchable encryption scheme, which supports two-phases operation and is secure when untrustful server colludes with the adversary. Moreover, we implement such a practical scheme using an improved searchable symmetric encryption scheme, and security analysis support our scheme.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Song, X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: IEEE Symposium on Security and Privacy, pp. 44–55. IEEE Press (2000)

    Google Scholar 

  2. Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506–522. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  3. van Liesdonk, P., Sedghi, S., Doumen, J., Hartel, P., Jonker, W.: Computationally efficient searchable symmetric encryption. In: Jonker, W., Petković, M. (eds.) SDM 2010. LNCS, vol. 6358, pp. 87–100. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  4. Li, J., Wang, Q., Wang, C.: Fuzzy keyword search over encrypted data in cloud computing. In: INFOCOM 2010, pp. 1–5. IEEE Press (2010)

    Google Scholar 

  5. Li, J., Man, H.A., Susilo, W., Xie, D.Q., Ren, K.: Attribute-based signature and its applications. In: Proceeding of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2010), pp. 60–69. ACM (2010)

    Google Scholar 

  6. Li, J., Huang, X.Y., Li, J.W., Chen, X.F., Xiang, Y.: Securely outsourcing attribute-based encryption with checkability. IEEE Trans. Parallel Distrib. Syst. 25(8), 2201–2210 (2014)

    Article  Google Scholar 

  7. Li, J., Chen, X.F., Li, M.Q., Li, J.W., Lee, P., Lou, W.J.: Secure deduplication with efficient and reliable convergent key management. IEEE Trans. Parallel Distrib. Syst. 25(6), 1615–1625 (2014)

    Article  Google Scholar 

  8. Li, J., Kim, K.: Hidden attribute-based signatures without anonymity revocation. Inf. Sci. 180(9), 1681–1689 (2010). Elsevier

    Article  MathSciNet  MATH  Google Scholar 

  9. Li, J., Wang, Q., Wang, C., Ren, K.: Enhancing attribute-based encryption with attribute hierarchy. Mob. Netw. Appl. (MONET) 16(5), 553–561 (2011). Springer

    Article  Google Scholar 

  10. Bösch, C., Brinkman, R., Hartel, P., Jonker, W.: Conjunctive wildcard search over encrypted data. In: Jonker, W., Petković, M. (eds.) SDM 2011. LNCS, vol. 6933, pp. 114–127. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  11. Zhao, Y., Chen, X.F., Ma, H., et al.: A new trapdoor-indistinguishable public key encryption with keyword search. J. Wirel. Mob. Netw. 3, 72–81 (2012)

    Google Scholar 

  12. Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 79–88. ACM Press (2006)

    Google Scholar 

  13. Dong, C., Russello, G., Dulay, N.: Shared and searchable encrypted data for untrusted servers. J. Comput. Secur. 19, 367–397 (2011)

    Article  Google Scholar 

  14. Bao, F., Deng, R.H., Ding, X., Yang, Y.: Private query on encrypted data in multi-user settings. In: Chen, L., Mu, Y., Susilo, W. (eds.) ISPEC 2008. LNCS, vol. 4991, pp. 71–85. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  15. Wu, X., Xu, L., Zhang, X.: Poster: a certificateless proxy re-encryption scheme for cloud-based data sharing. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, pp. 869–872 (2011)

    Google Scholar 

  16. Hwang, Y.-H., Lee, P.J.: Public key encryption with conjunctive keyword search and its extension to a multi-user system. In: Takagi, T., Okamoto, E., Okamoto, T., Okamoto, T. (eds.) Pairing 2007. LNCS, vol. 4575, pp. 2–22. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  17. Yang, Y.J., Lu, H., Weng, J.: Multi-user private keyword search for cloud computing. In: Cloud Computing Technology and Science (CloudCom), pp. 264–271 (2011)

    Google Scholar 

  18. Zhao, F., Nishide, T., Sakurai, K.: Multi-user keyword search scheme for secure data sharing with fine-grained access control. In: Kim, H. (ed.) ICISC 2011. LNCS, vol. 7259, pp. 406–418. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  19. Li, J., Li, J., Chen, X., Jia, C., Liu, Z.: Efficient keyword search over encrypted data with fine-grained access control in hybrid cloud. In: Xu, L., Bertino, E., Mu, Y. (eds.) NSS 2012. LNCS, vol. 7645, pp. 490–502. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  20. Bugiel, S., Nurnberger, S., Sadeghi, A., Schneider, T.: Twin clouds: an architecture for secure cloud computing. In: Workshop on Cryptography and Security in Clouds, LNC, vol. 7025, pp. 32–44 (2011)

    Google Scholar 

  21. Goh, E.: Secure indexes. Technical report 2003/216, IACR ePrint Cryptography Archive (2003). http://eprint.iacr.org/2003/216

  22. Hu, L., Liu, Z.L., Cheng, X.C.: Efficient identity-based broadcast encryption without random oracles. J. Comput. 5(3), 331–336 (2010)

    Google Scholar 

  23. Phan, D.-H., Pointcheval, D., Shahandashti, S.F., Strefler, M.: Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts. In: Susilo, W., Mu, Y., Seberry, J. (eds.) ACISP 2012. LNCS, vol. 7372, pp. 308–321. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

Download references

Acknowledgment

This work is supported by the National Natural Science Foundation of China (Nos. 60973141 and 61272423), National Key Basic Research Program of China (No. 2013CB834204), and the Specialized Research Fund for the Doctoral Program of Higher Education of China (Nos. 20100031110030 and 20120031120036).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zheli Liu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Liu, Z., Fu, C., Yang, J., Liu, Z., Xu, L. (2015). Coarser-Grained Multi-user Searchable Encryption in Hybrid Cloud. In: Nguyen, N., Kowalczyk, R., Xhafa, F. (eds) Transactions on Computational Collective Intelligence XIX . Lecture Notes in Computer Science(), vol 9380. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-49017-4_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-49017-4_9

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-49016-7

  • Online ISBN: 978-3-662-49017-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics