4.5 Article

A fine-grained authorized keyword secure search scheme with efficient search permission update in cloud computing

Journal

JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING
Volume 135, Issue -, Pages 56-69

Publisher

ACADEMIC PRESS INC ELSEVIER SCIENCE
DOI: 10.1016/j.jpdc.2019.09.011

Keywords

Authorized keyword search; Attribute-based encryption; Cloud computing; Search permission update; Secure search

Funding

  1. National Natural Science Foundation of China [61972058, 61902123, 61772088, 61772191]
  2. Science and Technology Key Projects of Hunan Province [2016JC2012]
  3. Outstanding Youth Research Project of Provincial Education Department of Hunan [17B030]
  4. Natural Science Foundation of Hunan Province [2017JJ3371]

Ask authors/readers for more resources

With the rapid development of cloud computing, secure search has become a hot research spot, which is a promising technique that allows a data user to perform privacy-preserving keyword-based search over encrypted cloud data. In this paper, we further consider the secure search problem based on a practical application scenario that a data owner needs to grant different keyword query permissions for different data users to achieve flexible access control on outsourced encrypted data in the cloud computing environment. To address this problem, we propose a fine-grained authorized keyword secure search scheme by leveraging the ciphertext policy attribute-based encryption (ABE), which not only supports privacy-preserving keyword-based search over encrypted data, but also inherits flexible and fine-grained data privilege control properties of ABE. Moreover, our proposed scheme is able to achieve fine-grained search permission update with very small communication and computation cost. By running the attribute revocation sub-protocol and attribute addition sub-protocol, the data owner can flexibly and efficiently update a data user's keyword search permissions when the data user's system role changes. We provide detailed performance analysis and rigorous security proof for our scheme. Extensive experiments demonstrate the correctness and practicality of the proposed scheme. (C) 2019 Elsevier Inc. All rights reserved.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available