Skip to main content

Efficient Designated-Server Proxy Re-encryption with Keyword Search for Big Data

  • Conference paper
  • First Online:
Advances in Artificial Intelligence and Security (ICAIS 2022)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1587))

Included in the following conference series:

Abstract

Against the background of the era of big data and cloud computing, cloud platforms have become the first choice for data storage. While cloud platforms also face serious threats to data security and user privacy. At the same time, users will be faced with the problem of how to efficiently retrieve ciphertext on the cloud. Searchable encryption allows users to directly retrieve ciphertext data on the cloud through keywords, which provides an effective method for solving efficient retrieval of ciphertext on the cloud. As an important branch of searchable encryption technology, proxy re-encryption can realize the sharing of ciphertext among multiple users. However, most of the existing schemes have security shortcomings or functional defects, such as inability to resist keyword guessing attack, and do not support search authority authorization. A new designated-server proxy re-encryption with keyword search scheme was proposed, which not only can resist keyword guessing attack, but also realizes the function of sharing search authority. Finally, we give the performance and security analysis. The experimental results show that our scheme is superior compared with other related schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Alameen, A.: Repeated attribute optimization for big data encryption. Comput. Syst. Sci. Eng. 40(1), 53–64 (2022)

    Article  Google Scholar 

  2. Attaallah, A., Alsuhabi, H., Shukla, S., Kumar, R., Gupta, B.K., Khan, R.A.: Analyzing the big data security through a unified decision-making approach. Intell. Autom. Soft Comput. 32(2), 1071–1088 (2022)

    Article  Google Scholar 

  3. Baek, J., Safavi-Naini, R., Susilo, W.: Public key encryption with keyword search revisited. In: Gervasi, O., Murgante, B., Laganà, A., Taniar, D., Mun, Y., Gavrilova, M.L. (eds.) ICCSA 2008. LNCS, vol. 5072, pp. 1249–1259. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-69839-5_96

    Chapter  Google Scholar 

  4. Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127–144. Springer, Heidelberg (1998). https://doi.org/10.1007/BFb0054122

    Chapter  Google Scholar 

  5. Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506–522. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24676-3_30

    Chapter  Google Scholar 

  6. Byun, J.W., Rhee, H.S., Park, H.-A., Lee, D.H.: Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. In: Jonker, W., Petković, M. (eds.) SDM 2006. LNCS, vol. 4165, pp. 75–83. Springer, Heidelberg (2006). https://doi.org/10.1007/11844662_6

    Chapter  Google Scholar 

  7. Chen, Z., Li, S., Guo, Y., Wang, Y., Chu, Y.: A limited proxy re-encryption with keyword search for data access control in cloud computing. In: Au, M.H., Carminati, B., Kuo, C.-C.J. (eds.) NSS 2014. LNCS, vol. 8792, pp. 82–95. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-11698-3_7

    Chapter  Google Scholar 

  8. Guo, L., Lu, B.: Efficient proxy re-encryption with keyword search scheme. J. Comput. Res. Dev. 51(6), 1221 (2014)

    Google Scholar 

  9. Hahn, F., Kerschbaum, F.: Searchable encryption with secure and efficient updates. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS 2014, pp. 310–320. Association for Computing Machinery, New York (2014). https://doi.org/10.1145/2660267.2660297

  10. Huang, Q., Li, H.: An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks. Inf. Sci. 403-404, 1–14 (2017). https://doi.org/10.1016/j.ins.2017.03.038. https://www.sciencedirect.com/science/article/pii/S0020025516321090

  11. Jeong, I.R., Kwon, J.O., Hong, D., Lee, D.H.: Constructing PEKS schemes secure against keyword guessing attacks is possible? Comput. Commun. 32(2), 394–396 (2009). https://doi.org/10.1016/j.comcom.2008.11.018. https://www.sciencedirect.com/science/article/pii/S0140366408005768

  12. Kamara, S., Papamanthou, C.: Parallel and dynamic searchable symmetric encryption. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 258–274. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-39884-1_22

    Chapter  Google Scholar 

  13. Kamara, S., Papamanthou, C., Roeder, T.: Dynamic searchable symmetric encryption. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS 2012, pp. 965–976. Association for Computing Machinery, New York (2012). https://doi.org/10.1145/2382196.2382298

  14. Rhee, H.S., Park, J.H., Susilo, W., Lee, D.H.: Trapdoor security in a searchable public-key encryption scheme with a designated tester. J. Syst. Softw. 83(5), 763–771 (2010). https://doi.org/10.1016/j.jss.2009.11.726. https://www.sciencedirect.com/science/article/pii/S0164121209003100

  15. Rhee, H.S., Susilo, W., Kim, H.J.: Secure searchable public key encryption scheme against keyword guessing attacks. IEICE Electron. Exp. 6(5), 237–243 (2009). https://doi.org/10.1587/elex.6.237

    Article  Google Scholar 

  16. Riad, K., Hamza, R., Yan, H.: Sensitive and energetic IoT access control for managing cloud electronic health records. IEEE Access 7, 86384–86393 (2019). https://doi.org/10.1109/ACCESS.2019.2926354

    Article  Google Scholar 

  17. Shao, J., Cao, Z., Liang, X., Lin, H.: Proxy re-encryption with keyword search. Inf. Sci. 180(13), 2576–2587 (2010). https://doi.org/10.1016/j.ins.2010.03.026. https://www.sciencedirect.com/science/article/pii/S0020025510001386

  18. Shao, Z.Y., Yang, B.: On security against the server in designated tester public key encryption with keyword search. Inf. Process. Lett. 115(12), 957–961 (2015). https://doi.org/10.1016/j.ipl.2015.07.006. https://www.sciencedirect.com/science/article/pii/S0020019015001283

  19. Sun, L., Xu, C., Zhang, M., Chen, K., Li, H.: Secure searchable public key encryption against insider keyword guessing attacks from indistinguishability obfuscation. Sci. Chin. Inf. Sci. 61(3), 1–3 (2017). https://doi.org/10.1007/s11432-017-9124-0

    Article  Google Scholar 

  20. Wang, C., Tu, T.: Keyword search encryption scheme resistant against keyword-guessing attack by the untrusted server. J. Shanghai Jiaotong Univ. (Sci.) 19(4), 440–442 (2014). https://doi.org/10.1007/s12204-014-1522-6

    Article  Google Scholar 

  21. Wang, S.H., Zhang, Y.X., Wang, H.Q., Xiao, F., Wang, R.C.: Efficient public-key searchable encryption scheme against inside keyword guessing attack. Comput. Sci. 46, 91–95 (2019)

    Google Scholar 

  22. Xu, C., Xu, J.: Provenance method of electronic archives based on knowledge graph in big data environment. J. Inf. Hiding Priv. Prot. 3(2), 91 (2021)

    Google Scholar 

  23. Xu, L., Sun, Z., Li, W., Yan, H.: Delegatable searchable encryption with specified keywords for EHR systems. Wirel. Netw. (2020). https://doi.org/10.1007/s11276-020-02410-3

  24. Liu, Y., Ren, Y., Wang, Q., Wang, Q., Xia, J.: The development of proxy re-encryption. J. Cyber Secur. 2(1), 1–8 (2020). https://doi.org/10.32604/jcs.2020.05878

    Article  Google Scholar 

  25. Zhou, Y., Luo, W.: A QR data hiding method based on redundant region and BCH. J. Big Data 3(3), 127 (2021)

    Article  Google Scholar 

Download references

Acknowledgements

We thank the anonymous ICAIS 2022 reviewers for their helpful comments. This work was supported by the National Natural Science Foundation of China (No. 61902111), Major Public Welfare Project of Henan Province (No. 201300311200), and the High-level talent Fund Project of Henan University of Technology, China (No. 2018BS052).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Miaolei Deng .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Deng, M., Song, W., Ma, M., Li, H., Israr, M. (2022). Efficient Designated-Server Proxy Re-encryption with Keyword Search for Big Data. In: Sun, X., Zhang, X., Xia, Z., Bertino, E. (eds) Advances in Artificial Intelligence and Security. ICAIS 2022. Communications in Computer and Information Science, vol 1587. Springer, Cham. https://doi.org/10.1007/978-3-031-06761-7_30

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-06761-7_30

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-06760-0

  • Online ISBN: 978-3-031-06761-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics