Fine-grained searchable encryption in multi-user setting
- 556 Downloads
In order to share resources conveniently, users often store their data on remote cloud servers. However, to ensure the security, data will be encrypted when outsourcing to the cloud. This brings some trouble for data search. Searchable encryption allows users to search over the encrypted data on cloud storage to retrieve the interested data without decryption. However, in most of the existing schemes all the encrypted data are treated in the same way. Every user can search for it. In this paper, a fine-grained searchable encryption scheme with two non-colluding cloud servers is proposed. In this scheme, the files can be retrieved if and only if user’s attributes satisfy the access policy and the required keyword agrees with the file keyword. And users can verify whether the cloud server executes the search all over the ciphertexts. Besides, the removed user cannot search again even if he/she colludes with one of the servers.
KeywordsSearchable encryption Fine-grained control Privacy Verification
This work is supported by the National High Technology Research and Development Program (863 Program) of China (No. 2015AA016007), National Natural Science Foundation of China (No. 61272455), China 111 Project (No. B08038), Doctoral Fund of Ministry of Education of China (No. 20130203110004), Fundamental Research Funds for the Central Universities (No. BDY151402), Program for New Century Excellent Talents in University (No. NCET-13-0946), China Postdoctoral Science Foundation (No. 2015M582619), the CICAEET fund and the PAPD fund.
Compliance with ethical standards
Conflict of interest
The authors declare that they have no conflict of interest.
All procedures performed in studies involving human participants were in accordance with the ethical standards of the institutional and/or national research committee and with the 1964 Declaration of Helsinki and its later amendments or comparable ethical standards.
Human and animal rights
This article does not contain any studies with animals performed by any of the authors.
Informed consent was obtained from all individual participants included in the study.
- Bao F, Deng R, Ding X, Yang Y (2008) Private query on encrypted data in multi-user settings. In: Chen L, Mu Y, Susilo W (eds) Information security practice and experience. 4th international conference, ISPEC 2008 Sydney, Australia, April 21–23 2008. Springer, pp 71–85Google Scholar
- Benabbas S, Gennaro R, Vahlis Y (2011) Verifiable delegation of computation over large datasets. In: Rogaway P (ed) Advances in cryptology–CRYPTO 2011. 31st annual cryptology conference, Santa Barbara, CA, USA, August14–18, 2011. Proceedings. Springer, pp 111–131Google Scholar
- Boneh D, Franklin M (2001) Identity-based encryption from the weil pairing. In: Kilian J (ed) Advances in cryptology-CRYPTO 2001. 21st annual international cryptology conference, Santa Barbara,California, USA, August 19–23, 2001. Springer, pp 213–229Google Scholar
- Chai Q, Gong G (2012) Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers. In: Communications (ICC), 2012 IEEE international conference on. IEEE, pp 917–922Google Scholar
- Chang Y, Mitzenmacher M (2005) Privacy preserving keyword searches onremote encrypted data. In: Ioannidis J, Keromytis A, Yung M (eds) Applied cryptography and network security. 3rd international conference, ACNS 2005, New York, NY, USA, June 7–10, 2005. Springer, pp 442–455Google Scholar
- Chase M, Chow SSM (2009) Privacy-aware attribute-based encryption with user accountability. Springer, Berlin, pp 121–130Google Scholar
- Chaudhari P, Das M (2015) Privacy-preserving Attribute Based Searchable Encryption. IACR Cryptol ePrint Arch 2015:899Google Scholar
- Cheng R, Yan J, Guan C, Zhang F, Ren K (2015) Verifiable searchable symmetric encryption from indistinguishability obfuscation. In: Proceedings of the 10th ACM symposium on information, computer and communications security. ACM, pp 621–626Google Scholar
- Curtmola R, Garay J, Kamara S, Ostrovsky R (2006) Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of the 13th ACM conference on computer and communications security. ACM, pp 79–88Google Scholar
- Fiore D, Gennaro R (2012) Publicly verifiable delegation of large polynomials and matrix computations, with applications. In: Proceedings of the 2012 ACM conference on computer and communications security. ACM, pp 501–512Google Scholar
- Kamara S, Lauter K (2010) Cryptographic cloud storage. In: Sion R, Curtmola R, Dietrich S, Kiayias A, Miret JM, Sako K, Sebé F (eds) Financial cryptography and data security. FC 2010 Workshops, RLCPS, WECSR, and WLC 2010, Tenerife, Canary Islands, Spain, January 25–28, 2010. Springer, pp 136–149Google Scholar
- Kapadia A, Tsang PP, Smith SW (2007) Attribute-based publishing with hidden credentials and hidden policies. In: The 14th network and distributed system security symposium, NDSS 2007, San Diego, California, USA, 28th February-2nd March, 2007, pp 179–192Google Scholar
- Kurosawa K (2014) Garbled searchable symmetric encryption. In: Christin N, Safavi-Naini R (eds) Financial cryptography and datasecurity. 18th international conference, FC 2014, Christ Church, Barbados, March 3–7, 2014. Springer, pp 234–251Google Scholar
- Lai J, Deng RH, Li Y, Weng J (2014) Fully secure key-policy attribute-based encryption with constant-size ciphertexts and fast decryption. Springer, Berlin, pp 239–248Google Scholar
- Li J, Ren K, Zhu B, Wan Z (2009) Privacy-aware attribute-based encryption with user accountability, vol 5735. Springer, Berlin, pp 347–362Google Scholar
- Liu P, Wang J, Ma H, Nie H (2014a) Efficient verifiable public key encryption with keyword search based on kp-abe. In: Broadband and wireless computing, communication and applications (BWCCA), 2014 ninth international conference on. IEEE, pp 584–589Google Scholar
- Liu W, Liu J, Wu Q, Qin B, Zhou Y (2014b) Practical direct chosen ciphertext secure key-policy attribute-based encryption with public ciphertext test, vol 8713. Springer, Berlin, pp 91–108Google Scholar
- Nishide T, Yoneyama K, Ohta K (2008) Attribute-based encryption with partially hidden encryptor-specified access structures, vol 5037. Springer, Berlin, pp 111–129Google Scholar
- Okamoto T, Takashima K, Electric M (2012) Adaptively attributehiding (hierarchical) inner product encryption. In: Pointcheval D, Johansson T (eds) Advances in Cryptology–EUROCRYPT 2012. 31st annual international conference on the theory and applications of cryptographic techniques, Cambridge, UK, April 15–19, 2012. Springer, pp 591–608Google Scholar
- Parno B, Raykova M, Vaikuntanathan V (2012) How to delegate and verify in public: verifiable computation from attribute-based encryption, vol 7194. Springer, Berlin, pp 422–439Google Scholar
- Rajan R, Coimbatore AVVP (2012) Efficient and privacy preserving multi user keyword search for cloud storage services. Int J Adv Technol Eng Res (IJATER) 2(4):48–51Google Scholar
- Sahai A, Waters B (2005) Fuzzy identity-based encryption, vol 3494. Springer, Berlin, pp 457–473Google Scholar
- Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: IEEE symposium on security and privacy, 2000. S&P 2000. Proceedings. IEEE, pp 44–55Google Scholar
- Wang C, Chow S, Wang Q, Ren K, Lou W (2013a) Privacy-preserving public auditing for secure cloud storage. Comput IEEE Trans 62(2):362–375Google Scholar
- Wang J, Ma H, Tang Q, Li J, Zhu H, Ma S, Chen X (2013b) Efficient verifiable fuzzy keyword search over encrypted data in cloud computing. Comput Sci Inform Syst 10(2):667–684Google Scholar
- Xu B, Peng Z, Xiao F, Gates A, Yu J (2015) Dynamic deployment of virtual machines in cloud computing using multi-objective optimization. Soft Comput 19(8):2265–2273Google Scholar
- Zhang W, Xiao S, Lin Y, Zhou T, Zhou S (2014) Secure ranked multi-keyword search for multiple data owners in cloud computing. In: Dependable systems and networks (DSN), 2014 international conference on 44th annual IEEE/IFIP. IEEE, pp 276–286Google Scholar
- Zhao F, Nishide T, SakuraiK(2012) Multi-user keyword search schemefor secure data sharing with fine-grained access control. In: Kim H (ed) Information security and cryptology-ICISC 2011. 14th international conference, Seoul, Korea, November 30-December 2, 2011. Springer, pp 406–418Google Scholar
- Zheng Q, Xu S, Ateniese G (2013) Vabks: verifiable attribute-based keyword search over outsourced encrypted data. Cryptology ePrint archive, report 2013/462Google Scholar
- Zheng Q, Xu S, Ateniese G (2014) VABKS: verifiable attribute-based keyword search over outsourced encrypted data. In: 2014 IEEE conference on computer communications, INFOCOM 2014, Toronto, Canada, April 27–May 2, 2014, pp 522–530Google Scholar