Flexible Attribute-Based Keyword Search via Two Access Policies
Attribute-based keyword search (ABKS) allows users, whose credentials satisfy the owner’s access control policy, to search over the encrypted data in cloud environment. However, most current schemes can not simultaneously achieve that owners dominate the data while users retrieve the interested files more accurately, either in ciphertext policy or key policy setting. Furthermore, majority of ABKS schemes ignore the decryption of retrieved files, or focus little about decryption efficiency. Therefore, aiming at these limitations, we propose a flexible attribute based keyword search scheme via two access policies, which allows: (1) the data owner to control the access policy in order to gain control over their data and specify who can access the files; (2) the user to define the search policy so that he can search the interested encrypted files more accurately. In addition, we employ an online/offline technique to improve the efficiency. And the ciphertexts can be decrypted with two pairings while it grows linear with the number of attributes in most existing schemes. Our system is selectively secure against chosen-plaintext attack and chosen-keyword attack, and it also achieves keyword secrecy.
KeywordsCloud Server Access Structure Data Owner Access Policy Random Oracle Model
Unable to display preview. Download preview PDF.
- 1.Alderman, J., Janson, C., Martin, K. M., & Renwick, S. L. (2015). Extended functionality in verifiable searchable encryption. In International Conference on Cryptography and Information Security in the Balkans (pp. 187-205).Google Scholar
- 2.Chaudhari, P., & Das, M. (2015). Privacy-preserving attribute based searchable encryption. IACR Cryptol ePrint Arch, 899.Google Scholar
- 3.Dong, Q., Guan, Z., & Chen, Z. (2015). Attribute-based keyword search efficiency enhancement via an online/offline approach. In Parallel and Distributed Systems (pp. 298-305).Google Scholar
- 4.Goyal, V., Pandey, O., Sahai, A., & Waters, B. (2006). Attribute-based encryption for finegrained access control of encrypted data. In Proceedings of the 13th ACM conference on Computer and communications security (pp. 89-98).Google Scholar
- 5.Li, J., & Zhang, L. (2014). Attribute-based keyword search and data access control in cloud. In Computational Intelligence and Security (CIS)(pp. 382-386).Google Scholar
- 6.Jiang, P., Mu, Y., Guo, F., Wang, X., & Wen, Q. (2015). Online/offline ciphertext retrieval on resource constrained devices. The Computer Journal, bxv099.Google Scholar
- 7.Waters, B. (2011). Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. In Public Key Cryptography (pp. 53-70).Google Scholar
- 8.Padhya, M., & Jinwala, D. (2014). A novel approach for searchable CP-ABE with hidden ciphertext-policy. In International Conference on Information Systems Security (pp. 167-184).Google Scholar
- 9.Sahai, A., &Waters, B. (2005). Fuzzy identity-based encryption. In Annual International Conference on the Theory and Applications of Cryptographic Techniques (pp. 457-473).Google Scholar
- 10.Zheng, Q., Xu, S., & Ateniese, G. (2014). VABKS: verifiable attribute-based keyword search over outsourced encrypted data. In IEEE INFOCOM 2014-IEEE Conference on Computer Communications (pp. 522-530).Google Scholar