Advertisement

HABKS: Hierarchical Attribute-Based Keyword Search on Outsourcing Data

  • Jingyang Yu
  • Wenchang Shi
  • Bo Qin
  • Bin Liang
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 960)

Abstract

Searching over encrypted data is a critical operation to enforce the encryption-before-outsourcing mechanism, which is a fundamental solution to protect data privacy in the untrusted cloud environment. However, most of the existing searchable encryption solutions suffer from the problem of key management and the problem of flexible and fine-grained access control in multi-data owners and multi-data users environment.

Therefore, we propose a hierarchical attribute-based keyword search (HABKS) scheme. Our scheme not only realizes the order management of the key because of its hierarchical structure, but also implements a flexible and fine-grained access control depending on CP-ABE for encrypting keywords indexes and data files. We formally prove the security of HABKS, and then analyze the performance of HABKS. Finally, we implement HABKS scheme with comprehensive experiments. Experiment results show that it is efficient and flexible for searching encrypted data in cloud.

Keywords

Cloud computing Outsourcing data Searchable encryption Hierarchical authorization Attribute-Based Encryption 

Notes

Acknowledgments

This work was supported in part by the National Nature Science Foundation of China (Grant NO. 61472429, 61070192, 91018008, 61303074, 61170240, 61772538), the National Key R&D Program of China (Grant No. 2017YFB1400700), Beijing Nature Science Foundation (Grant No. 4122041), National High-Tech Research Development Program of China (Grant No. 2007AA01Z414), and National Science and Technology Major Project of China (Grant No. 2012ZX01039-004).

References

  1. 1.
    Shan, Z., Ren, K., Blanton, M.: Practical secure computation outsourcing: a survey. ACM Comput. Surv. 51(2), 31 (2017)Google Scholar
  2. 2.
    Kamara, S., Lauter, K.: Cryptographic cloud storage. In: Sion, R., et al. (eds.) FC 2010. LNCS, vol. 6054, pp. 136–149. Springer, Heidelberg (2010).  https://doi.org/10.1007/978-3-642-14992-4_13CrossRefGoogle Scholar
  3. 3.
    Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE Symposium on Security and Privacy, pp. 44–55. IEEE, Berkeley (2000)Google Scholar
  4. 4.
    Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506–522. Springer, Heidelberg (2004).  https://doi.org/10.1007/978-3-540-24676-3_30CrossRefGoogle Scholar
  5. 5.
    Yu, S., Wang, C., Ren, K., Lou, W.: Achieving secure, scalable, and fine-grained data access control in cloud computing. In: 2010 Proceedings IEEE INFOCOM, pp. 1–9. IEEE, San Diego (2010)Google Scholar
  6. 6.
    Li, M., Yu, S., Zheng, Y., Ren, K., Lou, W.: Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans. Parallel Distrib. Syst. 24(1), 131–143 (2013)CrossRefGoogle Scholar
  7. 7.
    Zheng, Q., Xu, S., Ateniese, G.: VABKS: verifiable attribute-based keyword search over outsourced encrypted data. In: IEEE INFOCOM 2014-IEEE Conference on Computer Communications, pp. 522–530. IEEE, Toronto (2014)Google Scholar
  8. 8.
    Sun, W., et al.: Protecting your right: attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. In: IEEE INFOCOM 2014-IEEE Conference on Computer Communications, pp. 226–234. IEEE, Toronto (2014)Google Scholar
  9. 9.
    Fu, Z., et al.: Privacy-preserving smart semantic search based on conceptual graphs over encrypted outsourced data. IEEE Trans. Inf. Forensics Secur. 12(8), 1874–1884 (2017)CrossRefGoogle Scholar
  10. 10.
    Sahai, A., Waters, B.: Fuzzy identity based encryption. In: Cramer, R. (ed.) Advances in Cryptology – EUROCRYPT 2005, LNCS, vol. 3494, pp. 457–473. Springer, Berlin, Heidelberg (2005).  https://doi.org/10.1007/11426639_27CrossRefGoogle Scholar
  11. 11.
    Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy, pp. 321–334. IEEE, Berkeley (2007)Google Scholar
  12. 12.
    Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89–98. ACM, New York (2006)Google Scholar
  13. 13.
    Wan, Z., Liu, J., Deng, R.H.: HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Trans. Inf. Forensics Secur. 7(2), 743–754 (2012)CrossRefGoogle Scholar
  14. 14.
  15. 15.
    Pairing-Based Cryptography library. http://crypto.stanford.edu/pbc/

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.School of InformationRenmin University of ChinaBeijingChina
  2. 2.School of Computer and Information EngineeringHenan UniversityKaifengChina

Personalised recommendations