Skip to main content
Log in

ABDKS: attribute-based encryption with dynamic keyword search in fog computing

  • Research Article
  • Published:
Frontiers of Computer Science Aims and scope Submit manuscript

Abstract

Attribute-based encryption with keyword search (ABKS) achieves both fine-grained access control and keyword search. However, in the previous ABKS schemes, the search algorithm requires that each keyword to be identical between the target keyword set and the ciphertext keyword set, otherwise the algorithm does not output any search result, which is not conducive to use. Moreover, the previous ABKS schemes are vulnerable to what we call a peer-decryption attack, that is, the ciphertext may be eavesdropped and decrypted by an adversary who has sufficient authorities but no information about the ciphertext keywords.

In this paper, we provide a new system in fog computing, the ciphertext-policy attribute-based encryption with dynamic keyword search (ABDKS). In ABDKS, the search algorithm requires only one keyword to be identical between the two keyword sets and outputs the corresponding correlation which reflects the number of the same keywords in those two sets. In addition, our ABDKS is resistant to peer-decryption attack, since the decryption requires not only sufficient authority but also at least one keyword of the ciphertext. Beyond that, the ABDKS shifts most computational overheads from resource constrained users to fog nodes. The security analysis shows that the ABDKS can resist Chosen-Plaintext Attack (CPA) and Chosen-Keyword Attack (CKA).

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Bonomi F, Milito R A, Zhu J, Addepalli S. Fog computing and its role in the internet of things. In: Proceedings of the 1st Edition of the MCC Workshop on Mobile Cloud Computing. 2012, 13–16

  2. Ivan S, Wen S. The fog computing paradigm: scenarios and security issues. In: Proceedings of Federated Conference on Computer Science and Information Systems. 2014, 1–8

  3. Yi S, Li C, Li Q. A survey of fog computing: concepts, applications and issues. In: Proceedings of Workshop on Mobile Big Data. 2015, 37–42

  4. Stojmenovic I, Wen S, Huang X, Luan H. An overview of fog computing and its security issues. Concurrency and Computation: Practice and Experience, 2016, 28(10): 2991–3005

    Article  Google Scholar 

  5. Sahai A, Waters B. Fuzzy identity-based encryption. In: Cramer R, eds. Advances in Cryptology — EUROCRYPT 2005, Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, Berlin, Heidelberg, 2005, 457–473

    Chapter  Google Scholar 

  6. Zheng Q, Xu S, Ateniese G. VABKS: verifiable attribute-based keyword search over outsourced encrypted data. In: Proceedings of IEEE Conference on Computer Communications. 2014, 522–530

  7. Sun W, Yu S, Lou W, Hou Y T, Li H. Protecting your right: verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. IEEE Transactions on Parallel and Distributed Systems, 2016, 27(4): 1187–1198

    Article  Google Scholar 

  8. Green M, Hohenberger S, Waters B. Outsourcing the decryption of ABE ciphertexts. In: Proceedings of USENIX Security Symposium. 2011

  9. Xiao M, Zhou J, Liu X, Jiang M. A hybrid scheme for fine-grained search and access authorization in fog computing environment. Sensors, 2017, 17(6): 1423

    Article  Google Scholar 

  10. Miao Y, Ma J, Liu X, Weng J, Li H, Li H. Lightweight fine-grained search over encrypted data in fog computing. IEEE Transactions on Services Computing, 2019, 12(5): 772–785

    Article  Google Scholar 

  11. Li J, Shi Y, Zhang Y. Searchable ciphertext-policy attribute-based encryption with revocation in cloud storage. International Journal of Communication Systems, 2017, 30(1): e2942

    Article  Google Scholar 

  12. Goyal V, Pandey O, Sahai A, Waters B. Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of ACM Conference on Computer and Communications Security. 2006, 89–98

  13. Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption. In: Proceedings of IEEE Symposium on Security and Privacy. 2007, 321–334

  14. Cheung L, Newport C C. Provably secure ciphertext policy ABE. In: Proceedings of ACM Conference on Computer and Communications Security. 2007, 456–465

  15. Horváth M. Attribute-based encryption optimized for cloud computing. In: Margaria-Steffen T, Pokorný J, Quisquater J J, Wattenhofer R, eds. SOFSEM 2015: Theory and Practice of Computer Science. Springer, Berlin, Heidelberg, 2015, 566–577

    Chapter  Google Scholar 

  16. Wang S, Zhou J, Liu J K, Yu J, Chen J, Xie W. An efficient file hierarchy attribute-based encryption scheme in cloud computing. IEEE Transactions on Information Forensics and Security, 2016, 11(6): 1265–1277

    Article  Google Scholar 

  17. Li J, Yu Q, Zhang Y. Hierarchical attribute based encryption with continuous leakage-resilience. Information Sciences, 2019, 484: 113–134

    Article  MATH  Google Scholar 

  18. Cheng L, Meng F, Meng X, Zhang Q. Akc-based revocable ABE schemes from LWE assumption. Security and Communication Networks, 2020

  19. Li J, Huang X, Li J, Chen X, Xiang Y. Securely outsourcing attribute-based encryption with checkability. IEEE Transactions on Parallel and Distributed Systems, 2014, 25(8): 2201–2210

    Article  Google Scholar 

  20. Zhang R, Ma H, Lu Y. Fine-grained access control system based on fully outsourced attribute-based encryption. Journal of Systems and Software, 2017, 125: 344–353

    Article  Google Scholar 

  21. Li J, Yao W, Zhang Y, Qian H, Han J. Flexible and fine-grained attribute-based data storage in cloud computing. IEEE Transactions on Services Computing, 2017, 10(5): 785–796

    Article  Google Scholar 

  22. Li J, Wang Y, Zhang Y, Han J. Full verifiability for outsourced decryption in attribute based encryption. IEEE Transactions on Services Computing, 2017, 13(3): 478–487

    Article  Google Scholar 

  23. Zuo C, Shao J, Wei G, Xie M, Ji M. CCA-secure ABE with outsourced decryption for fog computing. Future Generation Computer Systems, 2018, 78: 730–738

    Article  Google Scholar 

  24. Zhang P, Chen Z, Liu J K, Liang K, Liu H. An efficient access control scheme with outsourcing capability and attribute update for fog computing. Future Generation Computer Systems, 2018, 78: 753–762

    Article  Google Scholar 

  25. Song D X, Wagner D A, Perrig A. Practical techniques for searches on encrypted data. In: Proceedings of IEEE Symposium on Security and Privacy. 2000, 44–55

  26. Boneh D, Crescenzo G D, Ostrovsky R, Persiano G. Public key encryption with keyword search. In: Cachin C, Camenisch J L, eds. Advances in Cryptology — EUROCRYPT 2004. Springer, Berlin, Heidelbery, 2004, 506–522

    Chapter  Google Scholar 

  27. Wang H, Dong X, Cao Z, Li D. Secure and efficient attribute-based encryption with keyword search. The Computer Journal, 2018, 61(8): 1133–1142

    Article  MathSciNet  Google Scholar 

  28. Cao N, Wang C, Li M, Ren K, Lou W. Privacy-preserving multi-keyword ranked search over encrypted cloud data. In: Proceedings of IEEE International Conference on Computer Communications. 2011, 829–837

  29. Lu Y, Li J, Zhang Y. Secure channel free certificate-based searchable encryption withstanding outside and inside keyword guessing attacks. IEEE Transactions on Services Computing, 2019

  30. Li H, Yang Y, Luan T H, Liang X, Zhou L, Shen X S. Enabling finegrained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data. IEEE Transactions on Dependable and Secure Computing, 2016, 13(3): 312–325

    Article  Google Scholar 

  31. Miao Y, Ma J, Liu X, Wei F, Liu Z, Wang X A. m2-abks: attribute-based multi-keyword search over encrypted personal health records in multi-owner setting. Journal of Medical Systems, 2016, 40(11): 1–12

    Article  Google Scholar 

  32. Cui H, Deng R H, Liu J K, Li Y. Attribute-based encryption with expressive and authorized keyword search. In: Proceedings of Australasian Conference on Information Security and Privacy. 2017, 106–126

  33. Li J, Lin X, Zhang Y, Han J. KSF-OABE: outsourced attribute-based encryption with keyword search function for cloud storage. IEEE Transactions on Services Computing, 2017, 10(5): 715–725

    Article  Google Scholar 

Download references

Acknowledgements

The work was supported by National Cryptography Development Fund (MMJJ20180210) and the National Natural Science Foundation of China (Grant Nos. 61832012 and 61672019).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mingqiang Wang.

Additional information

Fei Meng received his MS degree in basic mathematics from Shandong University, China in 2017. Now, he is a PhD student of School of Mathematics, Shandong University, China. His current research interest includes cloud computing and lattice-based cryptography.

Leixiao Cheng received her BS degree in the School of Mathematical Sciences, South China Normal University, China in 2014. She is currently pursuing her PhD degree at Fudan University, China. Her research interests mainly focus on lattice-based cryptography.

Mingqiang Wang received his PhD degree in basic mathematics from Shandong University, China in 2004. Currently, he is a professor in the School of Mathematics, Shandong University, China. His research interest includes cryptography and information theory.

Electronic supplementary material

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Meng, F., Cheng, L. & Wang, M. ABDKS: attribute-based encryption with dynamic keyword search in fog computing. Front. Comput. Sci. 15, 155810 (2021). https://doi.org/10.1007/s11704-020-9472-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11704-020-9472-7

Keywords

Navigation