Secure Fine-Grained Keyword Search With Efficient User Revocation and Traitor Tracing in the Cloud
- 1 October 2020
- journal article
- research article
- Published by IGI Global in Journal of Organizational and End User Computing
- Vol. 32 (4), 112-137
- https://doi.org/10.4018/joeuc.2020100106
Abstract
Fine-grained searching is an important feature in multi-user cloud environment and a combination of attribute-based encryption (ABE) and searchable encryption (SE) is used to facilitate it. This combination provides a powerful tool where multiple data owners can share their data with multiple data users in an independent and differential manner. In this article, the authors have used key-policy design framework of attribute-based encryption to construct the multi-keyword search scheme where access rights assigned to a data user are associated with his/her secret key. This leads to a situation where a data user can abuse his secret key to distribute it illegally to the unauthorized users to perform search over the shared data which is not intended for him/her. Therefore, to track such kind of key abusers the authors have embedded an extra functionality of tracing the traitors. For this purpose, each user is assigned a unique identity in the form of binary string where each bit represents an attribute related to his identity. In addition to the normal attributes, the access structure of a user also possesses identity-related attributes which are hidden from the user along with some normal attributes. Hence, the proposed scheme supports partial anonymity. Further, in the event of user revocation the proposed scheme efficiently handles the system update process by delegating the computationally intensive tasks to the cloud server. Finally, the proposed scheme is proved secure under Decisional Bilinear Diffie-Hellman (DBDH) assumption and decision linear assumption in the selective security model. Request access from your librarian to read this article's full text.Keywords
This publication has 24 references indexed in Scilit:
- Sentiment Analysis of Tweets for Estimating Criticality and Security of EventsJournal of Organizational and End User Computing, 2017
- Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologramMultimedia Tools and Applications, 2017
- Enhancing the Browser-Side Context-Aware Sanitization of Suspicious HTML5 Code for Halting the DOM-Based XSS Vulnerabilities in CloudInternational Journal of Cloud Applications and Computing, 2017
- Hidden policy ciphertext-policy attribute-based encryption with keyword search against keyword guessing attackScience China Information Sciences, 2016
- KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud StorageIEEE Transactions on Services Computing, 2016
- Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the CloudIEEE Transactions on Parallel and Distributed Systems, 2014
- End User Security Training for Identification and Access ManagementJournal of Organizational and End User Computing, 2013
- jPBC: Java pairing based cryptographyPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2011
- Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast SystemsLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2009
- Attribute-based encryption for fine-grained access control of encrypted dataPublished by Association for Computing Machinery (ACM) ,2006