Skip to main content

A Fine-Grained Authorized Keyword Secure Search Scheme in the Cloud Computing

  • Conference paper
  • First Online:
Cyberspace Safety and Security (CSS 2019)

Abstract

The development of the Internet and the Internet of Things has led to a sharp increase in the amount of data. The great advantages of big data have promoted the research and usage of a series of related technologies in various fields. In the field of government, data from various departments is being aggregated to acquire more value which can help to improve the efficiency and quality of public service. Cloud computing, as an infrastructure of big data, is also applied in government big data. However, the sensitivity of government data determines that the data stored in the cloud must be well protected. Meanwhile, fine-grained data sharing is also important for the public services of government. Recently, several searchable attribute-based encryption schemes have been proposed to achieve fine-grained data access control and search on ciphertext simultaneously. Unfortunately, each of them has some imperfections in efficiency or access policy. In this paper, we propose a fine-grained authorized keyword secure search scheme by leveraging the attribute-based encryption primitive, whose access policy supports AND, OR, and threshold gates. We give the concrete construction, rigorous verification of correctness, detailed security analysis, and prove that our solution is efficiency through several experiments.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. JPBC: The Java Pairing Based Cryptography Library, December 2013. http://gas.dia.unisa.it/projects/jpbc/index.html

  2. Hermetic Systems: Hermetic Word Frequency Counter (2015). http://www.hermetic.ch/wfc/wfc.htm

  3. IETF: Request for Comments Database, August 2018. http://www.ietf.org/rfc.html

  4. Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy, Berkeley, CA, USA, pp. 321–334. IEEE (2007)

    Google Scholar 

  5. Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506–522. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24676-3_30

    Chapter  Google Scholar 

  6. Boneh, D., Waters, B.: Conjunctive, subset, and range queries on encrypted data. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 535–554. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-70936-7_29

    Chapter  Google Scholar 

  7. Cui, H., Wan, Z., Deng, R.H., Wang, G., Li, Y.: Efficient and expressive keyword search over encrypted data in cloud. IEEE Trans. Dependable Secur. Comput. 15(3), 409–422 (2018)

    Article  Google Scholar 

  8. Golle, P., Staddon, J., Waters, B.: Secure conjunctive keyword search over encrypted data. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol. 3089, pp. 31–45. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24852-1_3

    Chapter  Google Scholar 

  9. Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89–98. ACM, New York (2006)

    Google Scholar 

  10. Kamara, S., Papamanthou, C., Roeder, T.: Dynamic searchable symmetric encryption. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 965–976. ACM, New York (2012)

    Google Scholar 

  11. Kim, K.S., Kim, M., Lee, D., Park, J.H., Kim, W.H.: Forward secure dynamic searchable symmetric encryption with efficient updates. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 1449–1463. ACM, New York (2017)

    Google Scholar 

  12. Lai, J., Zhou, X., Deng, R.H., Li, Y., Chen, K.: Expressive search on encrypted data. In: Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, Hangzhou, China, pp. 243–252. ACM (2013)

    Google Scholar 

  13. Peng, T., Liu, Q., Hu, B., Liu, J., Zhu, J.: Dynamic keyword search with hierarchical attributes in cloud computing. IEEE Access 6, 68948–68960 (2018)

    Article  Google Scholar 

  14. Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005). https://doi.org/10.1007/11426639_27

    Chapter  Google Scholar 

  15. Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE Symposium on Security and Privacy, Berkeley, CA, USA, pp. 44–55. IEEE (2000)

    Google Scholar 

  16. Sun, W., Yu, S., Lou, W., Hou, Y.T., Li, H.: Protecting your right: attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. In: IEEE INFOCOM 2014 - IEEE Conference on Computer Communications, Toronto, ON, Canada, pp. 226–234. IEEE (2014)

    Google Scholar 

  17. Wang, Z., Han, W., Lin, Y., Li, J.: Research on security assurance architecture of e-government. Comput. Appl. 28(s1), 55–58 (2008)

    Google Scholar 

  18. Yin, H., et al.: Secure conjunctive multi-keyword search for multiple data owners in cloud computing. In: ICPADS 2016, Wuhan, China, pp. 761–768. IEEE (2016)

    Google Scholar 

  19. Yin, H., Xiong, Y., Zhang, J., Ou, L., Liao, S., Qin, Z.: A key-policy searchable attribute-based encryption scheme for efficient keyword search and fine-grained access control over encrypted data. Electronics 8(256), 1–20 (2019)

    Google Scholar 

  20. Yin, H., et al.: CP-ABSE: a ciphertext-policy attribute-based searchable encryption scheme. IEEE Access 7, 5682–5694 (2019)

    Article  Google Scholar 

Download references

Acknowledgement

This work is supported by the National Natural Science Foundation of China under Grant 61772191, 61472131, Science and Technology Key Projects of Hunan Province (2015TP1004, 2016JC2012), and Science and Technology Key Projects of Changsha (kq1801008, kq1804008).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zheng Qin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wang, F., Qin, Z., Yin, H. (2019). A Fine-Grained Authorized Keyword Secure Search Scheme in the Cloud Computing. In: Vaidya, J., Zhang, X., Li, J. (eds) Cyberspace Safety and Security. CSS 2019. Lecture Notes in Computer Science(), vol 11983. Springer, Cham. https://doi.org/10.1007/978-3-030-37352-8_38

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-37352-8_38

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-37351-1

  • Online ISBN: 978-3-030-37352-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics