Abstract
Attribute-based keyword search (ABKS) allows users, whose credentials satisfy the owner’s access control policy, to search over the encrypted data in cloud environment. However, most current schemes can not simultaneously achieve that owners dominate the data while users retrieve the interested files more accurately, either in ciphertext policy or key policy setting. Furthermore, majority of ABKS schemes ignore the decryption of retrieved files, or focus little about decryption efficiency. Therefore, aiming at these limitations, we propose a flexible attribute based keyword search scheme via two access policies, which allows: (1) the data owner to control the access policy in order to gain control over their data and specify who can access the files; (2) the user to define the search policy so that he can search the interested encrypted files more accurately. In addition, we employ an online/offline technique to improve the efficiency. And the ciphertexts can be decrypted with two pairings while it grows linear with the number of attributes in most existing schemes. Our system is selectively secure against chosen-plaintext attack and chosen-keyword attack, and it also achieves keyword secrecy.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Alderman, J., Janson, C., Martin, K. M., & Renwick, S. L. (2015). Extended functionality in verifiable searchable encryption. In International Conference on Cryptography and Information Security in the Balkans (pp. 187-205).
Chaudhari, P., & Das, M. (2015). Privacy-preserving attribute based searchable encryption. IACR Cryptol ePrint Arch, 899.
Dong, Q., Guan, Z., & Chen, Z. (2015). Attribute-based keyword search efficiency enhancement via an online/offline approach. In Parallel and Distributed Systems (pp. 298-305).
Goyal, V., Pandey, O., Sahai, A., & Waters, B. (2006). Attribute-based encryption for finegrained access control of encrypted data. In Proceedings of the 13th ACM conference on Computer and communications security (pp. 89-98).
Li, J., & Zhang, L. (2014). Attribute-based keyword search and data access control in cloud. In Computational Intelligence and Security (CIS)(pp. 382-386).
Jiang, P., Mu, Y., Guo, F., Wang, X., & Wen, Q. (2015). Online/offline ciphertext retrieval on resource constrained devices. The Computer Journal, bxv099.
Waters, B. (2011). Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. In Public Key Cryptography (pp. 53-70).
Padhya, M., & Jinwala, D. (2014). A novel approach for searchable CP-ABE with hidden ciphertext-policy. In International Conference on Information Systems Security (pp. 167-184).
Sahai, A., &Waters, B. (2005). Fuzzy identity-based encryption. In Annual International Conference on the Theory and Applications of Cryptographic Techniques (pp. 457-473).
Zheng, Q., Xu, S., & Ateniese, G. (2014). VABKS: verifiable attribute-based keyword search over outsourced encrypted data. In IEEE INFOCOM 2014-IEEE Conference on Computer Communications (pp. 522-530).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Zhou, P., Liu, Z., Duan, S. (2017). Flexible Attribute-Based Keyword Search via Two Access Policies. In: Barolli, L., Xhafa, F., Yim, K. (eds) Advances on Broad-Band Wireless Computing, Communication and Applications. BWCCA 2016. Lecture Notes on Data Engineering and Communications Technologies, vol 2. Springer, Cham. https://doi.org/10.1007/978-3-319-49106-6_83
Download citation
DOI: https://doi.org/10.1007/978-3-319-49106-6_83
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-49105-9
Online ISBN: 978-3-319-49106-6
eBook Packages: EngineeringEngineering (R0)