Skip to main content

Flexible Attribute-Based Keyword Search via Two Access Policies

  • Conference paper
  • First Online:
Advances on Broad-Band Wireless Computing, Communication and Applications (BWCCA 2016)

Abstract

Attribute-based keyword search (ABKS) allows users, whose credentials satisfy the owner’s access control policy, to search over the encrypted data in cloud environment. However, most current schemes can not simultaneously achieve that owners dominate the data while users retrieve the interested files more accurately, either in ciphertext policy or key policy setting. Furthermore, majority of ABKS schemes ignore the decryption of retrieved files, or focus little about decryption efficiency. Therefore, aiming at these limitations, we propose a flexible attribute based keyword search scheme via two access policies, which allows: (1) the data owner to control the access policy in order to gain control over their data and specify who can access the files; (2) the user to define the search policy so that he can search the interested encrypted files more accurately. In addition, we employ an online/offline technique to improve the efficiency. And the ciphertexts can be decrypted with two pairings while it grows linear with the number of attributes in most existing schemes. Our system is selectively secure against chosen-plaintext attack and chosen-keyword attack, and it also achieves keyword secrecy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Alderman, J., Janson, C., Martin, K. M., & Renwick, S. L. (2015). Extended functionality in verifiable searchable encryption. In International Conference on Cryptography and Information Security in the Balkans (pp. 187-205).

    Google Scholar 

  2. Chaudhari, P., & Das, M. (2015). Privacy-preserving attribute based searchable encryption. IACR Cryptol ePrint Arch, 899.

    Google Scholar 

  3. Dong, Q., Guan, Z., & Chen, Z. (2015). Attribute-based keyword search efficiency enhancement via an online/offline approach. In Parallel and Distributed Systems (pp. 298-305).

    Google Scholar 

  4. Goyal, V., Pandey, O., Sahai, A., & Waters, B. (2006). Attribute-based encryption for finegrained access control of encrypted data. In Proceedings of the 13th ACM conference on Computer and communications security (pp. 89-98).

    Google Scholar 

  5. Li, J., & Zhang, L. (2014). Attribute-based keyword search and data access control in cloud. In Computational Intelligence and Security (CIS)(pp. 382-386).

    Google Scholar 

  6. Jiang, P., Mu, Y., Guo, F., Wang, X., & Wen, Q. (2015). Online/offline ciphertext retrieval on resource constrained devices. The Computer Journal, bxv099.

    Google Scholar 

  7. Waters, B. (2011). Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. In Public Key Cryptography (pp. 53-70).

    Google Scholar 

  8. Padhya, M., & Jinwala, D. (2014). A novel approach for searchable CP-ABE with hidden ciphertext-policy. In International Conference on Information Systems Security (pp. 167-184).

    Google Scholar 

  9. Sahai, A., &Waters, B. (2005). Fuzzy identity-based encryption. In Annual International Conference on the Theory and Applications of Cryptographic Techniques (pp. 457-473).

    Google Scholar 

  10. Zheng, Q., Xu, S., & Ateniese, G. (2014). VABKS: verifiable attribute-based keyword search over outsourced encrypted data. In IEEE INFOCOM 2014-IEEE Conference on Computer Communications (pp. 522-530).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Peilin Zhou .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Zhou, P., Liu, Z., Duan, S. (2017). Flexible Attribute-Based Keyword Search via Two Access Policies. In: Barolli, L., Xhafa, F., Yim, K. (eds) Advances on Broad-Band Wireless Computing, Communication and Applications. BWCCA 2016. Lecture Notes on Data Engineering and Communications Technologies, vol 2. Springer, Cham. https://doi.org/10.1007/978-3-319-49106-6_83

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-49106-6_83

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-49105-9

  • Online ISBN: 978-3-319-49106-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics