Skip to main content

Outsourcing of Verifiable Attribute-Based Keyword Search

  • Conference paper
  • First Online:
Secure IT Systems (NordSec 2017)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10674))

Included in the following conference series:

Abstract

In integrated broadcast-broadband services, viewers receive content via the airwaves as well as additional content via the Internet. The additional content can be personalized by using the viewing histories of each viewer. Viewing histories however contain private data that must be handled with care. A verifiable attribute-based keyword search (VABKS) scheme allows data users (service providers), whose attributes satisfy a policy that is specified by the data owner (viewer), to securely search and access stored data in a malicious cloud server, and verify the correctness of the operations by the cloud server. VABKS, however, requires data owners who have computationally weak terminals, such as television sets, to perform heavy computations due to the attribute-based encryption process. In this paper, we propose a new VABKS scheme where such heavy computations are outsourced to a cloud server and hence the data owner is kept as light as possible. Our scheme is provably secure against two malicious cloud servers in the random oracle model: one performing the attribute-based encryption process, and the other performing the keyword search process on the encrypted data. We implement our scheme and the previous VABKS scheme and show that our scheme significantly reduces the computation cost of the data owner.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Beimel, A.: Secure schemes for secret sharing and key distribution. Ph.D. thesis, Israel Institute of Technology (1996)

    Google Scholar 

  2. Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: Proceedings of IEEE S&P 2007, pp. 321–334 (2007)

    Google Scholar 

  3. Green, M., Hohenberger, S., Waters, B.: Outsourcing the decryption of ABE ciphertexts. In: Proceedings of USENIX Security Symposium (2011)

    Google Scholar 

  4. Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of ACMCCS 2006, pp. 89–98 (2006)

    Google Scholar 

  5. ETSI: TS 102 796: hybrid broadcast broadband TV, V1.3.1

    Google Scholar 

  6. Hohenberger, S., Waters, B.: Online/Offline attribute-based encryption. In: Proceedings of PKC 2014, pp. 293–310 (2014)

    Google Scholar 

  7. NHK, Hybridcast (in Japanese). http://www.nhk.or.jp/hybridcast/online/

  8. KBS: Icon (in Korean). http://icon.kbs.co.kr/site/main/main.php

  9. Li, J., Jia, C., Li, J., Chen, X.: Outsourcing encryption of attribute-based encryption with MapReduce. In: Proceedings of ICICS 2012, pp. 191–201 (2012)

    Google Scholar 

  10. Ohtake, G., Safavi-Naini, R., Zhang, L.: Outsourcing scheme of ABE encryption secure against malicious adversary. In: Proceedings of ICISSP 2017, pp. 71–82 (2017)

    Google Scholar 

  11. Shi, J., Lai, J., Li, Y., Deng, R., Weng, J.: Authorized keyword search on encrypted data. In: Proceedings of ESORICS 2014, pp. 419–435 (2014)

    Google Scholar 

  12. Sun, W., Yu, S., Lou, W., Hou, Y., Li, H.: Protecting your right: attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. In: Proceedings of IEEE Infocom 2014, pp. 226–234 (2014)

    Google Scholar 

  13. Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Proceedings of Eurocrypt 2005, pp. 457–473 (2005)

    Google Scholar 

  14. Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. eprint 2008/290

    Google Scholar 

  15. Wang, C., Li, W., Li, Y., Xu, X.: A ciphertext-policy attribute-based encryption scheme supporting keyword search function. In: Proceedings of CSS 2013, pp. 377–386 (2013)

    Google Scholar 

  16. BBC: YouView: extraordinary TV for everyone. http://www.youview.com/

  17. Zhou, Z., Huang, D.: Efficient and secure data storage operations for mobile cloud computing. eprint 2011/185

    Google Scholar 

  18. Zheng, Q., Xu, S., Ateniese, G.: VABKS: verifiable attribute-based keyword search over outsourced encrypted data. In: Proceedings of IEEE Infocom 2014, pp. 522–530 (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Go Ohtake .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ohtake, G., Safavi-Naini, R., Zhang, L.F. (2017). Outsourcing of Verifiable Attribute-Based Keyword Search. In: Lipmaa, H., Mitrokotsa, A., Matulevičius, R. (eds) Secure IT Systems. NordSec 2017. Lecture Notes in Computer Science(), vol 10674. Springer, Cham. https://doi.org/10.1007/978-3-319-70290-2_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-70290-2_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-70289-6

  • Online ISBN: 978-3-319-70290-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics