Abstract
In integrated broadcast-broadband services, viewers receive content via the airwaves as well as additional content via the Internet. The additional content can be personalized by using the viewing histories of each viewer. Viewing histories however contain private data that must be handled with care. A verifiable attribute-based keyword search (VABKS) scheme allows data users (service providers), whose attributes satisfy a policy that is specified by the data owner (viewer), to securely search and access stored data in a malicious cloud server, and verify the correctness of the operations by the cloud server. VABKS, however, requires data owners who have computationally weak terminals, such as television sets, to perform heavy computations due to the attribute-based encryption process. In this paper, we propose a new VABKS scheme where such heavy computations are outsourced to a cloud server and hence the data owner is kept as light as possible. Our scheme is provably secure against two malicious cloud servers in the random oracle model: one performing the attribute-based encryption process, and the other performing the keyword search process on the encrypted data. We implement our scheme and the previous VABKS scheme and show that our scheme significantly reduces the computation cost of the data owner.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Beimel, A.: Secure schemes for secret sharing and key distribution. Ph.D. thesis, Israel Institute of Technology (1996)
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: Proceedings of IEEE S&P 2007, pp. 321–334 (2007)
Green, M., Hohenberger, S., Waters, B.: Outsourcing the decryption of ABE ciphertexts. In: Proceedings of USENIX Security Symposium (2011)
Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of ACMCCS 2006, pp. 89–98 (2006)
ETSI: TS 102 796: hybrid broadcast broadband TV, V1.3.1
Hohenberger, S., Waters, B.: Online/Offline attribute-based encryption. In: Proceedings of PKC 2014, pp. 293–310 (2014)
NHK, Hybridcast (in Japanese). http://www.nhk.or.jp/hybridcast/online/
KBS: Icon (in Korean). http://icon.kbs.co.kr/site/main/main.php
Li, J., Jia, C., Li, J., Chen, X.: Outsourcing encryption of attribute-based encryption with MapReduce. In: Proceedings of ICICS 2012, pp. 191–201 (2012)
Ohtake, G., Safavi-Naini, R., Zhang, L.: Outsourcing scheme of ABE encryption secure against malicious adversary. In: Proceedings of ICISSP 2017, pp. 71–82 (2017)
Shi, J., Lai, J., Li, Y., Deng, R., Weng, J.: Authorized keyword search on encrypted data. In: Proceedings of ESORICS 2014, pp. 419–435 (2014)
Sun, W., Yu, S., Lou, W., Hou, Y., Li, H.: Protecting your right: attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. In: Proceedings of IEEE Infocom 2014, pp. 226–234 (2014)
Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Proceedings of Eurocrypt 2005, pp. 457–473 (2005)
Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. eprint 2008/290
Wang, C., Li, W., Li, Y., Xu, X.: A ciphertext-policy attribute-based encryption scheme supporting keyword search function. In: Proceedings of CSS 2013, pp. 377–386 (2013)
BBC: YouView: extraordinary TV for everyone. http://www.youview.com/
Zhou, Z., Huang, D.: Efficient and secure data storage operations for mobile cloud computing. eprint 2011/185
Zheng, Q., Xu, S., Ateniese, G.: VABKS: verifiable attribute-based keyword search over outsourced encrypted data. In: Proceedings of IEEE Infocom 2014, pp. 522–530 (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Ohtake, G., Safavi-Naini, R., Zhang, L.F. (2017). Outsourcing of Verifiable Attribute-Based Keyword Search. In: Lipmaa, H., Mitrokotsa, A., Matulevičius, R. (eds) Secure IT Systems. NordSec 2017. Lecture Notes in Computer Science(), vol 10674. Springer, Cham. https://doi.org/10.1007/978-3-319-70290-2_2
Download citation
DOI: https://doi.org/10.1007/978-3-319-70290-2_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-70289-6
Online ISBN: 978-3-319-70290-2
eBook Packages: Computer ScienceComputer Science (R0)