Abstract
Multimedia cloud storage which saves the huge storage overhead of local devices has attracted considerable attention. However, due to the lack of physical control of data, the privacy protection of data on the multimedia cloud has become one of the main concerns of users. Public-key encryption with keywords search (PEKS) is a technique that can keep the privacy and searchability of data in the cloud. In this paper, we present a PEKS with time-controlled proxy re-encryption model which allows the data owner to delegate the access right of the encrypted multimedia database to other users, to achieve the time-controlled multi-user search. Furthermore, it is designed to resist keywords guessing attack and support conjunctive keywords search. Compared with previous works which require a time server to generate a time seal for the generation of the search token, this model embeds the time information of accessing the encrypted database into public and secret key pairs of data users, which saves the managing overhead and reduces the security risks resulting from an extra server. In addition, most existing PEKS schemes were constructed based on the hardness of classical mathematical problems which can be broken by quantum computers. To address this issue, a lattice-based PEKS scheme based on the above model is proposed, which can be considered as the candidate for protecting multimedia data security in the quantum era.



Similar content being viewed by others
References
Agrawal S, Boneh D, Boyen X (2010) Lattice basis delegation in fixed dimension and shorter-ciphertext hierarchical IBE. In: CRYPTO, pp 98–115
Ajtai M (1996) Generating hard instances of lattice problems (extended abstract). In: ACM symposium on the theory of computing, pp 99–108
Ajtai M (1999) Generating hard instances of the short basis problem. In: Proceedings of ICALP, pp 1–9
Alwen J, Peikert C (2009) Generating shorter bases for hard random lattices. In: Proceedings of STACS, pp 75–86
Behnia R, Ozmen MO, Yavuz AA (2018) Lattice-based public key searchable encryption from experimental perspectives. IEEE Trans Dependable Secure Comput. https://doi.org/10.1109/TDSC.2018.2867462
Boneh D, Crescenzo GD, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. In: EUROCRYPT, pp 506–522
Brakerski Z, Langlois A, Peikert C, Regev O, Stehlė D (2013) Classical hardness of learning with errors. In: Symposium on theory of computing conference, STOC, pp 575–584
Byun JW, Rhee HS, Park H, Lee DH (2006) Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. In: Secure data management, third VLDB workshop, SDM, pp 75–83
Cash D, Hofheinz D, Kiltz E, Peikert C (2010) Bonsai trees, or how to delegate a lattice basis. In: EUROCRYPT, pp 523–552
Chen R, Mu Y, Yang G, Guo F, Wang X (2015) A new general framework for secure public key encryption with keyword search. In: ACISP, pp 59–76
Chen Y, Hu Y, Zhu M, Yang G (2018) Attribute-based keyword search with proxy re-encryption in the cloud. IEICE Trans 101-B(8):1798–1808
Fang L, Susilo W, Ge C, Wang J (2013) Public key encryption with keyword search secure against keyword guessing attacks without random oracle. Inf Sci 238:221–241
Gentry C, Peikert C, Vaikuntanathan V (2008) Trapdoors for hard lattices and new cryptographic constructions. In: Proceedings of the ACM symposium on theory of computing, pp 197–206
Gordon SD, Katz J, Vaikuntanathan V (2010) A group signature scheme from lattice assumptions. In: Advances in cryptology - ASIACRYPT, pp 395–412
Gu C, Zheng Y, Kang F, Xin D (2015) Keyword search over encrypted data in cloud computing from lattices in the standard model. In: Cloud computing and big data - second international conference, CloudCom-Asia, pp 335–343
Huang Q, Li H (2017) An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks. Inf Sci 403:1–14
Li Y, Gai K, Ming Z, Zhao H, Qiu M (2016) Intercrossed access controls for secure financial services on multimedia big data in cloud systems. ACM Trans Multim Comput Commun Appl 12(4s):67:1–67:18
Regev O (2009) On lattices, learning with errors, random linear codes, and cryptography. J ACM 56(6):34:1–34:40
Rhee HS, Park JH, Susilo W, Lee DH (2010) Trapdoor security in a searchable public-key encryption scheme with a designated tester. J Syst Softw 83(5):763–771
Shao J, Cao Z, Liang X, Lin H (2010) Proxy re-encryption with keyword search. Inf Sci 180(13):2576–2587
Sood SK (2020) Mobile fog based secure cloud-iot framework for enterprise multimedia security. Multim Tools Appl 79(15-16):10717–10732
Sun L, Xu C, Zhang M, Chen K, Li H (2018) Secure searchable public key encryption against insider keyword guessing attacks from indistinguishability obfuscation, SCIENCE, CHINA. Inf Sci 61(3):038106:1–038106:3
Wang H, Wu S, Chen M, Wang W (2014) Security protection between users and the mobile media cloud. IEEE Commun Mag 52(3):73–79
Wang XA, Huang X, Yang X, Liu L, Wu X (2012) Further observation on proxy re-encryption with keyword search. J Syst Softw 85(3):643–654
Xu L, Li J, Chen X, Li W, Tang S, Wu H (2019) Tc-pedcks: Towards time controlled public key encryption with delegatable conjunctive keyword search for internet of things. J Netw Comput Appl 128:11–20
Xu L, Yuan X, Steinfeld R, Wang C, Xu C (2019) Multi-writer searchable encryption: An lwe-based realization and implementation. In: Asia conference on computer and communications security, AsiaCCS, pp 122–133
Yang Y, Ma M (2016) Conjunctive keyword search with designated tester and timing enabled proxy re-encryption function for e-health clouds. IEEE Trans Inf Forensic Secur 11(4):746–759
Yang Y, Zheng X, Chang V, Tang C (2017) Semantic keyword searchable proxy re-encryption for postquantum secure cloud storage. Concurr Comput 29(19)
Yang Y, Zheng X, Chang V, Ye S, Tang C (2018) Lattice assumption based fuzzy information retrieval scheme support multi-user for secure multimedia cloud. Multimedia Tools Appl 77(8):9927–9941
Zhang X, Xu C (2018) Trapdoor security lattice-based public-key searchable encryption with a designated cloud server. Wirel Pers Commun 100 (3):907–921
Zhang X, Xu C, Wang H, Zhang Y, Wang S (2019) Fs-peks: lattice-based forward secure public-key encryption with keyword search for cloud-assisted industrial internet of things. IEEE Trans Dependable Secure Comput. https://doi.org/10.1109/TDSC.2019.2914117
Acknowledgment
The authors would like to thank the support from Fundamental Research Funds for the Central Universities (No.30918012204), China. The authors also gratefully acknowledge the helpful comments and suggestions of other researchers for improving the presentation.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Yu, X., Xu, C., Dou, B. et al. Multi-user search on the encrypted multimedia database: lattice-based searchable encryption scheme with time-controlled proxy re-encryption. Multimed Tools Appl 80, 3193–3211 (2021). https://doi.org/10.1007/s11042-020-09753-1
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-020-09753-1