Skip to main content
Log in

Privacy Preserving Time Efficient Access Control Aware Keyword Search Over Encrypted Data on Cloud Storage

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Cloud computing delivers storage service to users accessed via Internet. Infrastructure used to store outsourced data is under the control of the cloud service provider. The extensive use of virtualization technology in infrastructure leads to security concern for users using public storage service. Hence, data confidentiality becomes a primary challenge in the cloud environment. Development of new technologies to protect data privacy and to provide processing capabilities to the data storage is the current requirement. This paper proposes a novel approach for access control aware keyword search over encrypted. The proposed Ciphertext-Policy Attribute-Based Keyword Search scheme allows only the authorized data users to search data stored on cloud. Encrypted index set stored along with the ciphertext on provider storage. Index set is partitioned over index server to perform parallel search. The proposed model ensures the confidentiality of data and then returns only ranked documents that match the query given by data requester. The experimental result shows that the search time reduces when using term-partitioned index set. Also, ensures security by allowing search on encrypted data without leaking any information to cloud server.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Zissis, D., & Lekkas, D. (2012). Addressing cloud computing security issues. Future Generation computer systems, 28(3), 583–592.

    Article  Google Scholar 

  2. Pfleeger, C. P., & Pfleeger, S. L. (2002). Security in computing. Upper Saddle River: Prentice Hall.

    MATH  Google Scholar 

  3. Song, D. X., Wagner, D., & Perrig, A. (2000). Practical techniques for searches on encrypted data. In Proceedings of 2000 IEEE symposium on security and privacy, 2000. S P 2000 (pp. 44–55).

  4. Goh, E.-J. (2003). Secure indexes, Cryptology ePrint Archive, Report 2003/216.

  5. Curtmola, R., Garay,J., Kamara, S., & Ostrovsky, R. (2006). Searchable symmetric encryption: improved definitions and efficient constructions. In Proceedings of the 13th ACM conference on computer and communications security, CCS’06, ACM, New York, NY, USA (pp. 79–88).

  6. Liu, Q., Wang, G., & Wu, J. (2009). An efficient privacy preserving keyword search scheme in cloud computing. In: International conference on computational science and engineering, CSE’09 (Vol. 2, pp. 715–720).

  7. Boneh, D., Di Crescenzo, G., Ostrovsky, R., & Persiano, G. (2004). Public key encryption with keyword search. In C. Cachin & J. Camenisch (Eds.), Advances in cryptology—EUROCRYPT’04 (Vol. 3027, pp. 506–522)., Lecture notes in computer science Heidelberg: Berlin.

    Google Scholar 

  8. Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., et al. (2005). Searchable encryption revisited: consistency properties, relation to anonymous ibe, and extensions. In V. Shoup (Ed.), Advances in cryptology, CRYPTO’05 (Vol. 3621, pp. 205–222)., Lecture notes in computer science Heidelberg: Berlin.

    Google Scholar 

  9. Chang, Y.-C., & Mitzenmacher, M. (2005). Privacy preserving keyword searches on remote encrypted data. In J. Ioannidis, A. Keromytis, & M. Yung (Eds.), Applied cryptography and network security (Vol. 3531, pp. 391–421)., Lecture notes in computer science Heidelberg: Berlin.

    Chapter  Google Scholar 

  10. Wang, C., Cao, N., Li, J., Ren, K., & Lou, W. (2010). Secure ranked keyword search over encrypted cloud data. In The 30th international conference on distributed computing systems, ICDCS’10 (pp. 253–262).

  11. Li, J., Wang, Q., Wang, C., Cao, N., Ren,K., & Lou, W. (2010). Fuzzy keyword search over encrypted data in cloud computing. In IEEE conference on computer communications, INFOCOM’10 (pp. 1–5).

  12. Sun, W., Wang, B., Cao, N., Li, M., Lou, W., Hou, Y. T., et al. (2014). Verifiable privacypreserving multi-keyword text search in the cloud supporting similaritybased ranking. IEEE Transactions on Parallel and Distributed Systems,25(1), 222–233.

    Article  Google Scholar 

  13. Wang, C., Cao, N., Li, J., Ren, K., & Lou, W. (2010). Secure ranked keyword search over encrypted cloud data. In Proceedings of ICDCS (pp. 253–262).

  14. Wang, B., Yu, S., Lou, W., & Hou, Y. (2014). Privacy-preserved multi-keyword fuzzy search over encrypted data in the cloud. In Proceedings of INFOCOM (pp. 2112–2120).

  15. Wong, W. K., Cheung, D. W., Kao, B., & Mamoulis, N. (2009). Secure knn computation on encrypted databases. In Proceedings of SIGMOD (pp. 139–152).

  16. Ruj, S., Stojmenovic, M., & Nayak, A. (2012). Privacy preserving access control with authentication for securing data in clouds. In 2012 12th IEEE/ACM international symposium on cluster, cloud and grid computing (CCGrid) (p. 556e63).

  17. Sahai, A., & Waters, B. (2005). Fuzzy identity-based encryption. In Springer EUROCRYPT 2005.

  18. Yu, S., Wang, C., Ren, K., & Lou, W. (2010). Achieving secure, scalable, and fine-grained data access control in cloud computing. In IEEE INFOCOM 2010.

  19. Boneh, D., & Franklin, M. (2001). Identity-based encryption from the weil pairing. In Springer CRYPTO 2001.

  20. Waters, B. (2011). Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. In Springer PKC 2011.

    Chapter  Google Scholar 

  21. Cheung, L., & Newport, C. (2007). Provably secure ciphertext policy abe. In ACM CCS 2007

  22. Han, F., Qin, J., Zhao, H., & Hu, J. (2014). A general transformation from KP-ABE to searchable encryption. Future Generation Computing Systems (FGCS),30, 107e15.

    Article  Google Scholar 

  23. Li, R., et al. (2014). Efficient multi-keyword ranked query over encrypted data in cloud computing. Future Generation Computer Systems,30, 179–190.

    Article  Google Scholar 

  24. Sun, W., Yu, S., Lou, W., Hou, Y., & Li, H. (2014). Protecting your right: Attribute-based keyword search with fine-grained owner-enforced search authorization in thecloud. In Proceedings of INFOCOM (pp. 226–234).

  25. Liang, Kaitai, & Susilo, Willy. (2015). Searchable attribute-based mechanism with efficient data sharing for secure cloud storage. IEEE Transactions on Information Forensics and Security,10(9), 1981–1992.

    Article  Google Scholar 

  26. Li, J., Lin, X., Zhang, Y., & Han, J. (2016). KSF-OABE: Outsourced attribute-based encryption with keyword search function for cloud storage. IEEE Transactions on Services Computing, 10(5), 715–725.

    Article  Google Scholar 

  27. Kaci, A., & Bouabana-Tebibel, T. (2014). Access control Reinforcement over searchable encryption. In The 15th IEEE international conference on information reuse and integration e IEEE IRI 2014, San Francisco, USA.

  28. Curtmola, R., Garay, J., Kamara, S., & Ostrovsky, R. Searchable symmetric encryption: improved definitions and efficient constructions. In Proceedings of the 13th ACM conference on computer and communications security (p. 79e88). New York, NY: ACM.

  29. Kaci, A., Bouabana-Tebibel, T., & Challal, Z. (2014). Access control aware search on the cloud computing. In The third international conference on advances in computing, communication and informatics e ICACCI 2014, New Delhi, India.

  30. Fan, C. I., & Huang, S. Y. (2013). Controllable privacy preserving search based on symmetric predicate encryption in cloud storage. Future Generation Computer Systems,29(7), 1716–1724.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to P. Shanthi.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shanthi, P., Umamakeswari, A. Privacy Preserving Time Efficient Access Control Aware Keyword Search Over Encrypted Data on Cloud Storage. Wireless Pers Commun 109, 2133–2145 (2019). https://doi.org/10.1007/s11277-019-06672-9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-019-06672-9

Keywords

Navigation