Skip to main content
Log in

CP-ABSEL: Ciphertext-policy attribute-based searchable encryption from lattice in cloud storage

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Ciphertext-policy attribute-based searchable encryption (CP-ABSE) is widely used in the cloud environment to provide data privacy and fine-grained access control over encrypted data. The existing CP-ABSE schemes are designed based on bilinear pairing hardness assumptions to prove their security. However, these schemes are vulnerable to quantum attacks, i.e., adversaries can break the security of these schemes with the use of quantum computers. To address this issue, in this paper, we propose a novel ciphertext-policy attribute-based searchable encryption from lattice (CP-ABSEL) in cloud storage, since lattice-based cryptography is quantum attacks free. In CP-ABSEL, we adopted learning with errors (LWE) hardness assumption to resist from quantum attacks. Further, CP-ABSEL is indistinguishable against the chosen keyword attack and indistinguishable against chosen plaintext attack. Moreover, CP-ABSEL allows only legitimate users to perform a keyword search over an encrypted index, and unauthorized users cannot get even the ciphertext form of documents. The performance analysis proves that CP-ABSEL is efficient and practical.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

References

  1. Chang V (2014) The business intelligence as a service in the cloud. Future Gener Comput Syst 37:512–534

    Article  Google Scholar 

  2. Varri U, Pasupuleti S, Kadambari K (2019) A scoping review of searchable encryption schemes in cloud computing: taxonomy, methods, and recent developments. J Supercomput 76:1–30

    Google Scholar 

  3. Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE symposium on security and privacy. S&P 2000. IEEE, pp 44–55

  4. Cash D, Jaeger J, Jarecki S, Jutla CS, Krawczyk H, Rosu MC, Steiner M (2014) Dynamic searchable encryption in very-large databases: data structures and implementation. In: NDSS, Citeseer, vol 14, pp 23–26

  5. Goh EJ (2003) Secure indexes. IACR Cryptology ePrint Archive 2003:216

  6. Du M, Wang Q, He M, Weng J (2018) Privacy-preserving indexing and query processing for secure dynamic cloud storage. IEEE Trans Inf Forensics Secur 13(9):2320–23352

    Article  Google Scholar 

  7. Li J, Ma R, Guan H (2015) Tees: an efficient search scheme over encrypted data on mobile cloud. IEEE Trans Cloud Comput 5(1):126–139

    Article  Google Scholar 

  8. Zhang W, Lin Y, Qi G (2015) Catch you if you misbehave: ranked keyword search results verification in cloud computing. IEEE Trans Cloud Comput 6(1):74–86

    Article  Google Scholar 

  9. Miao Y, Ma J, Jiang Q, Li X, Sangaiah AK (2018) Verifiable keyword search over encrypted cloud data in smart city. Comput Electric Eng 65:90–101

    Article  Google Scholar 

  10. Liang K, Susilo W (2015) Searchable attribute-based mechanism with efficient data sharing for secure cloud storage. IEEE Trans Inf Forensics Secur 10(9):1981–1992

    Article  Google Scholar 

  11. Zheng Q, Xu S, Ateniese G (2014) Vabks: verifiable attribute-based keyword search over outsourced encrypted data. In: IEEE INFOCOM 2014-IEEE conference on computer communications. IEEE, pp 522–530

  12. Sun W, Yu S, Lou W, Hou YT, Li H (2016) Protecting your right: verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. IEEE Trans Parallel Distrib Syst 27(4):1187–1198

    Article  Google Scholar 

  13. Khader D (2014) Attribute based search in encrypted data: Abse. In: Proceedings of the 2014 ACM workshop on information sharing & collaborative security. ACM, pp 31–40

  14. Han F, Qin J, Zhao H, Hu J (2014) A general transformation from kp-abe to searchable encryption. Future Gener Comput Syst 30:107–115

    Article  Google Scholar 

  15. Yang K, Zhang K, Jia X, Hasan MA, Shen XS (2017) Privacy-preserving attribute-keyword based data publish-subscribe service on cloud platforms. Inf Sci 387:116–131

    Article  MathSciNet  Google Scholar 

  16. Li J, Lin X, Zhang Y, Han J (2016) Ksf-oabe: outsourced attribute-based encryption with keyword search function for cloud storage. IEEE Trans Serv Comput 10(5):715–725

    Article  Google Scholar 

  17. Wang N, Fu J, Bhargava BK, Zeng J (2018) Efficient retrieval over documents encrypted by attributes in cloud computing. IEEE Trans Inf Forensics Secur 13(10):2653–2667

    Article  Google Scholar 

  18. Miao Y, Ma J, Liu X, Li X, Liu Z, Li H (2017) Practical attribute-based multi-keyword search scheme in mobile crowdsourcing. IEEE Internet Things J 5(4):3008–3018

    Article  Google Scholar 

  19. Miao Y, Ma J, Liu X, Li X, Jiang Q, Zhang J (2020) Attribute-based keyword search over hierarchical data in cloud computing. IEEE Trans Serv Comput 13(6):985–998

    Google Scholar 

  20. Cui H, Wan Z, Deng RH, Wang G, Li Y (2016) Efficient and expressive keyword search over encrypted data in cloud. IEEE Trans Depend Secure Comput 15(3):409– 422

    Article  Google Scholar 

  21. Wang H, Dong X, Cao Z (2020) Multi-value-independent ciphertext-policy attribute based encryption with fast keyword search. IEEE Trans Serv Comput 13(6):1142–1151

    Article  Google Scholar 

  22. Miao Y, Ma J, Liu X, Weng J, Li H, Li H (2019) Lightweight fine-grained search over encrypted data in fog computing. IEEE Trans Serv Comput 12:772–785

    Article  Google Scholar 

  23. Escala A, Herold G, Kiltz E, Rafols C, Villar J (2017) An algebraic framework for diffie–hellman assumptions. J Cryptol 30(1):242–288

    Article  MathSciNet  Google Scholar 

  24. Chen L, Chen L, Jordan S, Liu YK, Moody D, Peralta R, Perlner R, Smith-Tone D (2016) Report on post-quantum cryptography. US Department of Commerce, National Institute of Standards and Technology

  25. Behnia R, Ozmen MO, Yavuz AA (2020) Lattice-based public key searchable encryption from experimental perspectives. IEEE Trans Depend Secure Comput 17(6):1269–1282

    Article  Google Scholar 

  26. Zhang X, Xu C, Mu L, Zhao J (2018) Identity-based encryption with keyword search from lattice assumption. China Commun 15(4):164–178

    Article  Google Scholar 

  27. Kuchta V, Markowitch O (2016) Multi-authority distributed attribute-based encryption with application to searchable encryption on lattices. In: International conference on cryptology in Malaysia. Springer, pp 409–435

  28. Liu L, Wang S, He B, Zhang D (2019) A keyword-searchable abe scheme from lattice in cloud storage environment. IEEE Access 7:109038–109053

    Article  Google Scholar 

  29. Regev O (2009) On lattices, learning with errors, random linear codes, and cryptography. J ACM (JACM) 56(6):34

    Article  MathSciNet  Google Scholar 

  30. Micciancio D (2011) Lattice-based cryptography. Encyclopedia of Cryptography and Security

  31. Agrawal S, Boneh D, Boyen X (2010) Efficient lattice (h) ibe in the standard model. In: Annual international conference on the theory and applications of cryptographic techniques. Springer, pp 553–572

  32. Gentry C, Peikert C, Vaikuntanathan V (2008) Trapdoors for hard lattices and new cryptographic constructions. In: Proceedings of the fortieth annual ACM symposium on theory of computing. ACM, pp 197–206

  33. Peikert C (2009) Public-key cryptosystems from the worst-case shortest vector problem. In: Proceedings of the forty-first annual ACM symposium on theory of computing. ACM, pp 333–342

  34. Cash D, Hofheinz D, Kiltz E, Peikert C (2010) Bonsai trees, or how to delegate a lattice basis. In: Annual international conference on the theory and applications of cryptographic techniques. Springer, pp 523–552

  35. Regev O (2006) Lattice-based cryptography. In: Annual international cryptology conference. Springer, pp 131–141

  36. Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM conference on Computer and communications security, pp 89–98

  37. Gür KD, Polyakov Y, Rohloff K, Ryan GW, Sajjadpour H, Savaş E (2018) Practical applications of improved gaussian sampling for trapdoor lattices. IEEE Trans Comput 68(4):570–584

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Uma Sankararao Varri.

Ethics declarations

Conflict of interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Varri, U.S., Pasupuleti, S.K. & Kadambari, K.V. CP-ABSEL: Ciphertext-policy attribute-based searchable encryption from lattice in cloud storage. Peer-to-Peer Netw. Appl. 14, 1290–1302 (2021). https://doi.org/10.1007/s12083-020-01057-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-020-01057-3

Keywords

Navigation