Searchable Attribute-Based Encryption Scheme over Cloud Data
Keywords:
Attribute-Based Encryption, Attributes Revocation, Fine-Grained Access Control, Keywords Search, Mobile Cloud Storage.Abstract
From the time in memorial, Information Security has remained a primary concern and today when most of the sensitive data is stored on Cloud with client organization having lesser control over the stored data, the fundamental way to fix this issue is to encrypt such data. So, a secure user-imposed data access control system must be given, before the users outsource any data to the cloud for storage. Attribute Based Encryption (ABE) system is one such asymmetric key based cryptosystem that has received much attention that provides fine-grained access control to data stored on the cloud. In this paper, we propose a more proficient and richer type of Attribute Based Encryption technique that not only considers the Outsourced ABE construction but also address the issue of revocation in case of user leaving the group or organization; once a user is removed from the group, the keys are updated and these new keys are distributed among the existing users also our system supports the Keyword search over encrypted data in the mobile cloud storage. In multi keyword search; data owners and users can generate the keywords index and search trapdoor, respectively, without relying on always online trusted authority. Experimental results prove that the performance of the proposed system is greater than existing system in terms of security, time consumption and memory utilization.
References
- SHANGPING WANG, DUO ZHANG, YALING ZHANG, AND LIHUA LIU, "Efficiently Revocable and Searchable Attribute-Based Encryption Scheme for Mobile Cloud Storage", IEEE Access Volume 6, June 2018.
- Y. Li, F. Zhou, Y. Qin, M. Lin, and Z. Xu, “Integrity-veri_able conjunctive keyword searchable encryption in cloud storage,'' Int. J. Inf. Secur., vol. 17, pp. 1_20, Nov. 2017, doi: 10.1007/s10207-017-0394-9.
- D. Cash, J. Jaeger, S. Jarecki, C. Jutla, H. Krawczyk, M.-C. Rosu, and M. Steiner, Dynamic searchable encryption in very large databases: Data structures and implementation, in Proc. of NDSS, vol. 14, 2014.
- J. Lai, R. Deng, C. Guan, and J. Weng, “Attribute-based Encryption with Verifiable Outsourced Decryption”, IEEE Trans. Inf. Forensics Security, vol. 8, no. 8, pp. 1343-1354, Aug. 2013.
- M. Green, S. Hohenberger, and B.Waters, “Outsourcing the decryption of ABE ciphertexts,'' in Proc. 20th USENIX Conf. Secur. (SEC). Berkeley, CA, USA: USENIX Association, 2011, p. 34.
- S. Yu, C. Wang, K. Ren, and W.Lou, “Achieving Secure, Scalable, Fine-Grained Data Access Control in Cloud Computing”, in Proc. IEEE 29th INFOCOM, 2010, pp. 534-542.
- L. Cheung and C. Newport, “Provably Secure Ciphertext Policy ABE”, in Proc. 14th ACM Conf. CCS, 2007, pp. 456- 465.
- V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute- Based Encryption for Fine-Grained Access Control of Encrypted Data,” in Proc. 13th ACM Conf. Comput. Commun. Security, 2006, pp. 89-98
- R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, Searchable symmetric encryption: improved definitions and efficient constructions, in Proceedings of the 13th ACM conference on Computer and communications security. ACM, 2006, pp. 79-88.
- A. Sahai and B. Waters, “Fuzzy Identity-Based Encryption”, in Proc. Adv. Cryptol.- EUROCRYPT, LNCS 3494, R. Cramer, Ed., Berlin, Germany, 2005, pp. 457-473, Springer- Verlag.
- D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano, Public key encryption with keyword search, in Advances in Cryptology- Eurocrypt 2004. Springer, 2004, pp. 506-522.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRST

This work is licensed under a Creative Commons Attribution 4.0 International License.