Skip navigation

Privacy-protecting attribute-based conjunctive keyword search scheme in Cloud storage

Privacy-protecting attribute-based conjunctive keyword search scheme in Cloud storage

Chen, Yang, Liu, Yang, Pan, Jin, Gao, Fei and Panaousis, Emmanouil ORCID logoORCID: https://orcid.org/0000-0001-7306-4062 (2023) Privacy-protecting attribute-based conjunctive keyword search scheme in Cloud storage. Journal of Internet Technology, 24 (1):2840. pp. 65-75. ISSN 1607-9264 (Print), 2079-4029 (Online) (doi:10.53106/160792642023012401007)

[thumbnail of Publisher VoR]
Preview
PDF (Publisher VoR)
41658_PANAOUSIS_Privacy_Protecting_Attribute_Based_Conjunctive_Keyword_Search_Scheme_in_Cloud_Storage.pdf - Published Version
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download (1MB) | Preview

Abstract

Cloud storage has been deployed in various real-world applications. But how to enable Internet users to search over encrypted data and to enable data owners to perform fine- grained search authorization are of huge challenge. Attribute-based keyword search (ABKS) is a well-studied solution to the challenge, but there are some drawbacks that prevent its practical adoption in cloud storage context. First, the access policy in the index and the attribute set in the trapdoor are both in plaintext, they are likely to reveal the privacy of data owners and users. Second, the current ABKS schemes cannot provide multi-keyword search under the premise of ensuring security and efficiency. We explore an efficient way to connect the inner product encryption with the access control mechanism and search process in ABKS, and propose a privacy-protecting attribute- based conjunctive keyword search scheme. The proposed scheme provides conjunctive keyword search and ensures that the access policy and attribute set are both fully hidden. Formal security models are defined and the scheme is proved IND-CKA, IND-OKGA, access policy hiding and attribute set hiding. Finally, empirical simulations are carried out on real-world dataset, and the results demonstrate that our design outperforms other existing schemes in security and efficiency.

Item Type: Article
Uncontrolled Keywords: ABKS; hidden access policy; hidden attribute set; conjunctive keyword search; Cloud storage
Subjects: H Social Sciences > HD Industries. Land use. Labor > HD61 Risk Management
Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Q Science > QA Mathematics > QA76 Computer software
Faculty / School / Research Centre / Research Group: Faculty of Engineering & Science
Faculty of Engineering & Science > School of Computing & Mathematical Sciences (CMS)
Related URLs:
Last Modified: 04 Oct 2023 12:29
URI: http://gala.gre.ac.uk/id/eprint/41658

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year

View more statistics