Revocable Attribute-Based Encryption for Multi-Keyword Search in Clouds
←
→
Page content transcription
If your browser does not render page correctly, please read the page content below
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 Revocable Attribute-Based Encryption for Multi-Keyword Search in Clouds Chun-I Fan, Si-Jing Wu, and Yi-Fan Tseng∗ Abstract—With the rapid advancement of cloud computing, users upload their files to the cloud server so that any user can access it remotely. To assure the data security, the data owner, typically, encrypts the data before outsourcing them to the cloud server. In addition, an encryption mechanism needs to enable … … … the consumers to perform efficient searches of such encrypted Data User 1 data in the cloud storages through keywords, i.e. searchable encryption. However, most of searchable encryption is improper due to several limitations, such as the requirement of an on- Data User 2 line fully trusted third party, poor efficiency, high-overhead in … user revocation, support of a single keyword search, etc. To Encrypted Files Keyword Search mitigate such limitations, an attribute-based encryption scheme Data User m with fine-grained multi-keyword search is proposed. The new Data Owner scheme supports the user revocation. In addition, the length of the ciphertext as well as the secret key do not grow linearly under Fig. 1. The Scenario about the File Sharing in Clouds. the influence of the size of attribute set. The performance of the proposed scheme is better as compared to other related schemes. Hence, one can easily adopt the proposed scheme for the real life applications due to its flexibility in terms of its features, security is allowed to search for encrypted files without revealing any and efficiency. information in keywords or plaintext data because the data Index Terms—Attribute-Based Encryption, Multi-Keyword owner can encrypt the potential keywords before uploading Search, User Revocation, Fine-Grained Search, Clouds them with encrypted files. To avoid information leakage of keywords during searching the encrypted data, Boneh et al. [2] in 2004 presented a concept of public key encryption I. Introduction with single-keyword search system (PEKS) which can be ITH the expansion of cloud computing, more and more W users upload data to cloud servers, which makes cloud storage services play an important role in modern society. adopted in the public key setting. Unfortunately, the scheme failed to achieve fine-grained access control on encrypted files. Thereafter, Li et al. [3] in 2010 proposed a fuzzy keyword Since the classified information is outsourced to cloud servers, search scheme using matching approximation of the classified data owners often concern about the privacy of their data. data and the embedded keywords. For practical usability, As a result, data owners encrypt their private data before Cao et al. [4] in 2014 presented a multi-keyword sequence outsourcing them to cloud servers. On the other hand, how the search scheme, which enables data users to search in multiple data users use keywords to effectively search for the required keywords and receive results sorted by relevance. In 2015, information in a large number of encrypted files is also an Zheng et al. [5] proposed a certificateless keyword search important issue. We show the mentioned scenario in Figure scheme, but the scheme does not support the fine-grained 1. For the sake of keeping cloud servers from knowing any search. In order to make the solutions more suitable for cloud keyword information, the establishment of the credential data servers, there are some key security challenges in terms of keyword index is regarded as a basic means. Such a technique enhancing the search efficiency, search capabilities, and system can be adopted in a class of cryptographic primitives called security. searchable encryption. To provide flexibleness for accessing files, most applications Searchable encryption (SE) was primarily introduced use sophisticated access control mechanisms. Due to the by Song et al. [1] in 2000. In an SE scheme, a cloud server fine-grained access control policy, attribute-based encryption (ABE) scheme is appropriate for the purpose mentioned above. Chun-I Fan is with the Department of Computer Science and Engineer- ing and the Information Security Research Center, National Sun Yat-sen Sahai and Waters [6] in 2005 primarily introduced the concept University, Kaohsiung 804, Taiwan, and also with the Intelligent Electronic of ABE, which enables users to implement fine-grained access Commerce Research Center, National Sun Yat-sen University, Kaohsiung 804, controls on the encrypted sensitive data. Following their pre- Taiwan, e-mail: cifan@mail.cse.nsysu.edu.tw. Si-Jing Wu is with the Department of Computer Science and Engi- cursory work, Goyal et al. [7] in 2006 presented two different neering, National Sun Yat-sen University, Kaohsiung 804, Taiwan, e-mail: types of ABE: key-policy ABE (KP-ABE) and ciphertext- jim5566556@gmail.com. policy ABE (CP-ABE). In KP-ABE schemes, each user’s Yi-Fan Tseng is with the Department of Computer Science, National Chengchi University, Taipei 11605, Taiwan, e-mail: private key is related to an access policy, and the ciphertext yftseng@cs.nccu.edu.tw(∗ The corresponding author). is associated with a set of attributes. A secret key can be
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 2 used to decrypt a ciphertext if and only if the attribute set A. Contributions associated with the ciphertext satisfies the access policy related Our construction is inspired by a selective-ID secure to the user’s private key. The situation in CP-ABE schemes is identity-based encryption (IBE) scheme presented by Boneh the opposite. For multiple data users in a system sharing the et al. [14] in 2004. We focus on the challenges in ABKS confidential information, CP-ABE is more flexible than KP- scheme we mentioned above and design revocable CP-ABE ABE owing to the nature of CP-ABE. Hence, we focus on the scheme with the fine-grained multi-keyword search. It supports ciphertext-policy setting in our work. not only constant-size secret key but also efficient decryption Based on the concept of ABE, Sun [8] and Zheng [9] with only one pairing, which realizes a more flexible imple- in 2014 independently presented attributed-based encryption mentation. keyword search (ABKS) schemes that enable the data owner to decide the policy, which is related to the decision of whether II. Preliminaries a data user can decrypt and search the keyword as shown In this section, we review the background knowledge about in Figure 2. However, there are three challenges in ABKS our scheme along with the properties of bilinear maps. Be- schemes needed to be addressed; first, how to prevent revoked sides, we discuss the related mathematical assumptions and users from decrypting files; second, how to avoid the size the access control structure in the scheme. of the secret key and ciphertext increasing linearly with the number of attributes; third, how to search for the information effectively in the vast amount of data. To be implemented in A. Bilinear Maps the multi-owner application, Miao et al. [10] in 2016 proposed In this section, we define the bilinear maps with its essential an ABKS scheme that supports multi-keyword search. Nev- properties. ertheless, the scheme fails to protect the private information about the access policy. For the sake of protecting the classified Definition II.1. Let G and G be multiplicative cyclic groups information in the ciphertext, Li et al. [11] in 2017 presented of prime order , and be a generator of G. A bilinear map an ABKS scheme with partially hidden access structures. ∶ G × G → G satisfies the following properties: Subsequently, Huang et al. [12] presented an ABKS which ● Bilinearity: ( , ) = ( , ) , and , ∈ Z . can be implemented in a multi-server environment and secured ● Non-Degeneracy: ( , ) ≠ 1 against the adaptive chosen keyword attack. However, the size ● Computability: There exists an efficient algorithm to of a ciphertext and a secret key is proportional to the number compute . of the attributes. To improve the efficiency when searching in a large database, Wang et al.[13] in 2018 proposed a multi- B. Access Structure keyword search scheme which supports attribute revocation. Nonetheless, it still exists the issue of high overhead of the In the proposed scheme, we use a series of "AND gates" searching time. on multi-value attributes as an access control structure. Definition II.2. Let the total number of attributes be . Let = { 1 , 2 , ..., } be the universe attribute list, = { ,1 , ,2 , ..., , } be a set of possible values for , where is the number of the possible values for . Let = { 1 , 2 , ..., } be the attribute list for a data user, where ∈ , and = { 1 , 2 , ..., } be an access structure in the ciphertext, where ∈ . We denote that the user attribute list satisfies the access policy if and only if = , for all ∈ [1, ]. We give a example for the better comprehension of the access structure we use. Consider a university as the sce- nario. In such scenario, the universe attribute list would be = ( 1 , 2 , 3 ) = (“Department”, “Position”, “Gender”). The possible values of 1 =“Deparment” would be (“CS”, Fig. 2. The Scenario about the ABKS Scheme. “EE”, . . . ), and the possible values of 2 =“Position” would be (“Professor”, “Student”, . . . ). An access structure would be like =(“Department”=“CS”, “Position”=“Professor”). A To mitigate the aforementioned security aspects, we user with attribute list (“CS”, “Position”, “Male”) or (“CS”, propose a revocable attribute-based encryption with multi- “Position”, “Female”) will satisfy the access structure . How- keyword search scheme. The length of ciphertext and secret ever, a user with attribute list (“EE”, “Student”, “Male”) will key in our scheme does not grow linearly with the number not pass the access structure. Besides, the attribute “name”, of the users’ attributes and we achieve higher efficiency for i.e. “Deparment” and “Position”, will be appended in the decryption because of using only one pairing. Thus, our ciphertext, only the values, “CS” and “professor”, will be scheme is more suitable for real-world cloud environments. hidden. The reason of this setting is that we want to achieve
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 3 more flexible access structure. If the attribute “name” is hidden 5) Phase 2: The queries here are similar to the ones in as well, then all the values of a user must fit the values of the Phase 1. A continues to query with the restriction that access structure. In such case, the access structure shown in the ID ≠ ID∗ . above scenario, i.e. “professor of CS department, regardless of 6) Guess: A outputs a guess as ′ ∈ {0, 1}. A wins the gender”, cannot be achieved if the attribute “name” is hidden game if ′ = . as well. In the game, we define the advantage of A in winning the game as follows: C. The Generalized DDH Assumption 1 IND-sID-CPA = Pr ′ = − . A In this section, we show the definition of the generalized 2 decisional Diffie-Hellman assumption [15] . If IND-sID-CPA is negligible for every polynomial-time A, A Definition II.3. Given ( , , , , ) for , , ∈ Z and the identity-based encryption scheme is said to be IND-sID- ∈ G, decide whether = or a uniformly random ele- CPA secure. ment in G. A polynomial-time adversary A has an advantage in solving the generalized decisional Diffie-Hellman problem E. Revocable Attribute-Based Encryption with Keyword if Search and its Security Model Pr[C ( , , , , = )] − Pr[C ( , , , , = )] ≥ . We define the attribute set as = { 1 , 2 , ..., } corre- sponding to the values of the attributes named 1, ..., , and the keyword set as = { 1 , 2 , ..., } corresponding to D. Identity-Based Encryption (IBE) and its Security Model the values of the keywords named 1, ..., . Now, we define Since the proposed work is motivated from selective-ID a revocable attributed-based encryption scheme with keyword secure IBE scheme, we briefly define its four algorithms and search that contains eight algorithms as follows: the underlined security model below. ● Setup(1 , ): The algorithm takes as inputs a security ● Setup(1 ): The algorithm takes as inputs a security parameter 1 and a universe set of attributes . The parameter 1 . The private key generator (PKG) executes attribute authority runs it to outputs the public parameters this algorithm to output the public parameter and , and the secret parameters . the secret key . ● KeyGen( , , ): The algorithm takes as inputs the ● KeyGen( , ): The algorithm takes as inputs the secret parameters , a set of user attributes , and secret key and the public key . The PKG runs it the public parameters . The data user runs it to outputs to output the secret key related to the given identity. the secret key , which involves the information of data ● Encrypt( , , ): The algorithm takes as inputs user’s attributes. the public parameters , and a message file under ● Encrypt( , , , ): The algorithm takes as inputs the the public key ∈ Z . The data owner runs it to output public parameters , a message file , the value of a ciphertext . keywords set extracted from , and an access policy ● Decrypt( , ): The algorithm takes as inputs the ci- . The data owner runs it to outputs a ciphertext ℎ , phertext and the secret key . The data user runs it which contains the information of the access policy. to output the message file . ● TokenGen( ′ , , ): The algorithm takes as inputs the interested keywords set ′ where ′ is the value of Next we provide the IND-sID-CPA (indistinguishable se- the keyword named for each ′ ∈ ′ , the secret key lective identity-chosen plaintext attacks) security model for an , and the public parameters . The data user runs it IBE scheme [14] which our scheme inherits to construct the to outputs a search token . proposed scheme. ● Search( , ): The algorithm takes as inputs the search Definition II.4 (IND-sID-CPA Security for IBE). token and the keyword index . If the user attribute set satisfies the access policy and ′ ⊆ , the cloud 1) Initialization: The adversary A outputs a target identity server checks the keyword names and runs the algorithm to the challenger C. ∗ to verify the values of the keywords. 2) Setup: C runs Setup algorithm to produce public param- ● Decrypt( , ): The algorithm takes as inputs a ci- eters and a master secret key, while sending the public phertext and the secret key . The data user runs it parameters to A. to output the message . 3) Phase 1: A is able to issue queries polynomially to C ● PKUpd( , ): The algorithm takes as inputs the re- for private keys, and C responds by running KeyGen voked user attribute , and the secret number for each algorithms with the restriction that ID ≠ ID and then ∗ non-revoked user’s attributes , for ∈ [1, ..., ]. The sends the results to A. attribute authority runs it to output the revocation list 4) Challenge: A commits two equal-length messages 0 , an updated key , and an updated secret number and 1 where 0 ≠ 1 . C randomly selects ∈ {0, 1}, , for ∈ [1, ..., ]. and runs Encrypt algorithm to send the ciphertext ● SKUpd( , , ): The algorithm takes as inputs ℎ = ( , ID∗ , ) to A. the revocation list , the updated secret number ,
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 4 for ∈ [1, ..., ], and the original secret key for the for each attribute , ∈ [1, . . . , ]. Compute = non-revoked user. The attribute authority runs it to output , ∈ [1, ] as the public attribute key. It outputs the the updated secret key for the non-revoked user. public parameters as = ( , ℎ, , , , , { } ∈[1, ] ) Next, we give the security model for the revocable and the master secret key as = ( , , { } ∈[1, ] ). attributed-based encryption with keyword search. We define Then it publicizes and keeps secret. the IND-CPA security game for an ABKS scheme as follows. ● KeyGen( , , ) → . Taking the master se- cret key , and a set of a user’s attributes = Definition II.5 (IND-CPA Security for ABKS). { 1 , . . . , }, where ∈ for = 1 to as inputs, the attribute authority select ∈ Z randomly. It then 1) Initialization: The adversary A outputs a target access computes policy ∗ to the challenger C. 1 2) Setup: C runs Setup algorithm to produce public param- Í 1 = + + =1 ( ) , eters and a master secret key, while sending the public 1 parameters to A. Í + + =1 ( ) , 3) Phase 1: A is able to issue polynomially a number of 2 = ℎ 1 queries to C for private keys by issuing ( , ). If the Í user attribute doesn’t satisfy the access policy ∗ , C 3 = + + =1 ( ) . runs KeyGen algorithm to gain the private key and It outputs the secret key as = ( , 1 , 2 , 3 ) which is sends it to A. related to the attribute set . 4) Challenge: A commits two equal-length messages 0 ● Encrypt( , , , ) → ℎ . Taking the public pa- and 1 with the keyword set ∗ . Now, C randomly rameters , a message file , a keywords value set selects ∈ {0, 1}, and runs Encrypt algorithm with = { 1 , ... } where is the value of keyword ∗ , ∗ ), where to obtain the overall ciphertext ∗ ℎ = ( , the access policy = { 1 , . . . , }, and the public ∗ ∗ is the index of keyword set and is the ciphertext attribute keys { } ∈[1, ] as inputs, the data owner component, then sends ∗ ℎ to A. selects 1 , 2 , ∈ Z randomly, and computes 5) Phase 2: The queries here are similar to the ones in = ⋅ ( , ) , phase 1. A continues to query with the restriction that ( ) , Î 1 = =1 A can’t query the same access policy as ∗ . 6) Guess: A outputs a guess as ′ ∈ {0, 1}. A wins the 1 2Î= , 2 ( ) game if ′ = . 3, = ℎ =1 ( ) , ∈ [1, ], In the game, we define the advantage of A in winning the 4 = 2 , game as follows: 5 = 1 , 6 = 2 . 1 IND-CPA = Pr ′ = − . A Then the data owner outputs the ciphertext corresponding 2 to the access policy as ℎ = ( , ) such that = If IND-CPA A is negligible for every polynomial-time A, the ( , 1 , 2 ) and = ({ 3, } ∈[1, ] , 4 , 5 , 6 ). revocable attributed-based encryption with keyword search is ● TokenGen( ′ , , , ) → . Taking a set of in- said to be IND-CPA secure. terested keyword values ′ = { ′1 , ... ′ }, where ′ is the value of keyword and is the number of the interested keywords, the user secret key , and the III. Our Construction public parameters as inputs, the data user selects In this section, we present a revocable attribute-based ∈ Z randomly, and computes scheme with multi-keyword search. Our scheme consists 1 = 3 , ( ′) of eight algorithms: , , , , Î 2 = ( =1 1 2 ) , ℎ, , , . 3 = , 4 = . A. The Proposed Scheme Then the data user outputs the search token as In this subsection, we describe the details of the proposed scheme as follows. = ( 1 , 2 , 3 , 4 , ). ● Setup(1 , ) → ( , ). Taking a security param- ● Search( , , , ) → 0 or 1. Taking the search eter 1 , a universe set of attributes = { 1 , 2 , ..., } token corresponding to the data user’s attribute set , as inputs, the attribute authority let G and G be the the ciphertext component corresponding to the access multiplicative cyclic groups of prime order , and ∶ policy = { 1 , 2 , ..., }, the number of the interested G × G → G be a bilinear map. Then it chooses three keywords , and the public parameters as inputs, generators , ℎ, from G and select one collision-resistant the cloud server checks whether the following formula hash function: ∶ {0, 1}∗ → Z , , ∈ Z randomly. holds or not by comparing the access policy with the Compute = , = and select ∈ Z randomly attribute set ( i.e. = , for = 1, ..., ) to achieve
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 5 the purpose of fine-grained search. IV. Comparisons In this section, we compare the properties and performance ⋅ 4 4 , 1 ) Î ( =1 3, of our scheme with those of [16][8][17] in Table III and Table ? = ( 2 , 5 ) ⋅ ( 6 , 3 ). IV. Table IV shows that our scheme achieves fine-grained Output 1 if it holds. Otherwise, it outputs 0. multi-keyword search, user revocation, attributes independency ● Decrypt( , ) → . Taking the ciphertext com- and constant-size secret key, simultaneously. That is, a data ponent and the user secret key as inputs, the user is allowed to use multiple keywords to search for the data user computes the following formula to obtain the data efficiently with their attribute sets conformed to the access message file . policy. = . In order to simplify the case and evaluate the performance, ( 1 , 1 ⋅ 2 ) we have to make some assumptions. Based on [18], ● PKUpd( , , ) → ( , , ), for ∈ [1, ]. we have the assumptions shown in TABLE II and set Taking the revoked user attribute , the private parameter |G| = |GT | = |Z | = 256 bits on the environment with of the non-revoked user , and the public parameters Ubuntu 10.04 LTS OS, 2.6GHz Intel Celeron 64 bits PC, as inputs, the attribute authority adds a user’s id and 1 GB RAM. In addition, we make the assumption that whose attribute has been revoked to . For = 1, , the number of encrypted keywords is equal to the number if = , it selects ∈ Z randomly such that of search keywords and set the number of attributes used ≠ ; otherwise = . Then it computes in the Search algorithm as | | = 10. Also, we set as the = , ∈ [1, ..., ] and outputs the user revocation number of keywords related to a ciphertext and compare the list , the updated key { , } ∈[1, ] . cost for search/decryption as shown in Table III especially for the single keyword and multi-keywords when searching ● SKUpd( , , { } ∈[1, ] , ) → . Taking with the condition = 1 and = 10. Besides, we assume the non-revoked user secret key whose is not in ℓ = = 20 as the number of attributes related to a secret key the user revocation list the updated secret number or a ciphertext to further compute the size of ciphertext/secret , for ∈ [1, ..., ], and the public parameters as key as shown in Table IV. Table III and Table IV show that inputs, the attribute authority computes the proposed scheme has the better performance when the 1 Í 1 = + + =1 ( ) , number of keywords is equal to 10. Moreover, the proposed 1 + + ( ) Í scheme owns more properties as shown in Table IV. Overall, 2 = ℎ =1 , Í 1 the proposed scheme is more practical and suitable for ( ) 3 = . + + =1 real-world environments. and outputs the updated non-revoked user secret key = ( , 1 , 2 , 3 ). TABLE I B. Correctness The Notations The correctness can be demonstrated as follows: Notation Meaning the number of keywords related to a ciphertext 1. The correctness of keyword search: ℓ the number of attributes related to a secret key the number of attributes related to a ciphertext ( =1 3, ⋅ 4 4 , 1 ) Î | | the number of attributes used in the Search algorithm Î 1 Î 2 = ( =1 ℎ ( ) =1 ( ) Í ⋅ 2 , + + =1 ( ) ) Î 1 Í V. Conclusion = ( =1 ℎ ( ) , + + =1 ( ) ) 2 Í With the rapid development of cloud computing, people start ⋅ ( =1 ( ) , + + =1 ( ) ) Î to upload their data files to the cloud server for the ones Î Í who have the rights to access, which makes cloud servers = ( =1 ℎ ( ) + + ( ) =1 , 1 ) ⋅ ( 2 , ) play a very important role in today’s society. Because the data = ( 2 , 5 ) ⋅ ( 6 , 3 ). files are mostly confidential, the security and privacy of data 2. The correctness of decryption: become important issues. Therefore, the data owners should encrypt the data files before outsourcing them to the cloud server. Besides, encryption mechanisms have to enable data ( 1 , 1 ⋅ 2 ) users to use keywords to search efficiently for the information ⋅ ( , ) = they need through a large number of encrypted files. Although Í 1 Î ( + + =1 ( ) , =1 ( ) ⋅ ) the searchable encryption mechanism can assist the data users ⋅ ( , ) on searching for encrypted files, the schemes nowadays cannot = 1 Í simultaneously satisfy human needs for fine-grained multi- ( + + =1 ( ) , + + =1 ( ) ) Í keyword search, user revocation, and constant size secret key = . so as to flexibly implement in the real world.
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 6 TABLE II The Computation Costs of Cryptographic Primitives Notation Meaning Cost ℎ the cost of a hash operation 0.136 ms the cost of a scalar multiplication in an additive group 0.348 ms or an exponentiation in a multiplicative G the cost of a scalar multiplication in an additive group 3.944 ms or an exponentiation in a multiplicative G the cost of a an addition in an additive group 0.55 ms or a multiplication in a multiplicative group G the cost of a an addition in an additive group 5.16 ms or a multiplication in a multiplicative group G the cost of a pairing operation 5.05 ms the cost of a modular multiplication in Z 0.029 ms TABLE III Comparison of Performance Search ( = 1) Search ( = 10) Decrypt 4 + 2 + 2| | + 2 + ℎ Li et al. [16] ≈ 2628.48 ms 3 + 2 ≈ 11.75 ms ≈ 131.424 ms Sun et al. [8] + ≈ 0.898 ms ≈ 17.96 ms NA Wang et al. [17] ℎ + + ≈ 5.534 ms ≈ 110.68 ms + + ≈ 10.239 ms Our Scheme + + ≈ 5.948 ms ≈ 16.398 ms + + + ≈ 11.108 ms NA: no such operator in the literature In view of this, we propose a revocable attribute-based encryp- [2] D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano, “Public key tion scheme with multi-keyword search based on a traditional encryption with keyword search,” in International conference on the theory and applications of cryptographic techniques. Springer, 2004, identity-based encryption scheme. In the proposed scheme, pp. 506–522. I we achieve the advantages including multi-keyword search [3] J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou, “Fuzzy keyword which is that the proposed scheme supports multi-keyword search over encrypted data in cloud computing,” in 2010 Proceedings IEEE INFOCOM. IEEE, 2010, pp. 1–5. I search so that the data user can effectively find required [4] N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, “Privacy-preserving multi- information within huge data files, fine-grained search which keyword ranked search over encrypted cloud data,” IEEE Transactions is that the proposed scheme supports multi-keyword search so on parallel and distributed systems, vol. 25, no. 1, pp. 222–233, 2014. that the data user can effectively find required information, I [5] Q. Zheng, X. Li, and A. Azgin, “CLKS: Certificateless keyword search user revocation which is that the proposed scheme supports on encrypted data,” in International Conference on Network and System the user revocation at an attribute level to support the possible Security. Springer, 2015, pp. 239–253. I frequent change of the data user’s attributes, user attributes [6] A. Sahai and B. Waters, “Fuzzy identity-based encryption,” in Annual independency which is that the length of the ciphertext and International Conference on the Theory and Applications of Crypto- graphic Techniques. Springer, 2005, pp. 457–473. I the length of the secret key in the proposed scheme are [7] V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryp- independent of the number of user attributes and do not tion for fine-grained access control of encrypted data,” in Proceedings increase linearly, and low computation cost which is that the of the 13th ACM conference on Computer and communications security. Acm, 2006, pp. 89–98. I decryption in this scheme needs only one pairing. [8] W. Sun, S. Yu, W. Lou, Y. T. Hou, and H. Li, “Protecting your right: To the best of our knowledge, the proposed scheme is the Attribute-based keyword search with fine-grained owner-enforced search first that simultaneously satisfies these advantages. With those authorization in the cloud,” in IEEE INFOCOM 2014-IEEE Conference on Computer Communications. IEEE, 2014, pp. 226–234. I, IV, III, advantages, our scheme is more suitable for the clouds envi- IV ronment. In the future, how to prevent the revoked users from [9] Q. Zheng, S. Xu, and G. Ateniese, “VABKS: verifiable attribute-based decrypting the past ciphertext and achieve a more customized keyword search over outsourced encrypted data,” in IEEE INFOCOM multi-keyword search with a flexible access policy will be our 2014-IEEE Conference on Computer Communications. IEEE, 2014, pp. 522–530. I future works. [10] Y. Miao, J. Ma, X. Liu, F. Wei, Z. Liu, and X. A. Wang, “m 2-ABKS: Attribute-based multi-keyword search over encrypted personal health records in multi-owner setting,” Journal of medical systems, vol. 40, no. 11, p. 246, 2016. I References [11] J. Li, Y. Shi, and Y. Zhang, “Searchable ciphertext-policy attribute-based encryption with revocation in cloud storage,” International Journal of [1] D. X. Song, D. Wagner, and A. Perrig, “Practical techniques for searches Communication Systems, vol. 30, no. 1, p. e2942, 2017. I on encrypted data,” in Proceeding 2000 IEEE Symposium on Security [12] H. Haiping, D. Jianpeng, D. Hua, and W. Ruchuan, “Multi-sever multi- and Privacy. S&P 2000. IEEE, 2000, pp. 44–55. I keyword searchable encryption scheme based on cloud storage,” Journal
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 7 TABLE IV Comparison of Properties Li et al. [16] Sun et al. [8] Wang et al. [17] Our Scheme Keyword Single Multiple Single Multiple Search Access Linear Secret Tree-based AND Gates AND Gates Structure Sharing Scheme Fine-Grained Yes Yes No Yes Search User No Yes Yes Yes Revocation Constant-Size No No No Yes Secret Key Multi-Value No No No Yes Independency Size of 2ℓ|G| 2|Z | + (2ℓ + 1)|G| |Z | + (4 + ℓ)|G| 3|G| + |Z | Secret Key ≈ 10240 bits ≈ 10752 bits ≈ 6400 bits ≈ 1024 bits Size of ( + 4)|G| + 2| | |Z | + (2 + )|G| (2 + 3)|G| |G | + 6|G| Ciphertext ≈ 6656 bits ≈ 5888 bits ≈ 11008 bits ≈ 1792 bits of Electronics & Information Technology, vol. 39, no. 2, pp. 389–396, Chun-I Fan received the M.S. degree in computer 2017. I science and information engineering from National [13] S. Wang, L. Yao, and Y. Zhang, “Attribute-based encryption scheme Chiao Tung University, Hsinchu, Taiwan, in 1993, with multi-keyword search and supporting attribute revocation in cloud and the Ph.D. degree in electrical engineering from storage,” PloS one, vol. 13, no. 10, p. e0205675, 2018. I National Taiwan University, Taipei, Taiwan, in 1998. [14] D. Boneh and X. Boyen, “Efficient selective-ID secure identity-based From 1999 to 2003, he was an Associate Re- encryption without random oracles,” in International Conference on the searcher and a Project Leader with Telecommuni- Theory and Applications of Cryptographic Techniques. Springer, 2004, cation Laboratories, Chunghwa Telecom Company, pp. 223–238. I-A, II-D Ltd., Taoyuan, Taiwan. In 2003, he joined as a [15] E. Bresson, O. Chevassut, and D. Pointcheval, “The group diffie- faculty with the Department of Computer Science hellman problems,” in International Workshop on Selected Areas in and Engineering, National Sun Yat-sen University Cryptography. Springer, 2002, pp. 325–338. II-C (NSYSU), Kaohsiung, Taiwan. He has been a Full Professor since 2010 [16] J. Li, X. Lin, Y. Zhang, and J. Han, “KSF-OABE: outsourced attribute- and a Distinguished Professor since 2019. He also is the Dean of College based encryption with keyword search function for cloud storage,” IEEE of Engineering and the Director of Information Security Research Center at Transactions on Services Computing, vol. 10, no. 5, pp. 715–725, 2016. NSYSU, and he was the CEO of “Aim for the Top University Plan” Office, IV, III, IV NSYSU. And he is currently an outstanding fac- ulty in Academic Research in [17] S. Wang, D. Zhang, Y. Zhang, and L. Liu, “Efficiently revocable and NSYSU. His current research interests include applied cryptology, information searchable attribute-based encryption scheme for mobile cloud storage,” security, and communication security. He received the Best Student Paper IEEE Access, vol. 6, pp. 30 444–30 457, 2018. IV, III, IV Awards from the National Conference on Information Security in 1998, the [18] A. Guillevic, “Comparing the pairing efficiency over composite-order Dragon Ph.D. Thesis Award from Acer Foundation, the Best Ph.D. Thesis and prime-order elliptic curves,” in International Conference on Applied Award from the Institute of Information and Computing Machinery in 1999, Cryptography and Network Security. Springer, 2013, pp. 357–372. IV and the Y. Z. Hsu Science Paper Award (Information and Communication Sci- ence and Technology Category) in 2020. He won the Engineering Professors Award from Chinese Institute of Engineers — Kaohsiung Chapter in 2016, and the Outstanding Technical Achievement Award from IEEE Tainan Section in 2020. He is the Chairman of Chinese Cryptology and Information Security Association, and was the Chief Executive Officer of Telecom Technology Center in Taiwan. Si-Jing Wu is now an MS student in computer science and engineering from National Sun Yat- sen University, Kaohsiung, Taiwan, Her research interests include cloud computing and cloud storage, network and communication security, and applied cryptography.
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 8 Yi-Fan Tseng was born in Kaohsiung, Taiwan. He received the Ph.D. degree and MS degree in computer science and engineering from National Sun Yat-sen University, Taiwan, in 2014 and 2018, respectively. From 2018 to 2019, as a postdoctoral researcher, he joined the research group of Taiwan Information Security Center at National Sun Yat- sen University (TWISC@NSYSU). In 2019, he has joined the faculty of the Department of Computer Science, National Chengchi University, Taipei, Tai- wan. His research interests include cloud computing and security, network and communication security, information security, cryptographic protocols, and applied cryptography..
You can also read