• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索

author:

Miao, Y. (Miao, Y..) [1] | Deng, R. (Deng, R..) [2] | Choo, K.R. (Choo, K.R..) [3] | Liu, X. (Liu, X..) [4] | Ning, J. (Ning, J..) [5] | Li, H. (Li, H..) [6]

Indexed by:

Scopus

Abstract:

Ciphertext-Policy Attribute-Based Keyword Search (CP-ABKS) schemes support both fine-grained access control and keyword-based ciphertext retrieval, which make these schemes attractive for resource-constrained users (i.e., mobile or wearable devices, sensor nodes, etc.) to store, share and search encrypted data in the public cloud. However, ciphertext length and decryption overhead in the existing CP-ABKS schemes grow with the complexity of access policies or the number of data users' attributes. Moreover, such schemes generally do not consider the practical multi-owner setting (e.g., each file needs to be signed by multiple data owners before being uploaded to the cloud server) or prevent malicious cloud servers from returning incorrect search results. To overcome these limitations, in this paper we first design an optimized Verifiable Fine-grained Keyword Search scheme in the static Multi-owner setting (termed as basic VFKSM), which achieves short ciphertext length, fast ciphertext transformation, accelerated search process, and authentic search result verification. Then, we extend the basic VFKSM to support multi-keyword search and multi-owner update (also called as extended VFKSM). Finally, we prove that the basic (or extended) VFKSM resists the Chosen-Keyword Attack (CKA) and external Keyword-Guessing Attack (KGA). We also evaluate the performance of these schemes using various public datasets. IEEE

Keyword:

Access control; Ciphertext length; Cloud computing; Complexity theory; decryption overhead; Encryption; Keyword search; multi-keyword search; multi-owner setting; search result verification; Servers

Community:

  • [ 1 ] [Miao, Y.]School of Cyber Engineering, Xidian University, 47905 Xian, Shaanxi China 710071 (e-mail: ybmiao2014@163.com)
  • [ 2 ] [Deng, R.]School of Information Systems, Singapore Management University, 54756 Singapore, Singapore Singapore (e-mail: robertdeng@smu.edu.sg)
  • [ 3 ] [Choo, K.R.]Department of Information Systems and Cyber Security, University of Texas at San Antonio, 12346 San Antonio, Texas United States 78249-1644 (e-mail: raymond.choo@fulbrightmail.org)
  • [ 4 ] [Liu, X.]Key Laboratory of Information Security of Network Systems, College of Mathematics and Computer Science, Fuzhou University, 12423 Fuzhou, Fujian China (e-mail: snbnix@gmail.com)
  • [ 5 ] [Ning, J.]Department of Computer Science, National University of Singapore, 37580 Singapore, singapore Singapore 119260 (e-mail: jtning88@gmail.com)
  • [ 6 ] [Li, H.]Department of Computer Science and Engineering, University of Electronic Science and Technology of China, 12599 Chengdu, Sichuan China (e-mail: hongweili@uestc.edu.cn)

Reprint 's Address:

Email:

Show more details

Related Keywords:

Related Article:

Source :

IEEE Transactions on Dependable and Secure Computing

ISSN: 1545-5971

Year: 2019

6 . 8 6 4

JCR@2019

7 . 0 0 0

JCR@2023

ESI HC Threshold:162

JCR Journal Grade:1

CAS Journal Grade:1

Cited Count:

WoS CC Cited Count: 0

SCOPUS Cited Count: 61

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 1

Online/Total:60/10106738
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1