• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索

author:

Miao, Y. (Miao, Y..) [1] | Li, F. (Li, F..) [2] | Jia, X. (Jia, X..) [3] | Wang, H. (Wang, H..) [4] | Liu, X. (Liu, X..) [5] (Scholars:刘西蒙) | Choo, K.R. (Choo, K.R..) [6] | Deng, R.H. (Deng, R.H..) [7]

Indexed by:

Scopus

Abstract:

Keyword-based search over encrypted data is an important technique to achieve both data confidentiality and utilization in cloud outsourcing services. While commonly used access control mechanisms, such as identity-based encryption and attribute-based encryption, do not generally scale well for hierarchical access permissions. To solve this problem, we propose a Role-based Encrypted Keyword Search (REKS) scheme by using the role-based access control and broadcast encryption. Specifically, REKS allows owners to deploy hierarchical access control by allowing users with parent roles to have access permissions from child roles. Using REKS, we further facilitate token generation preprocessing and efficient user management, thereby significantly reducing the users' final token generation and index update overheads, respectively. Formal security analysis proves that REKS is secure against chosen keyword and internal keyword guessing attacks, and findings from the empirical evaluations demonstrate that REKS is efficient and practical. IEEE

Keyword:

Access control attribute-based encryption Cloud computing Encryption identity-based encryption Indexes keyword-based search Keyword search role-based access control Security Servers

Community:

  • [ 1 ] [Miao Y.]School of Cyber Engineering, Xidian University, Xi'an, China
  • [ 2 ] [Li F.]School of Cyber Engineering, Xidian University, Xi'an, China
  • [ 3 ] [Jia X.]Department of Computer Science, City University of Hong Kong, Hong Kong, China
  • [ 4 ] [Wang H.]Division of Mathematical Sciences, School of Physical and Mathematical Sciences, Nanyang Technological University, Singapore
  • [ 5 ] [Liu X.]Key Laboratory of Information Security of Network Systems, College of Mathematics and Computer Science, Fuzhou University, Fuzhou, China
  • [ 6 ] [Choo K.R.]Department of Information Systems and Cyber Security, University of Texas at San Antonio, San Antonio, TX, USA
  • [ 7 ] [Deng R.H.]School of Information Systems, Singapore Management University, Singapore

Reprint 's Address:

Email:

Show more details

Related Keywords:

Source :

IEEE Transactions on Dependable and Secure Computing

ISSN: 1545-5971

Year: 2023

Issue: 4

Volume: 21

Page: 1-15

7 . 0

JCR@2023

7 . 0 0 0

JCR@2023

JCR Journal Grade:1

CAS Journal Grade:1

Cited Count:

WoS CC Cited Count: 0

SCOPUS Cited Count: 2

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 1

Online/Total:165/9684707
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1