Searchable encryption scheme based on attribute policy hiding in a cloud environment

Attribute-based searchable encryption technology can achieve fine-grained access control of data, but the existing searchable encryption scheme, keyword search, access control and file encryption are basically performed separately, causing the attacker to directly skip the access policy for keyword...

Full description

Saved in:
Bibliographic Details
Main Authors: Yihua ZHOU, Xinyu HU, Meiqi LI, Yuguang YANG
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2022-04-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2022019
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841529846588506112
author Yihua ZHOU
Xinyu HU
Meiqi LI
Yuguang YANG
author_facet Yihua ZHOU
Xinyu HU
Meiqi LI
Yuguang YANG
author_sort Yihua ZHOU
collection DOAJ
description Attribute-based searchable encryption technology can achieve fine-grained access control of data, but the existing searchable encryption scheme, keyword search, access control and file encryption are basically performed separately, causing the attacker to directly skip the access policy for keyword index matching and file decryption.Besides, the data owners in the existing schemes need to pass the key of the encrypted file to the user in a secure channel, which increases the cost of the data owner.Furthermore, most tree-based access control policies are open and easy to cause privacy leakage.Therefore, based on the LSSS (linear secret sharing schemes) access architecture, the searchable encryption scheme based on attribute policy hiding in a cloud environment was proposed.Through the embedding of policy secret values into keyword encryption and file storage encryption, the combination of access control, keyword search and file encryption were realized.The aggregate key technology enables users to decrypt files without interacting with the data owner, reducing the burden of key management and increasing storage space by approximately 30%.The experimental results and security analysis show that the proposed scheme guarantees the security of stored data, privacy of access strategy and non-connectivity of trap gate.Compared with the existing mainstream scheme, the retrieval efficiency of the proposed scheme has improved to more than 20%.
format Article
id doaj-art-fa39259fa3e84167b387bf8b438e3eff
institution Kabale University
issn 2096-109X
language English
publishDate 2022-04-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj-art-fa39259fa3e84167b387bf8b438e3eff2025-01-15T03:15:30ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2022-04-01811212159570589Searchable encryption scheme based on attribute policy hiding in a cloud environmentYihua ZHOUXinyu HUMeiqi LIYuguang YANGAttribute-based searchable encryption technology can achieve fine-grained access control of data, but the existing searchable encryption scheme, keyword search, access control and file encryption are basically performed separately, causing the attacker to directly skip the access policy for keyword index matching and file decryption.Besides, the data owners in the existing schemes need to pass the key of the encrypted file to the user in a secure channel, which increases the cost of the data owner.Furthermore, most tree-based access control policies are open and easy to cause privacy leakage.Therefore, based on the LSSS (linear secret sharing schemes) access architecture, the searchable encryption scheme based on attribute policy hiding in a cloud environment was proposed.Through the embedding of policy secret values into keyword encryption and file storage encryption, the combination of access control, keyword search and file encryption were realized.The aggregate key technology enables users to decrypt files without interacting with the data owner, reducing the burden of key management and increasing storage space by approximately 30%.The experimental results and security analysis show that the proposed scheme guarantees the security of stored data, privacy of access strategy and non-connectivity of trap gate.Compared with the existing mainstream scheme, the retrieval efficiency of the proposed scheme has improved to more than 20%.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2022019searchable encryptionattribute-based encryptionpolicy hidingaggregation key
spellingShingle Yihua ZHOU
Xinyu HU
Meiqi LI
Yuguang YANG
Searchable encryption scheme based on attribute policy hiding in a cloud environment
网络与信息安全学报
searchable encryption
attribute-based encryption
policy hiding
aggregation key
title Searchable encryption scheme based on attribute policy hiding in a cloud environment
title_full Searchable encryption scheme based on attribute policy hiding in a cloud environment
title_fullStr Searchable encryption scheme based on attribute policy hiding in a cloud environment
title_full_unstemmed Searchable encryption scheme based on attribute policy hiding in a cloud environment
title_short Searchable encryption scheme based on attribute policy hiding in a cloud environment
title_sort searchable encryption scheme based on attribute policy hiding in a cloud environment
topic searchable encryption
attribute-based encryption
policy hiding
aggregation key
url http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2022019
work_keys_str_mv AT yihuazhou searchableencryptionschemebasedonattributepolicyhidinginacloudenvironment
AT xinyuhu searchableencryptionschemebasedonattributepolicyhidinginacloudenvironment
AT meiqili searchableencryptionschemebasedonattributepolicyhidinginacloudenvironment
AT yuguangyang searchableencryptionschemebasedonattributepolicyhidinginacloudenvironment