Searchable encryption scheme based on attribute policy hiding in a cloud environment
Attribute-based searchable encryption technology can achieve fine-grained access control of data, but the existing searchable encryption scheme, keyword search, access control and file encryption are basically performed separately, causing the attacker to directly skip the access policy for keyword...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2022-04-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2022019 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841529846588506112 |
---|---|
author | Yihua ZHOU Xinyu HU Meiqi LI Yuguang YANG |
author_facet | Yihua ZHOU Xinyu HU Meiqi LI Yuguang YANG |
author_sort | Yihua ZHOU |
collection | DOAJ |
description | Attribute-based searchable encryption technology can achieve fine-grained access control of data, but the existing searchable encryption scheme, keyword search, access control and file encryption are basically performed separately, causing the attacker to directly skip the access policy for keyword index matching and file decryption.Besides, the data owners in the existing schemes need to pass the key of the encrypted file to the user in a secure channel, which increases the cost of the data owner.Furthermore, most tree-based access control policies are open and easy to cause privacy leakage.Therefore, based on the LSSS (linear secret sharing schemes) access architecture, the searchable encryption scheme based on attribute policy hiding in a cloud environment was proposed.Through the embedding of policy secret values into keyword encryption and file storage encryption, the combination of access control, keyword search and file encryption were realized.The aggregate key technology enables users to decrypt files without interacting with the data owner, reducing the burden of key management and increasing storage space by approximately 30%.The experimental results and security analysis show that the proposed scheme guarantees the security of stored data, privacy of access strategy and non-connectivity of trap gate.Compared with the existing mainstream scheme, the retrieval efficiency of the proposed scheme has improved to more than 20%. |
format | Article |
id | doaj-art-fa39259fa3e84167b387bf8b438e3eff |
institution | Kabale University |
issn | 2096-109X |
language | English |
publishDate | 2022-04-01 |
publisher | POSTS&TELECOM PRESS Co., LTD |
record_format | Article |
series | 网络与信息安全学报 |
spelling | doaj-art-fa39259fa3e84167b387bf8b438e3eff2025-01-15T03:15:30ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2022-04-01811212159570589Searchable encryption scheme based on attribute policy hiding in a cloud environmentYihua ZHOUXinyu HUMeiqi LIYuguang YANGAttribute-based searchable encryption technology can achieve fine-grained access control of data, but the existing searchable encryption scheme, keyword search, access control and file encryption are basically performed separately, causing the attacker to directly skip the access policy for keyword index matching and file decryption.Besides, the data owners in the existing schemes need to pass the key of the encrypted file to the user in a secure channel, which increases the cost of the data owner.Furthermore, most tree-based access control policies are open and easy to cause privacy leakage.Therefore, based on the LSSS (linear secret sharing schemes) access architecture, the searchable encryption scheme based on attribute policy hiding in a cloud environment was proposed.Through the embedding of policy secret values into keyword encryption and file storage encryption, the combination of access control, keyword search and file encryption were realized.The aggregate key technology enables users to decrypt files without interacting with the data owner, reducing the burden of key management and increasing storage space by approximately 30%.The experimental results and security analysis show that the proposed scheme guarantees the security of stored data, privacy of access strategy and non-connectivity of trap gate.Compared with the existing mainstream scheme, the retrieval efficiency of the proposed scheme has improved to more than 20%.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2022019searchable encryptionattribute-based encryptionpolicy hidingaggregation key |
spellingShingle | Yihua ZHOU Xinyu HU Meiqi LI Yuguang YANG Searchable encryption scheme based on attribute policy hiding in a cloud environment 网络与信息安全学报 searchable encryption attribute-based encryption policy hiding aggregation key |
title | Searchable encryption scheme based on attribute policy hiding in a cloud environment |
title_full | Searchable encryption scheme based on attribute policy hiding in a cloud environment |
title_fullStr | Searchable encryption scheme based on attribute policy hiding in a cloud environment |
title_full_unstemmed | Searchable encryption scheme based on attribute policy hiding in a cloud environment |
title_short | Searchable encryption scheme based on attribute policy hiding in a cloud environment |
title_sort | searchable encryption scheme based on attribute policy hiding in a cloud environment |
topic | searchable encryption attribute-based encryption policy hiding aggregation key |
url | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2022019 |
work_keys_str_mv | AT yihuazhou searchableencryptionschemebasedonattributepolicyhidinginacloudenvironment AT xinyuhu searchableencryptionschemebasedonattributepolicyhidinginacloudenvironment AT meiqili searchableencryptionschemebasedonattributepolicyhidinginacloudenvironment AT yuguangyang searchableencryptionschemebasedonattributepolicyhidinginacloudenvironment |