Authorized Keyword Search over Outsourced Encrypted Data in Cloud Environment

نویسندگان

چکیده

For better data availability and accessibility while ensuring secrecy, end-users often tend to outsource their the cloud servers in an encrypted form. However, this brings a major challenge perform search for some keywords over content without disclosing any information unintended entities. This paper proposes novel expressive authorized keyword scheme relying on concept of ciphertext-policy attribute-based encryption. The originality proposed is multifold. First, it supports generic convenient multi-owner multi-user scenario, where are outsourced by several owners searchable multiple users. Second, formal security analysis proves that semantically secure against chosen outsiders guessing attacks. Third, interactive protocol introduced which avoids need secure-channels between users service provider. Fourth, due bilinear-map accumulator, system can efficiently revoke and/or attributes, authenticate them prior launching expensive operations. Fifth, conjunctive provided thus enabling simultaneously, with minimal cost. Sixth, performance shows outperforms closely-related works.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Authorized Keyword Search on Encrypted Data

Cloud computing has drawn much attention from research and industry in recent years. Plenty of enterprises and individuals are outsourcing their data to cloud servers. As those data may contain sensitive information, it should be encrypted before outsourced to cloud servers. In order to ensure that only authorized users can search and further access the encrypted data, two important capabilitie...

متن کامل

A Survey on Keyword Based Search over Outsourced Encrypted Data

To ensure security, encryption techniques play a major role when data are outsourced to the cloud. Problem of retrieving the data from the cloud servers is considered. Many searching techniques are used for retrieving the data. This study focused on a set of keyword based search algorithms. It provides secure data retrieval with high efficiency. It concludes Ranked Searchable Symmetric Encrypti...

متن کامل

Conjunctive Fuzzy Keyword Search Over Encrypted Data in Cloud Computing

As Cloud Computing becomes prevalent, more and more sensitive information are centralized into the cloud. For the protect data privacy, sensitive data usually have to be encrypted before outsourcing, which makes efficient data utilization a very challenging task. Although traditional searchable encryption schemes allow a user to search over encrypted data through keywords and selectively retrie...

متن کامل

Privacy-Preserving Keyword Search Over Encrypted Data in Cloud Computing

Search over encrypted data is a technique of great interest in the cloud computing era, because many believe that sensitive data has to be encrypted before outsourcing to the cloud servers in order to ensure user data privacy. Devising an efficient and secure search scheme over encrypted data involves techniques from multiple domains – information retrieval for index representation, algorithms ...

متن کامل

Fuzzy Keyword Search over Encrypted Data in Cloud Computing.dvi

As Cloud Computing becomes prevalent, more and more sensitive information are being centralized into the cloud. For the protection of data privacy, sensitive data usually have to be encrypted before outsourcing, which makes effective data utilization a very challenging task. Although traditional searchable encryption schemes allow a user to securely search over encrypted data through keywords a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Cloud Computing

سال: 2022

ISSN: ['2168-7161', '2372-0018']

DOI: https://doi.org/10.1109/tcc.2019.2931896