Authorized Keyword Search over Outsourced Encrypted Data in Cloud Environment
نویسندگان
چکیده
For better data availability and accessibility while ensuring secrecy, end-users often tend to outsource their the cloud servers in an encrypted form. However, this brings a major challenge perform search for some keywords over content without disclosing any information unintended entities. This paper proposes novel expressive authorized keyword scheme relying on concept of ciphertext-policy attribute-based encryption. The originality proposed is multifold. First, it supports generic convenient multi-owner multi-user scenario, where are outsourced by several owners searchable multiple users. Second, formal security analysis proves that semantically secure against chosen outsiders guessing attacks. Third, interactive protocol introduced which avoids need secure-channels between users service provider. Fourth, due bilinear-map accumulator, system can efficiently revoke and/or attributes, authenticate them prior launching expensive operations. Fifth, conjunctive provided thus enabling simultaneously, with minimal cost. Sixth, performance shows outperforms closely-related works.
منابع مشابه
Authorized Keyword Search on Encrypted Data
Cloud computing has drawn much attention from research and industry in recent years. Plenty of enterprises and individuals are outsourcing their data to cloud servers. As those data may contain sensitive information, it should be encrypted before outsourced to cloud servers. In order to ensure that only authorized users can search and further access the encrypted data, two important capabilitie...
متن کاملA Survey on Keyword Based Search over Outsourced Encrypted Data
To ensure security, encryption techniques play a major role when data are outsourced to the cloud. Problem of retrieving the data from the cloud servers is considered. Many searching techniques are used for retrieving the data. This study focused on a set of keyword based search algorithms. It provides secure data retrieval with high efficiency. It concludes Ranked Searchable Symmetric Encrypti...
متن کاملConjunctive Fuzzy Keyword Search Over Encrypted Data in Cloud Computing
As Cloud Computing becomes prevalent, more and more sensitive information are centralized into the cloud. For the protect data privacy, sensitive data usually have to be encrypted before outsourcing, which makes efficient data utilization a very challenging task. Although traditional searchable encryption schemes allow a user to search over encrypted data through keywords and selectively retrie...
متن کاملPrivacy-Preserving Keyword Search Over Encrypted Data in Cloud Computing
Search over encrypted data is a technique of great interest in the cloud computing era, because many believe that sensitive data has to be encrypted before outsourcing to the cloud servers in order to ensure user data privacy. Devising an efficient and secure search scheme over encrypted data involves techniques from multiple domains – information retrieval for index representation, algorithms ...
متن کاملFuzzy Keyword Search over Encrypted Data in Cloud Computing.dvi
As Cloud Computing becomes prevalent, more and more sensitive information are being centralized into the cloud. For the protection of data privacy, sensitive data usually have to be encrypted before outsourcing, which makes effective data utilization a very challenging task. Although traditional searchable encryption schemes allow a user to securely search over encrypted data through keywords a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Cloud Computing
سال: 2022
ISSN: ['2168-7161', '2372-0018']
DOI: https://doi.org/10.1109/tcc.2019.2931896