Securing Organization’s Data: A Role-Based Authorized Keyword Search Scheme With Efficient Decryption

نویسندگان

چکیده

For better data availability and accessibility while ensuring secrecy, organizations often tend to outsource their encrypted the cloud storage servers, thus bringing challenge of keyword search over data. In this article, we propose a novel authorized scheme using Role-Based Encryption (RBE) technique in environment. The contributions article are multi-fold. First, it presents which enables only users, having properly assigned roles, delegate keyword-based capabilities providers without disclosing any sensitive information. Second, supports multi-organization environment, where users can be associated with more than one organization. Third, proposed provides efficient decryption, conjunctive revocation mechanisms. Fourth, outsources expensive cryptographic operations decryption secure manner. Fifth, have provided formal security analysis prove that is semantically against Chosen Plaintext Keyword Attacks. Finally, our performance shows suitable for practical applications.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Authorized Keyword Search on Encrypted Data

Cloud computing has drawn much attention from research and industry in recent years. Plenty of enterprises and individuals are outsourcing their data to cloud servers. As those data may contain sensitive information, it should be encrypted before outsourced to cloud servers. In order to ensure that only authorized users can search and further access the encrypted data, two important capabilitie...

متن کامل

A New Efficient Verifiable Fuzzy Keyword Search Scheme

Data outsourcing has attracted considerable attentions recently. It can not only bring high quality data service to users, it also reduces their burden of data storage and maintenance. As the confidentiality of sensitive data, it should be encrypted before outsourcing. To achieve search over the encrypted data becomes a challenging problem. Although the existing searchable encryption schemes al...

متن کامل

A Verifiable Fuzzy Keyword Search Scheme Over Encrypted Data

As the Cloud Computing technology becomes mature, the need increases rapidly to store sensitive data securely on the cloud server. Since the cloud is not trusted, the data should be stored in an encrypted form at the server. An inherent problem is how to query the encrypted data efficiently. Recently, some searchable encryption schemes have been proposed in the literatures. Although the existin...

متن کامل

Efficient Keyword Search Scheme in Encrypted Cloud Computing Environment

With the increasing popularity of cloud computing, more and more sensitive or private information has been outsourced onto the cloud server. For protecting data privacy, sensitive data usually has to be encrypted before outsourcing, which makes traditional search techniques based on plaintext useless. In response to the search over encrypted data, searchable encryption is a good solution in Inf...

متن کامل

Building Software Reuse Library with Efficient Keyword based Search Mechanism

Software reuse is the use of existing software components to build a software system. Effective storage and retrieval of software components is much essential in reuse process. The researchers have developed a number of software reuse techniques for storage and retrieval of components. No one technique is complete in its own; every technique has its own merits and demerits. This paper presents ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Cloud Computing

سال: 2023

ISSN: ['2168-7161', '2372-0018']

DOI: https://doi.org/10.1109/tcc.2021.3071304