|
|
Multi-sever Multi-keyword Searchable Encryption Scheme Based on Cloud Storage |
HUANG Haiping①② DU Jianpeng①② DAI Hua① WANG Ruchuan①② |
①(Institute of Computer, Nanjing University of Posts and Telecommunications, Nanjing 210003, China)
②(High Technology Research Key Laboratory of Wireless Sensor Network of Jiangsu Province, Nanjing 210003, China) |
|
|
Abstract In the searchable encryption services provided by cloud severs, data owners expect that their data files can be partitioned and stored to multiple cloud severs with the form of ciphertext, so as to improve the searching efficiency of authorized users and the processing ability of big data. For this issue, a multi-sever multi-keyword searchable encryption scheme is proposed based on cloud storage, and the proposed scheme is proved to be IND-CKA (adaptive Chosen Keyword Attack) secure coexisting with the secure trapdoor. Compared with the single sever searchable encryption, the proposed scheme can not only guarantee the data security, but also provide more accurate retrieval service when the keyword index or any one file does not contain all of the searching keywords.
|
Received: 07 April 2016
Published: 14 November 2016
|
|
Fund: The National Natural Science Foundation of China (61373017, 61373138, 61300240, 61672297), The National Postdoctoral Foundation of China (2015M570468, 2016T90485), The Natural Science Foundation of Jiangsu Province (BK20151511), The Six Major Talent Peak Foundation in Jiangsu Province (DZXX-017), The High Technology Research Key Laboratory of Wireless Sensor Network Foundation of Jiangsu Province (WSNLBZY 201516), The Graduate Education Innovation Project of Jiangsu Province (KYLX15_0853) |
Corresponding Authors:
HUANG Haiping
E-mail: hhp@njupt.edu.cn
|
|
|
|
[1] |
SONG X D, WAGNER D, and PERRIG A. Practical techniques for searches on encrypted data[C]. IEEE Symposium on Security and Privacy, Berkeley, USA, 2000: 44-55.
|
[2] |
BONEH D and FRANKLIN M. Identity-based encryption from the weil pairing[C]. Advances in Cryptology-CRYPTO 2001-21st Annual International Cryptology Conference, California, USA, 2001: 213-229.
|
[3] |
BONEH D, CRESCENZO G, OSTROVSKY R, et al. Public key encryption with keyword search[C]. Proceedings of EUROCRYPT 2004, Interlaken, Switzerland, 2004: 506-522.
|
[4] |
GOH E. Secure indexes[OL]. http://crypto.stanford.edu/ ~eujin/papers/secureindex, 2003.
|
[5] |
KAMARA S, PAPAMANTHOU C, and ROEDER T. Dynamic searchable symmetric encryption[C]. CCS 2012 19th ACM Conference on Computer and Communications Security, Raleigh, USA, 2012: 965-976.
|
[6] |
RHEE H S, PARK J H, SUSILO W, et al. Improved searchable public key encryption with designated tester[C]. ASIACCS’09 Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, Sydney, Australia, 2009: 376-379.
|
[7] |
HU C and LIU P. A secure searchable public key encryption scheme with a designated tester against keyword guessing attacks and its extension[C]. Communications in Computer and Information Science, Jinan, China, 2011: 131-136.
|
[8] |
ZIRTOL KOBRA AMIRI, NOROOZI MAHNAZ, and ESLAMI ZIBA. Multi-user searchable encryption scheme with general access structure[C]. 2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI), Tehran, Iran, 2015: 399-404.
|
[9] |
LI J, LI J, CHEN X, et al. Privacy-Preserving data utilization in hybrid clouds[J]. Future Generation Computer Systems, 2014, 30(1): 98-106. doi: 10.1016/j.future.2013.06.011.
|
[10] |
CUI B, LIU Z, and WANG L. Key-Aggregate Searchable Encryption (KASE) for group data sharing via cloud storage[J]. IEEE Transactions on Computers, 2015, 65(8): 2374-2385. doi: 10.1109/TC.2015.2389959.
|
[11] |
PENG Yanguo, CUI Jiangtao, PENG Changgen, et al. Certificateless public key encryption with keyword search[J]. China Communications, 2014, 11(11): 100-113. doi: 10.1109 /CC.2014.7004528.
|
[12] |
GOLLE P, STADDON J, and WATERS B. Secure conjunctive keyword search over encrypted data[C]. International Conference on Applied Cryptography and Network Security, Huangshan, China, 2004: 31-45.
|
[13] |
YANG Yang, MA Maode, and LIN Bogang. Proxy re-encryption conjunctive keyword search against keyword guessing attack[C]. Computing, Communications and IT Applications Conference (ComComAp), Hong Kong, China, 2013: 125-130.
|
[14] |
KERSCHBAUM F. Secure conjunctive keyword searches for unstructured text[C]. International Conference on Network and System Security, Milan, Italia, 2011: 285-289.
|
[15] |
XIA Zhihua, WANG Xinhui, SUN Xingming, el al. A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data[J]. IEEE Transactions on Parallel and Distributed Systems, 2016, 27(2): 340-352. doi: 10.1109/ TPDS.2015.2401003.
|
|
|
|