Computer Science ›› 2016, Vol. 43 ›› Issue (2): 159-162.doi: 10.11896/j.issn.1002-137X.2016.02.035

Previous Articles     Next Articles

Anonymous Multi-user Searchable Encryption Scheme with Hierarchial Permission Management

DUAN Yang-yang and LI Shi-yang   

  • Online:2018-12-01 Published:2018-12-01

Abstract: To deal with the existing problems of multi-user searchable encryption schemes in the cloud computing,we firstly proposed a basic multi-user searchable encryption scheme,and then extended this basic scheme to a multi-user searchable encryption scheme with anonymous hierarchical permission management.Compared with existing schemes,our scheme not only achieves privacy preserving in both of the searching content and users’ identities,but also allows the data owner to directly control the dynamic updating of query permission.Additionally,our scheme realizes the hie-rarchical users’ query permission management by adopting a specific query key generation rule.The security of our scheme was illustrated by security analysis.Performance evaluation and experimental result show that our scheme is practical and feasible.

Key words: Encrypted keyword search,Anonymous query,Multi-user searchable encryption,Hierarchical permission management

[1] Song D X,Wagner D,Perrig A.Practical techniques for searches on encrypted data[C]∥Proceedings IEEE Symposium on Securi-ty and Privacy.2000:44-55
[2] Boneh D,Di Crescenzo G,Ostrovsky R,et al.Public key encryption with keyword search[M]∥Advances in Cryptology-Eurocrypt.Springer Berlin Heidelberg,2004:506-522
[3] Chen F,Liu A X.Privacy-and integrity-preserving range queries in sensor networks[J].IEEE/ACM Transactions on Networking,2012,20(6):1774-1787
[4] Shi E,Bethencourt J,Chan T H H,et al.Multi-dimensionalrange query over encrypted data[C]∥IEEE Symposium on Security and Privacy(P’07).IEEE,2007:350-364
[5] Li Shuang,Xu Mao-zhi.Attribute-based public encryption with keyword search[J].Chinese Journal of Computers,2014,7(5):1017-1024(in Chinese) 李双,徐茂智.基于属性的可搜索加密方案[J].计算机学报,2014,7(5):1017-1024
[6] Boneh D,Waters B.Conjunctive,subset,and range queries on encrypted data[M]∥Theory of Cryptography.Springer Berlin Heidelberg,2007:535-554
[7] Li J,Wang Q,Wang C,et al.Fuzzy keyword search over en-crypted data in cloud computing[C]∥INFOCOM.IEEE,2010:1-5
[8] Yang Y,Lu H,Weng J.Multi-user private keyword search for cloud computing[C]∥IEEE Third International Conference on Cloud Computing Technology and Science (CloudCom).IEEE,2011:264-271
[9] Bao F,Deng R H,Ding X,et al.Private query on encrypted data in multi-user settings[M]∥Information Security Practice and Experience.Springer Berlin Heidelberg,2008:71-85
[10] Curtmola R,Garay J,Kamara S,et al.Searchable symmetric encryption:improved definitions and efficient constructions[C]∥Proceedings of the 13th ACM Conference on Computer and Communications Security.ACM,2006:79-88
[11] Shen Zhi-rong,Xue Wei,Shu Ji-wu.Survey on the research and development of searchable encryption schemes[J].Journal of Software,2014,5(4):880-895(in Chinese) 沈志荣,薛巍,舒继武.可搜索加密机制研究与进展[J].软件学报,2014,5(4):880-895
[12] Gu C,Zhu Y.New Efficient Searchable Encryption Schemesfrom Bilinear Pairings[J].International Journal of Network Security,2010,10(1):25-31
[13] Wang C,Cao N,Li J,et al.Secure ranked keyword search over encrypted cloud data[C]∥IEEE 30th International Conference on Distributed Computing Systems(ICDCS).2010:253-262
[14] Fang Zhong-jin,Zhou Shu,Xia Zhi-hua.Research on fuzzysearch over encrypted cloud data based on keywords[J].Computer Science,2015,2(3):136-139(in Chinese) 方忠进,周舒,夏志华.基于关键字的加密云数据模糊搜索策略研究[J].计算机科学,2015,2(3):136-139
[15] Zheng Q,Xu S,Ateniese G.VABKS:Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data[J].IACR Cryptology ePrint Archive,2013:462
[16] Zheng Yu,Gao Bao.Method based on homomorphic hash for data changes capture of LDAP directory[J].Application Research of Computers,2013,0(7):2007-2009(in Chinese) 郑煜,高宝.基于同态哈希的目录服务数据变化捕获方法[J].计算机应用研究,2013,30(7):2007-2009

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!