Computer Science ›› 2023, Vol. 50 ›› Issue (7): 339-346.doi: 10.11896/jsjkx.220500238

• Information Security • Previous Articles     Next Articles

Fine Grained and Efficient Searchable Encryption Scheme Based on Attribute Policy Hiding inCloud Environment

ZHOU Yihua, LI Meiqi, HU Xinyu, YANG Yuguang   

  1. Faculty of Information Technology,Beijing University of Technology,Beijing 100124,China
    Beijing Key Laboratory of Trusted Computing,Beijing 100124,China
  • Received:2022-05-25 Revised:2022-10-10 Online:2023-07-15 Published:2023-07-05
  • About author:ZHOU Yihua,born in 1969,Ph.D,associate professor.His main research intere-sts include network and information security.LI Meiqi,born in 1998,postgraduate.Her main research interests include information security and privacy protection.
  • Supported by:
    National Natural Science Foundation of China(62071015).

Abstract: Attribute based encryption provides flexible and fine-grained access control for outsourced data stored in the cloud.The traditional attribute based ciphertext policy encryption scheme(CP-ABE),whose access policy often appears in the form of plaintext,is very easy to expose users’ sensitive privacy information.In addition,due to the addition of attributes,the related calculation and storage costs in the encryption,decryption and search stages are linear with the number of attributes,and policy hiding will also increase the subsequent calculation costs.These are difficult to meet the actual needs of secure and efficient searchable encryption with privacy protection in cloud environment.To solve the above problems,a searchable encryption scheme supporting both policy hiding and constant ciphertext length is proposed.Based on the multi-valued wildcard and gate strategy,the scheme realizes the constant length of the ciphertext,and has a fixed encryption,decryption and search overhead,reducing users’ computing overhead and the storage overhead of the ciphertext in the cloud.The attributes in the access policy are completely hidden by encryption,and the bloom filter is used to judge whether the user has the relevant attributes in the access policy during the search,which not only protects users’ privacy,but also improves the computing efficiency.The scheme meets the IND-CPA safety under the assumption of q-BDHE.Security analysis and experimental results show that the scheme is safe,efficient and feasible.It is an efficient keyword search scheme,and has a good application prospect in cloud environment and Internet of Things.

Key words: Attribute based encryption, Policy hiding, Constant ciphertext, Keyword search, Cloud environment

CLC Number: 

  • TP309
[1]SAHIA A,WATERS B R.Fuzzy Identity-Based Encryption[C]//Proceedings of the 24th Annual International Conference on Theory and Applications of Cryptographic Techniques.Berlin/Heidelberg:Springer,2005:457-473.
[2]SUN W,YU S,LOU W,et al.Protecting Your Right:Attribute-based Keyword Search with Fine-grained Owner-enforced Search Authorization in the Cloud[C]//IEEE INFOCOM 2014.IEEE,2014:226-234.
[3]CHENG S J,ZHANG C H,PAN S Q.Design of cloud storage data access control scheme based on cp-abe algorithm [J].Information Network Security,2016(2):1-6.
[4]HAN D,PAN N,LI K C.A Traceable and Revocable Cipher-text-policy Attribute-based Encryption Scheme Based on Privacy Protection[J].IEEE Transactions on Dependable and Secure Computing,2022,19(1):316-327.
[5]ZHANG Y,DENG R,XU S,et al.Attribute-Based Encryption for Cloud Computing Access Control:A Survey[J].ACM Computing Surveys,2020,53(4):1-41.
[6]JITENDRA K S,NARANDER K.Secure Data Validation and Transmission in Cloud and IoT Through BanLogic and KP-ABE[J].International Journal of Sensors,Wireless Communications and Control,2022,12(1):79-87.
[7]SANGEETHA M,VIJAVAKARTHIK P.To provide a securedaccess control using combined hybrid key-ciphertext attribute based encryption(KC-ABE)[C]//IEEE International Confe-rence on Intelligent Techniques in Control.IEEE,2017:1-4.
[8]WATERS B.Ciphertext-Policy Attribute-Based Encryption:An Expressive,Efficient,and Provably Secure Realization[C]//International Workshop on Public Key Cryptography.Berlin/Heidelberg:Springer,2008:53-70.
[9]LIU S,GUO Y Z.Multi authorization center CP-ABE proxy re-encryption scheme in cloud computing [J].Journal of Network and Information Security,2022,8(3):176-188.
[10]SHAO F J,ZHENG R J.An Efficient Fuzzy Searchable Encryption Scheme based Attribute for Medical Data[J].International Core Journal of Engineering,2022,8(7):118-126.
[11]XIE M,RUAN Y,HONG H,et al.A CP-ABE scheme based on multi-authority in hybrid clouds for mobile devices[J].Future Generation Computer Systems,2021,121(5):114-122.
[12]VARRI U S,PASUPULETI S K,KADAMBARI K V.CP-ABSEL:Ciphertext-policy attribute-based searchable encryption from lattice in cloud storage[J].Peer-to-Peer Networking and Applications,2021,14(3):1290-1302.
[13]NISHIDE T,YONEYAMA K,OHTA K.Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures[C]//International Conference on Applied Cryptography and Network Security.Berlin/Heidelberg:Springer,2008:111-129.
[14]LAI J,DENG,LI R H.Fully Secure Cipertext-Policy Hiding CP-ABE[C]//Information Security Practice and Experience.Berlin/Heidelberg:Springer,2011:24-39.
[15]QIU S,LIU J,SHI Y,et al.Hidden policy ciphertext-policy attribute-based encryption with keyword search against keyword guessing attack[J].Science China(Information Sciences),2016,60(5):1-12.
[16]ZHANG L,HU G,MU Y,et al.Hidden Ciphertext Policy Attribute-Based Encryption with Fast Decryption for Personal Health Record System[J].IEEE Access,2019,7(3):33202-33213.
[17]MENG F,CHENG L,WANG M.Ciphertext-policy attribute-based encryption with hidden sensitive policy from keyword search techniques in smart city[J].EURASIP Journal on Wireless Communications and Networking,2021,2021(1):20.
[18]ARKIN G,HELIL N.Ciphertext-Policy Attribute Based En-cryption with Selectively-Hidden Access Policy [J].Computing and Informatics,2021,40(5):1136-1159.
[19]ZHANG Z,ZHANG J,YUAN Y,et al.An Expressive FullyPolicy-Hidden Ciphertext Policy Attribute-Based Encryption Scheme with Credible Verification Based on Blockchain[J].IEEE Internet of Things Journal,2022,9(11):8681-8692.
[20]GAN T,LIAO Y,LIANG Y,et al.Partial policy hiding attri-bute-based encryption in vehicular fog computing[J].Soft Computing,2021,25(6):10543-10559.
[21]HERRANZJ,LAGUILLAUMIE F,CARLA R.Constant SizeCiphertexts in Threshold Attribute-Based Encryption[C]//International Conference on Practice & Theory in Public Key Cryptography.Berlin/Heidelberg:Springer,2010:19-34.
[22]GUAN Z,YANG W,ZHU L,et al.Achieving adaptively secure data access control with privacy protection for lightweight IoT devices[J].Science China Information Sciences,2021,64(6):1-14.
[23]WEI T,GENG Y,YANG X,et al.Attribute-based Access Control with Constant-size Ciphertext in Cloud Computing[J].IEEE Transactions on Cloud Computing,2017,5(4):617-627.
[24]ZHAO Z Y,ZHU Z Q,WANG J H,et al Attribute based encryption scheme with revocable attributes and constant ciphertext length[J].Acta Electronica Sinica,2018,46(10):2391-239.
[25]BLOOM B H.Space/time trade-offs in hash coding with allowable errors[J].Communications of the ACM,1970,13(7):422-426.
[26]GE A,RUI Z,CHENG C,et al.Threshold Ciphertext Policy Attribute-Based Encryption with Constant Size Ciphertexts[C]//Australasian Conference on Information Security & Privacy.Berlin/Heidelberg:Springer,2012:336-349.
[27]ZHANG K,LI Y P,LU L F.Privacy-Preserving Attribute-Based Keyword Search with Traceability and Revocation for Cloud-Assisted IoT[J/OL].Security and Communication Networks,2021,2021,9929663.https://www.xueshufan.com/publication/3171431550.
[28]CHEN R,LI Z.Blockchain-Based Mechanism for ElectronicHealthy Records Sharing Using Fine-grained Authorization[C]//2021 7th International Conference on Computer and Communications(ICCC).2021:1557-1564.
[29]MIAO Y,MA J,LIU X,et al.Attribute-Based Keyword Search over Hierarchical Data in Cloud Computing[J].IEEE Transactions on Services Computing,2020,13(6):985-998.
[30]LI Q,XIA B,HUANG H,et al.TRAC:Traceable and Revocable Access Control Scheme for mHealth in 5G-Enabled IIoT[J].IEEE Transactions on Industrial Informatics,2022,18(5):3437-3448.
[1] ZHOU Qian, DAI Hua, SHENG Wen-jie, HU Zheng, YANG Geng. Research on Verifiable Keyword Search over Encrypted Cloud Data:A Survey [J]. Computer Science, 2022, 49(10): 272-278.
[2] YANG Run-yan, CHENG Gao-feng, LIU Jian. Study on Keyword Search Framework Based on End-to-End Automatic Speech Recognition [J]. Computer Science, 2022, 49(1): 53-58.
[3] HE Heng, JIANG Jun-jun, FENG Ke, LI Peng, XU Fang-fang. Efficient Multi-keyword Retrieval Scheme Based on Attribute Encryption in Multi-cloud Environment [J]. Computer Science, 2021, 48(11A): 576-584.
[4] MA Xiao-xiao and HUANG Yan. Publicly Traceable Accountable Ciphertext Policy Attribute Based Encryption Scheme Supporting Large Universe [J]. Computer Science, 2020, 47(6A): 420-423.
[5] GUANJian, WANG Jing-bin, BIAN Qian-hong. Multi-keyword Streaming Parallel Retrieval Algorithm Based on Urban Security Knowledge Graph [J]. Computer Science, 2019, 46(2): 35-41.
[6] DAI Hua, LI Xiao, ZHU Xiang-yang, YANG Geng, YI Xun. Research on Multi-keyword Ranked Search over Encrypted Cloud Data [J]. Computer Science, 2019, 46(1): 6-12.
[7] ZHANG Guang-hua, LIU Hui-meng, CHEN Zhen-guo. Attribute-based Revocation Scheme in Cloud Computing Environment [J]. Computer Science, 2018, 45(8): 134-140.
[8] DAI Hua, BAO Jing-jing, ZHU Xiang-yang, YI Xun, YANG Geng. Integrity-verifying Single Keyword Search Method in Clouds [J]. Computer Science, 2018, 45(12): 92-97.
[9] ZHANG Xun, GU Chun-hua, LUO Fei, CHANG Yao-hui and WEN Geng. Virtual Machine Placement Strategy Based on Dynamic Programming [J]. Computer Science, 2017, 44(8): 54-59.
[10] HE Heng, XIA Wei, ZHANG Ji, JIN Yu and LI Peng. Fuzzy Multi-keyword Retrieval Scheme over Encrypted Data in Cloud Computing [J]. Computer Science, 2017, 44(5): 146-152.
[11] DUAN Yang-yang and LI Shi-yang. Anonymous Multi-user Searchable Encryption Scheme with Hierarchial Permission Management [J]. Computer Science, 2016, 43(2): 159-162.
[12] ZHENG Zhi-yun, WANG Zhen-tao, ZHANG Xing-jin and WANG Zhen-fei. Keyword Expansion Query Approach over RDF Data Based on Bipartite Graph [J]. Computer Science, 2016, 43(11): 272-279.
[13] ZHANG Yong, LI Quan-lin and LIU Bo. XML Keyword Search Algorithm Based on Intelligent Grouping Strategy [J]. Computer Science, 2016, 43(10): 229-233.
[14] CHEN Jian, WANG Xiao-ying, WANG Yong-tao and LI Yao-sen. Efficient Attribute Based Key Agreement Protocol [J]. Computer Science, 2015, 42(Z6): 444-446.
[15] ZHENG Zhi-yun LIU Bo LI Lun WANG Zhen-fei. Research of Keyword Search Model over RDF Data Graph [J]. Computer Science, 2015, 42(7): 234-239.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!