Efficient and Searchable ABE Scheme in Cloud Computing
Keywords:
Attribute-Based Encryption, Cloud Computing, Searchable Encryption, Attribute Revocation.Abstract
Searchable Attribute based encryption is a promising technique that achieves flexible and fine-grained data access control over encrypted data, which is very suitable for a secure data sharing environment such as the currently popular cloud computing. However, traditional attribute-based encryption fails to provide an efficient keyword based search on encrypted data, which somewhat weakens the power of this encryption technique, as search is usually the most important approach to quickly obtain data of interest from large-scale dataset. To overcome this issue, the fundamental way is to do encryption of data. So, a secure user can have imposed with data access control system must be given before the users store any data to the cloud for storage. Attribute Based Encryption (ABE) system is one of the asymmetric key based cryptosystems that has received much focus that provides fine-grained access control to data outsourced on the cloud. In this paper, we propose a more proficient and most important type of Attribute Based Encryption technique that not only considers the Outsourced ABE construction but also address the issue of revocation in case of user leaving the group or organization; once a user is removed from the group, the keys are updated and these updated new keys are shared between the existing users also our system supports the keyword search over encrypted data in the mobile cloud storage. In multi keyword search; users and data owners can establish the keywords index and search trapdoor, respectively, without relying on the online trusted authority. Experimental results show that the performance of the proposed system is better than existing system in terms of security, data availability, time consumption and memory utilization.
References
- Y. Li, F. Zhou, Y. Qin, M. Lin, and Z. Xu, \Integrity veriable conjunctive keyword searchable encryption in cloud storage," Int. J. Inf. Secur., vol. 17, pp. 1 20, Nov. 2017, doi: 10.1007/s10207-017-0394-9.
- D. Cash, J. Jaeger, S. Jarecki, C. Jutla, H. Krawczyk, M.- C. Rosu, and M. Steiner, "Dynamic searchable encryption in very large databases: Data structures and implementation", in Proc. of NDSS, vol. 14, 2014.
- J. Lai, R. Deng, C. Guan, and J. Weng, Attribute-based Encryption with Verifiable Outsourced Decryption Trans. Inf. Forensics Security, vol. 8, no. 8, pp. 1343-1354, Aug. 2013.
- M. Green, S. Hohenberger, and B.Waters, \ Outsourcing the decryption of ABE ciphertexts," in Proc. 20th USENIX Conf. Secur. (SEC). Berkeley, CA, USA: USENIX Association,2011, p. 34.
- S. Yu, C.Wang, K. Ren, and W.Lou, Achieving Secure, Scalable, Fine-Grained Data Access Control in Cloud Computing, in Proc. IEEE 29th INFOCOM, 2010, pp.534-542.
- L. Cheung and C. Newport, Provably Secure Ciphertext Policy ABE, in Proc. 14th ACM Conf. CCS, 2007, pp. 456- 465.
- V. Goyal, O. Pandey, A. Sahai, and B. Waters, Attribute- Based Encryption for Fine-Grained Access Control of Encrypted Data, in 2006, Proc. 13th ACM Conf. Comput. Commun. Security, pp. 89-98.
- R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, Searchable symmetric encryption: improved definitions and efficient constructions, in Proceedings of the 13th ACM conference on Computer and communications security. ACM, 2006, pp. 79-88.
- A. Sahai and B. Waters, Fuzzy Identity-Based Encryption, in Proc. Adv. Cryptol.- EUROCRYPT, LNCS 3494, R. Cramer, Ed., Berlin, Germany, 2005, pp. 457-473, Springer- Verlag.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRSET
This work is licensed under a Creative Commons Attribution 4.0 International License.