Deniable search of encrypted cloud-storage data

Abstract Cloud storage services have grown extensively in recent years. For privacy and security purposes, outsourced data must be encrypted. Therefore, searching the encrypted cloud-stored data is a big challenge. Although there are plenty of searchable encryption schemes, most rely on keywords located in the encrypted data instead of more complex searching criteria. Moreover, they do not consider the malicious coercer issue. In this paper, we propose a searchable encryption scheme that supports expressive keyword-matching conditions and provides deniable searchability to the user.

[1]  Maged Hamada Ibrahim,et al.  A Method for Obtaining Deniable Public-Key Encryption , 2009, Int. J. Netw. Secur..

[2]  Joonsang Baek,et al.  Public Key Encryption with Keyword Search Revisited , 2008, ICCSA.

[3]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[4]  Fangguo Zhang,et al.  Deniable Searchable Symmetric Encryption , 2017, Inf. Sci..

[5]  Dong Hoon Lee,et al.  Off-Line Keyword Guessing Attacks on Recent Keyword Search Schemes over Encrypted Data , 2006, Secure Data Management.

[6]  Yangyang Zhang,et al.  A based on blinded CP-ABE searchable encryption cloud storage service scheme , 2018, Int. J. Commun. Syst..

[7]  Dawn Xiaodong Song,et al.  Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[8]  Yi Mu,et al.  Secure Fine-Grained Access Control and Data Sharing for Dynamic Groups in the Cloud , 2018, IEEE Transactions on Information Forensics and Security.

[9]  Marina Blanton,et al.  Deniable cloud storage: sharing files via public-key deniability , 2010, WPES '10.

[10]  Marek Klonowski,et al.  Practical Deniable Encryption , 2008, SOFSEM.

[11]  Jiankun Hu,et al.  A general transformation from KP-ABE to searchable encryption , 2014, Future Gener. Comput. Syst..

[12]  Rafail Ostrovsky,et al.  Attribute-based encryption with non-monotonic access structures , 2007, CCS '07.

[13]  Tao Zhang,et al.  A lightweight secure conjunctive keyword search scheme in hybrid cloud , 2019, Future Gener. Comput. Syst..

[14]  Atsuko Miyaji,et al.  A ciphertext-policy attribute-based encryption scheme with constant ciphertext length , 2009, Int. J. Appl. Cryptogr..

[15]  Lifeng Guo,et al.  A Decryptable Attribute-Based Keyword Search Scheme on eHealth Cloud in Internet of Things Platforms , 2020, IEEE Access.

[16]  Xiaofen Wang,et al.  Lightweight Searchable Encryption Protocol for Industrial Internet of Things , 2021, IEEE Transactions on Industrial Informatics.

[17]  Brent Waters,et al.  Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.

[18]  Willy Susilo,et al.  Searchable Attribute-Based Mechanism With Efficient Data Sharing for Secure Cloud Storage , 2015, IEEE Transactions on Information Forensics and Security.

[19]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.

[20]  Shouhuai Xu,et al.  VABKS: Verifiable attribute-based keyword search over outsourced encrypted data , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[21]  Zhiwei Wang,et al.  CP-ABE with Hidden Policy from Waters Efficient Construction , 2016, Int. J. Distributed Sens. Networks.

[22]  Brent Waters,et al.  Bi-Deniable Public-Key Encryption , 2011, CRYPTO.

[23]  Jiguo Li,et al.  KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage , 2017, IEEE Transactions on Services Computing.

[24]  P. MuraliKrishna,et al.  SECURE SCHEMES FOR SECRET SHARING AND KEY DISTRIBUTION USING PELL'S EQUATION , 2013 .

[25]  Markus Dürmuth,et al.  Deniable Encryption with Negligible Detection Probability: An Interactive Construction , 2011, EUROCRYPT.

[26]  Dan Boneh,et al.  Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.

[27]  Ximeng Liu,et al.  Secure Fine-Grained Encrypted Keyword Search for E-Healthcare Cloud , 2021, IEEE Transactions on Dependable and Secure Computing.

[28]  Rafail Ostrovsky,et al.  Public Key Encryption with Keyword Search , 2004, EUROCRYPT.

[29]  Yi Mu,et al.  Hidden Ciphertext Policy Attribute-Based Encryption With Fast Decryption for Personal Health Record System , 2019, IEEE Access.

[30]  Manik Lal Das,et al.  KeySea: Keyword-Based Search With Receiver Anonymity in Attribute-Based Searchable Encryption , 2022, IEEE Transactions on Services Computing.

[31]  Yaling Zhang,et al.  A keyword searchable attribute-based encryption scheme with attribute update for cloud storage , 2018, PloS one.

[32]  Elaine Shi,et al.  Multi-Dimensional Range Query over Encrypted Data , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[33]  Robert H. Deng,et al.  An efficient and expressive ciphertext-policy attribute-based encryption scheme with partially hidden access structures, revisited , 2018, Comput. Networks.

[34]  Rafail Ostrovsky,et al.  Deniable Encryption , 1997, IACR Cryptol. ePrint Arch..

[35]  Robert H. Deng,et al.  Expressive CP-ABE with partially hidden access structures , 2012, ASIACCS '12.

[36]  Brent Waters,et al.  Secure Conjunctive Keyword Search over Encrypted Data , 2004, ACNS.

[37]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[38]  Allison Bishop,et al.  Tools for Simulating Features of Composite Order Bilinear Groups in the Prime Order Setting , 2012, EUROCRYPT.

[39]  Brent Waters,et al.  Building an Encrypted and Searchable Audit Log , 2004, NDSS.

[40]  Mirco Musolesi,et al.  Precise time-matching in chimpanzee allogrooming does not occur after a short delay , 2018, PloS one.

[41]  Ratna Dutta,et al.  Computationally Efficient Expressive Key-Policy Attribute Based Encryption Schemes with Constant-Size Ciphertext , 2013, ICICS.

[42]  Xiaohua Jia,et al.  Improving the proof of “Privacy-preserving attribute-keyword based data publish-subscribe service on cloud platforms” , 2019, PloS one.

[43]  Kazuki Yoneyama,et al.  Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures , 2008, ACNS.

[44]  Chin-Laung Lei,et al.  Audit-Free Cloud Storage via Deniable Attribute-Based Encryption , 2018, IEEE Transactions on Cloud Computing.

[45]  Michael Mitzenmacher,et al.  Privacy Preserving Keyword Searches on Remote Encrypted Data , 2005, ACNS.

[46]  Jianfeng Ma,et al.  Attribute-Based Keyword Search over Hierarchical Data in Cloud Computing , 2020, IEEE Transactions on Services Computing.

[47]  Brent Waters,et al.  Conjunctive, Subset, and Range Queries on Encrypted Data , 2007, TCC.