Parallel search over encrypted data under attribute based encryption on the Cloud Computing

Data confidentiality in the Cloud Computing is a very challenging task. Encryption is one of the most secure methods ensuring this task, and searchable encryption techniques are used to search on encrypted data without the need for decryption. But, despite this secure measure some leaks may appear when searching over data. In this article, we propose to improve confidentiality of outsourced data. We are particularly interested in reinforcing the access control on the search result, when the search is performed over encrypted data. The property behind this aspect of security is known as ACAS (Access Control Aware Search) principle. We present a hybridization of Searchable Encryption and Attribute Based Encryption techniques in order to satisfy the ACAS property. The proposed model supports a personalized and secure multi-user access to outsourced data, presenting high search performance. It deals with multi-keywords searches and is designed to speed up the search time by taking advantage of High Performance Computing, which is widely used in Cloud Computing. Two Attribute Based Encryption techniques are considered on the side of the Cloud and some conducted experiments show the efficiency of the proposed method.

[1]  Rajkumar Buyya,et al.  Cloud Computing Principles and Paradigms , 2011 .

[2]  Rafail Ostrovsky,et al.  Public Key Encryption with Keyword Search , 2004, EUROCRYPT.

[3]  Radu Sion,et al.  Proceedings of the 14th international conference on Financial cryptograpy and data security , 2010 .

[4]  Kristin E. Lauter,et al.  Cryptographic Cloud Storage , 2010, Financial Cryptography Workshops.

[5]  Milan Petkovic,et al.  Secure management of personal health records by applying attribute-based encryption , 2009, Proceedings of the 6th International Workshop on Wearable, Micro, and Nano Technologies for Personalized Health.

[6]  Aggelos Kiayias,et al.  BiTR: Built-in Tamper Resilience , 2011, IACR Cryptol. ePrint Arch..

[7]  Mudhakar Srivatsa,et al.  Search-as-a-service: Outsourced search over outsourced storage , 2009, TWEB.

[8]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[9]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[10]  Rafail Ostrovsky,et al.  Searchable symmetric encryption: improved definitions and efficient constructions , 2006, CCS '06.

[11]  Ronggang Zhang,et al.  Access Control for the Smart Meters Based on ABE , 2011, 2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery.

[12]  Dawn Xiaodong Song,et al.  Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[13]  Wenjing Lou,et al.  Attribute-based content distribution with hidden policy , 2008, 2008 4th Workshop on Secure Network Protocols.

[14]  Ieee Staff,et al.  2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA) , 2013 .

[15]  Ali Miri,et al.  Combining Attribute-Based and Access Systems , 2009, 2009 International Conference on Computational Science and Engineering.

[16]  Sushmita Ruj,et al.  Privacy Preserving Access Control with Authentication for Securing Data in Clouds , 2012, 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012).

[17]  Thouraya Bouabana-Tebibel,et al.  Access Control Aware Search on the Cloud Computing , 2014, 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[18]  Yong Cheng,et al.  Attributes Union in CP-ABE Algorithm for Large Universe Cryptographic Access Control , 2012, 2012 Second International Conference on Cloud and Green Computing.

[19]  Ronald Cramer,et al.  Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques , 2005 .

[20]  Jiankun Hu,et al.  A general transformation from KP-ABE to searchable encryption , 2014, Future Gener. Comput. Syst..

[21]  Yacine Challal,et al.  Secure Medical Architecture on the Cloud Using Wireless Sensor Networks for Emergency Management , 2013, 2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications.

[22]  Liwu Zhang,et al.  KP-ABE Based Verifiable Cloud Access Control Scheme , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.

[23]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[24]  Aggelos Kiayias,et al.  Traceable Signatures , 2004, EUROCRYPT.

[25]  Martin Gilje Jaatun,et al.  Beyond lightning: A survey on security challenges in cloud computing , 2013, Comput. Electr. Eng..

[26]  Thouraya Bouabana-Tebibel,et al.  Access control reinforcement over searchable encryption , 2014, Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014).

[27]  Brent Waters,et al.  Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.