A shareable keyword search over encrypted data in cloud computing

Cloud storage is one of the most important applications in our daily lives. User can store their own data into cloud storage and remotely access the saved data. Owing to the social media develops, users can share the digital files to other users, leading to the amount of data growing rapidly and searching abilities necessarily. In the some cases, servers cannot avoid data leakage even if the server provides complete access control. The encrypted data is a best way to resolve this problem but it may eliminate original structure and searching may become impossible. Applying searchable encryption for each receiver may produce messy duplication and occupy the quota of cloud storage from each receiver. User requires keeping their shared documents belonging up to date which are compared with the latest version. To this aim, we thus propose a sharable ID-based encryption with keyword search in cloud computing environment, which enables users to search in data owners’ shared storage while preserving privacy of data. For the performance analysis, we demonstrate the compared resultant with others ID-based or ID-relative encryption. In addition to that, we show the formal proof to verify the security of our proposed.

[1]  Rafail Ostrovsky,et al.  Searchable symmetric encryption: improved definitions and efficient constructions , 2006, CCS '06.

[2]  Jung Hee Cheon,et al.  Batch Verifications with ID-Based Signatures , 2004, ICISC.

[3]  Jin Li,et al.  Enabling efficient and secure data sharing in cloud computing , 2014, Concurr. Comput. Pract. Exp..

[4]  Dan Boneh,et al.  Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..

[5]  Qiang Tang,et al.  Towards asymmetric searchable encryption with message recovery and flexible search authorization , 2013, ASIA CCS '13.

[6]  Florian Kerschbaum Secure conjunctive keyword searches for unstructured text , 2011, 2011 5th International Conference on Network and System Security.

[7]  Yanjiang Yang,et al.  Multi-User Private Keyword Search for Cloud Computing , 2011, 2011 IEEE Third International Conference on Cloud Computing Technology and Science.

[8]  Mihir Bellare,et al.  Deterministic and Efficiently Searchable Encryption , 2007, CRYPTO.

[9]  Ming Li,et al.  Authorized Private Keyword Search over Encrypted Data in Cloud Computing , 2011, 2011 31st International Conference on Distributed Computing Systems.

[10]  Joonsang Baek,et al.  Public Key Encryption with Keyword Search Revisited , 2008, ICCSA.

[11]  A. Tripathy,et al.  A secure and searchable data storage in Cloud computing , 2013, 2013 3rd IEEE International Advance Computing Conference (IACC).

[12]  Dong Hoon Lee,et al.  Improved searchable public key encryption with designated tester , 2009, ASIACCS '09.

[13]  Hua Zhang,et al.  An efficient Public Key Encryption with Conjunctive Keyword Search scheme based on pairings , 2012, 2012 3rd IEEE International Conference on Network Infrastructure and Digital Content.

[14]  Pieter H. Hartel,et al.  Public-Key Encryption with Delegated Search , 2011, ACNS.

[15]  Rafail Ostrovsky,et al.  Public Key Encryption with Keyword Search , 2004, EUROCRYPT.

[16]  Satoshi Fujita,et al.  Cost-Effective Replication Schemes for Query Load Balancing in DHT-Based Peer-to-Peer File Searches , 2014, J. Inf. Process. Syst..

[17]  Im-Yeong Lee,et al.  A Secure Index Management Scheme for Providing Data Sharing in Cloud Storage , 2013, J. Inf. Process. Syst..

[18]  Robert H. Deng,et al.  Expressive search on encrypted data , 2013, ASIA CCS '13.

[19]  Julien Bringer,et al.  Embedding edit distance to enable private keyword search , 2012, Human-centric Computing and Information Sciences.

[20]  Masami Mohri,et al.  Provably secure attribute-based encryption with attribute revocation and grant function using proxy re-encryption and attribute key for updating , 2015, Human-centric Computing and Information Sciences.

[21]  Chen-Mou Cheng,et al.  Design and implementation of multi-user secure indices for encrypted cloud storage , 2013, 2013 Eleventh Annual Conference on Privacy, Security and Trust.

[22]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[23]  Jie Wu,et al.  Secure and privacy preserving keyword searching for cloud storage services , 2012, J. Netw. Comput. Appl..

[24]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[25]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..

[26]  Yong Wang,et al.  ID-Based Encryption with Keyword Search Scheme from Bilinear Pairings , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.

[27]  Peishun Wang,et al.  Keyword Field-Free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic Groups , 2008, CANS.

[28]  Hovav Shacham,et al.  Short Signatures from the Weil Pairing , 2001, J. Cryptol..

[29]  Jie Wu,et al.  An Efficient Privacy Preserving Keyword Search Scheme in Cloud Computing , 2009, 2009 International Conference on Computational Science and Engineering.

[30]  Cong Wang,et al.  Toward publicly auditable secure cloud data storage services , 2010, IEEE Network.