A Multi-keyword Multi-user Searchable Encryption Scheme Based on Cloud Storage

With the development of cloud computing, the huge growth of data from electronic business or social network leads to a trend that the owners of data are inclined to outsource their data (usually encrypted) to cloud storage servers. Leveraging searchable encryption technologies can not only guarantee the confidentiality and integrity of the data, but also achieve an effective search on encrypted data. Compared with the single keyword search, the multi-keyword search has an important practical significance for its more precise retrieval of data. Meanwhile, aimed at the defects in existing searchable encryption schemes, such as the unsatisfactory search efficiency and no support for multi-user search, etc., in this paper, we propose a multi-keyword multi-user searchable encryption scheme based on cloud storage, which is realized through secure interactions between authorized users and cloud severs. Our proposal adopts the encryption of exponent which is realized through secure interactions between authorized users and cloud severs involved generation of secure trapdoor and is of indistinguishability against adaptive chosen keyword attack (IND-CKA). Subsequently, theoretical and empirical evaluations demonstrate the desirable retrieval efficiency of our proposal compared with current methods. And meanwhile, our proposal achieves the access controllability of the encrypted data, and is of dynamic addition and revocation of authorized users, at the same time is of dynamic update of the user accessing to files.

[1]  Lucas Ballard,et al.  Achieving Efficient Conjunctive Keyword Searches over Encrypted Data , 2005, ICICS.

[2]  Lingyu Wang,et al.  Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage , 2016, IEEE Transactions on Computers.

[3]  Brent Waters,et al.  Secure Conjunctive Keyword Search over Encrypted Data , 2004, ACNS.

[4]  Dawn Xiaodong Song,et al.  Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[5]  Rafail Ostrovsky,et al.  Public Key Encryption with Keyword Search , 2004, EUROCRYPT.

[6]  Hua Zhang,et al.  An efficient Public Key Encryption with Conjunctive Keyword Search scheme based on pairings , 2012, 2012 3rd IEEE International Conference on Network Infrastructure and Digital Content.

[7]  Willy Susilo,et al.  Searchable Attribute-Based Mechanism With Efficient Data Sharing for Secure Cloud Storage , 2015, IEEE Transactions on Information Forensics and Security.

[8]  Yanqin Zhu,et al.  Multi-user Searchable Encryption with Fine-Grained Access Control without Key Sharing , 2014, 2014 3rd International Conference on Advanced Computer Science Applications and Technologies.

[9]  Yang Yang,et al.  Proxy re-encryption conjunctive keyword search against keyword guessing attack , 2013, 2013 Computing, Communications and IT Applications Conference (ComComAp).

[10]  Peng Changgen,et al.  Certificateless public key encryption with keyword search , 2014, China Communications.

[11]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[12]  Florian Kerschbaum Secure conjunctive keyword searches for unstructured text , 2011, 2011 5th International Conference on Network and System Security.