Fine-Grained Comparable Encryption Scheme in Multi-User Settings

Data sharing plays an increasing important role in cloud service. With the help of cloud computing platform, the data sharing becomes easy. In order to ensure data confidentiality, data should be encrypted before uploading to the cloud servers. In this paper, a new comparable encryption scheme is proposed. The comparison of encrypted data is extended to multi-user scenarios in our scheme. And the access control based on attribute-based encryption is also introduced in the proposed scheme. The data encrypted by different keys should be transformed into comparable form before the comparison operations. And the user, whose attributes satisfies the access policy, can convert the data into comparable form. Experimental data shows that our scheme is practical in cloud computing.

[1]  Ramakrishnan Srikant,et al.  Order preserving encryption for numeric data , 2004, SIGMOD '04.

[2]  Mark Zhandry,et al.  Semantically Secure Order-Revealing Encryption: Multi-input Functional Encryption Without Obfuscation , 2015, EUROCRYPT.

[3]  Yong Yu,et al.  Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage , 2017, IEEE Transactions on Information Forensics and Security.

[4]  Jun Furukawa Request-Based Comparable Encryption , 2013, ESORICS.

[5]  Fei Xue,et al.  Cloud outsourcing computing security protocol of matrix multiplication computation based on similarity transformation , 2018, Int. J. Wirel. Mob. Comput..

[6]  Oladayo Olufemi Olakanmi,et al.  An Efficient Privacy-preserving Approach for Secure Verifiable Outsourced Computing on Untrusted Platforms , 2019, Int. J. Cloud Appl. Comput..

[7]  Keita Xagawa,et al.  Cryptanalysis of Comparable Encryption in SIGMOD'16 , 2017, SIGMOD Conference.

[8]  Nathan Chenette,et al.  Order-Preserving Symmetric Encryption , 2009, IACR Cryptol. ePrint Arch..

[9]  Rajkumar Buyya,et al.  Next generation cloud computing: New trends and research directions , 2017, Future Gener. Comput. Syst..

[10]  Xiaofeng Chen,et al.  Efficient request-based comparable encryption scheme based on sliding window method , 2016, Soft Comput..

[11]  Siu-Ming Yiu,et al.  HybridORAM: Practical oblivious cloud storage with constant bandwidth , 2018, Inf. Sci..

[12]  Fengjun Li,et al.  Practical and Secure Outsourcing Algorithms of Matrix Operations Based on a Novel Matrix Encryption Method , 2019, IEEE Access.

[13]  Panagiotis Karras,et al.  Adaptive Indexing over Encrypted Numeric Data , 2016, SIGMOD Conference.

[14]  Antonio Pescapè,et al.  Integration of Cloud computing and Internet of Things: A survey , 2016, Future Gener. Comput. Syst..

[15]  Nickolai Zeldovich,et al.  An Ideal-Security Protocol for Order-Preserving Encoding , 2013, 2013 IEEE Symposium on Security and Privacy.