Searchable Attribute-Based Encryption Protocol with Hidden Keywords in Cloud

With the continuous development of mobile devices, the emergence of 5G networks, a large number of applications for cloud computing, the computing and storage performance of mobile devices has been greatly improved. The social network applications are platform for communication between users. Although their form is diverse, they focus on connecting different users, enabling users to communicate and interact conveniently to meet social needs. However, the rise of mobile social networks still faces many challenges, including information security, privacy preserving and access control. The predecessors did a lot work at resource consuming traditional cryptographic methods and in case of the mess data, the profile matching process is inefficient. Aiming at solving these problems, a searchable encryption scheme with hidden keywords and fine-grained access control is proposed in this paper. Profile owners can design the flexible access policy on their personal profile. With the hidden keywords, the efficient of profile matching has largely increased. Security analysis shows that the proposed scheme can prevent the leakage of privacy information and the hidden keywords. Detailed performance analysis demonstrates the efficiency and the practicability.

[1]  Yanmei Li,et al.  Traceable and Complete Fine-Grained Revocable Multi-authority Attribute-Based Encryption Scheme in Social Network , 2017, SpaCCS.

[2]  Fang Qi,et al.  Efficient Private Matching Scheme for Friend Information Exchange , 2015, ICA3PP.

[3]  Guojun Wang,et al.  A Privacy Preserving Friend Discovery Strategy Using Proxy Re-encryption in Mobile Social Networks , 2016, SpaCCS.

[4]  Xiaolei Dong,et al.  TR-MABE: White-box traceable and revocable multi-authority attribute-based encryption and its applications to multi-level privacy-preserving e-healthcare cloud computing systems , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).

[5]  Xiaolei Dong,et al.  Securing m-healthcare social networks: challenges, countermeasures and future directions , 2013, IEEE Wireless Communications.

[6]  Ming Li,et al.  FindU: Privacy-preserving personal profile matching in mobile social networks , 2011, 2011 Proceedings IEEE INFOCOM.

[7]  Yaling Zhang,et al.  A keyword searchable attribute-based encryption scheme with attribute update for cloud storage , 2018, PloS one.

[8]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[9]  Yang Xiaoyuan,et al.  A Fully Secure KP-ABE Scheme in the Standard Model , 2015 .

[10]  Shouhuai Xu,et al.  VABKS: Verifiable attribute-based keyword search over outsourced encrypted data , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[11]  Xiaoyuan Yang,et al.  Secure Cloud File System with Attribute Based Encryption , 2013, 2013 5th International Conference on Intelligent Networking and Collaborative Systems.

[12]  Robert H. Deng,et al.  Adaptable key-policy attribute-based encryption with time interval , 2017, Soft Comput..

[13]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[14]  Youngho Park,et al.  A Fully Secure Ciphertext-Policy Attribute-Based Encryption With a Tree-Based Access Structure , 2015, J. Inf. Sci. Eng..

[15]  Wujun Zhang,et al.  Attribute-Based Fine-Grained Access Control with User Revocation , 2014, ICT-EurAsia.