An efficient attribute-based online/offline searchable encryption and its application in cloud-based reliable smart grid

Abstract Recently the cloud computing popularity is becoming high, and most of the organizations turned to outsource their sensitive data and maintenance to the cloud server. However, outsourcing sensitive data to the cloud raises both data security and confidentiality question. Consequently, encryption techniques play an important role in securing data within the cloud. Although outsourcing data in an encrypted form protect the data, searching and data retrieving encrypted data is a challenge. Therefore, to facilitate the burden of working on encrypted data, this paper introduces an attribute-based online/offline searchable encryption scheme with the following contributions: First, encryption and trapdoor algorithms separated into two phases. Second, both the message encryption and attribute control policy are performed at offline phase. Third, we prove that the proposed scheme is secure against both chosen plaintext and chosen keyword attacks. Finally, we explain the applicability of the proposed scheme in cloud-based smart grid. Cloud computing, due to its nature, needs adaptive scheme to tackle some of its challenges.

[1]  Yiwei Thomas Hou,et al.  Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud , 2016, IEEE Transactions on Parallel and Distributed Systems.

[2]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.

[3]  Rafail Ostrovsky,et al.  Searchable symmetric encryption: Improved definitions and efficient constructions , 2011, J. Comput. Secur..

[4]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[5]  Thomas J. Overbye,et al.  An Authenticated Control Framework for Distributed Voltage Support on the Smart Grid , 2010, IEEE Transactions on Smart Grid.

[6]  Jin Li,et al.  Insight of the protection for data security under selective opening attacks , 2017, Inf. Sci..

[7]  Zhiguang Qin,et al.  A Lightweight Fine-Grained Search Scheme over Encrypted Data in Cloud-Assisted Wireless Body Area Networks , 2019, Wirel. Commun. Mob. Comput..

[8]  Fatos Xhafa,et al.  L-EncDB: A lightweight framework for privacy-preserving data queries in cloud computing , 2015, Knowl. Based Syst..

[9]  Silvio Micali,et al.  On-line/off-line digital signatures , 1996, Journal of Cryptology.

[10]  Brent Waters,et al.  Online/Offline Attribute-Based Encryption , 2014, IACR Cryptol. ePrint Arch..

[11]  Willy Susilo,et al.  Searchable Attribute-Based Mechanism With Efficient Data Sharing for Secure Cloud Storage , 2015, IEEE Transactions on Information Forensics and Security.

[12]  Charalampos Papamanthou,et al.  Dynamic searchable symmetric encryption , 2012, IACR Cryptol. ePrint Arch..

[13]  Rafail Ostrovsky,et al.  Public Key Encryption with Keyword Search , 2004, EUROCRYPT.

[14]  Robert H. Deng,et al.  Private Query on Encrypted Data in Multi-user Settings , 2008, ISPEC.

[15]  Yuan Li,et al.  A Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Keyword Search Function , 2013, CSS.

[16]  Willy Susilo,et al.  Public key encryption with keyword search secure against keyword guessing attacks without random oracle , 2013, Inf. Sci..

[17]  Dawn Xiaodong Song,et al.  Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[18]  Hai Liu,et al.  A fair data access control towards rational users in cloud storage , 2017, Inf. Sci..

[19]  Jiguo Li,et al.  KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage , 2017, IEEE Transactions on Services Computing.

[20]  Yael Tauman Kalai,et al.  Improved Online/Offline Signature Schemes , 2001, CRYPTO.

[21]  Fuchun Guo,et al.  Identity-Based Online/Offline Encryption , 2008, Financial Cryptography.

[22]  Juanjuan Li,et al.  New Ciphertext-Policy Attribute-Based Encryption with Efficient Revocation , 2014, 2014 IEEE International Conference on Computer and Information Technology.

[23]  Pieter H. Hartel,et al.  Computationally Efficient Searchable Symmetric Encryption , 2010, Secure Data Management.

[24]  Tao Zhang,et al.  The design of information security protection framework to support Smart Grid , 2010, 2010 International Conference on Power System Technology.

[25]  Jin Li,et al.  Multi-authority fine-grained access control with accountability and its application in cloud , 2018, J. Netw. Comput. Appl..

[26]  Lifeng Guo,et al.  Efficient Secure-Channel Free Public Key Encryption with Keyword Search for EMRs in Cloud Storage , 2015, Journal of Medical Systems.