Abstract
Nowadays, for third-party cloud platforms are not fully trustable, in order to ensure data security and user privacy when storing data on cloud servers, many enterprises and users choose to store their data in the ciphertext form. So it is essential to search the needed cryptographic information in the cloud servers. In this paper, we proposed public key encryption module based on the attributes-multi keyword vector. Firstly, we adopt the prime order bilinear pairings method to improve time efficiency. Secondly, we introduced the attribute and keywords vector to optimize the vector encryption algorithm. Finally, considering conditions of the limited resources, we proposed the storage domain differentiation policy to save the computing resources and improve efficiency. In order to verify the result of this module, we built up a system based on jPBC, a Java class library. The result shows that the system can achieve the strict access control and multi-user shared fast search mechanism. In the future, it will be applied to the new medical cloud scenes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Baek, J., Safavi-Naini, R., Susilo, W.: Public key encryption with keyword search revisited. In: Gervasi, O., Murgante, B., Laganà , A., Taniar, D., Mun, Y., Gavrilova, M.L. (eds.) ICCSA 2008. LNCS, vol. 5072, pp. 1249–1259. Springer, Heidelberg (2008). doi:10.1007/978-3-540-69839-5_96
Boneh, D., Crescenzo, G., Ostrovsky, R., Persiano, G.: Public Key Encryption with Keyword Search. Springer, Berlin, Heidelberg (2003)
Chang, Y.C., Michael, M.: Privacy Preserving Keyword Searches on Remote Encrypted Data. Springer, Berlin, Heidelberg (2015)
Dong, C., Russello, G., Dulay, N.: Shared and searchable encrypted data for untrusted servers. J. Comput. Secur. 19(3), 367–397 (2008)
Bao, F., Deng, R.H., Ding, X., Yang, Y.: Private query on encrypted data in multi-user settings. In: Chen, L., Mu, Y., Susilo, W. (eds.) ISPEC 2008. LNCS, vol. 4991, pp. 71–85. Springer, Heidelberg (2008). doi:10.1007/978-3-540-79104-1_6
Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, 30 October–November, pp. 89–98 (2006)
Hattori, M., Hirano, T., Takashi, I., Matsuda, N., Takumi, M., Sakai, Y., Kazuo, O.: Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption in Multi-user Setting. Springer, Berlin, Heidelberg (2011)
Lai, J., Deng, R.H., Liu, S., Weng, J., Zhao, Y.: Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack. Springer, Berlin, Heidelberg (2014)
Michel, A., Mihir, B., Dario, C., Eike, K., Tadayoshi, K., Tanja, L., John, M.L., Gregory, N., Pascal, P., Shi, H.X.: Searchable encryption revisited: consistency properties, relation to anonymous ibe, and extensions. J. Cryptol. 21(3), 350–391 (2008)
Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005). doi:10.1007/11426639_27
Song, D., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: IEEE Symposium on Security & Privacy, pp. 44–55 (2000)
Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 53–70. Springer, Heidelberg (2011). doi:10.1007/978-3-642-19379-8_4
Yang, Y., Lu, H., Weng, J.: Multi-user private keyword search for cloud computing. In: Proceedings of IEEE International Conference on Cloud Computing Technology and Science, Cloudcom 2011, Athens, Greece, 29 November–December, pp. 264–271 (2011)
Zhu, B., Zhu, B., Ren, K.: Peksrand: providing predicate privacy in public-key encryption with keyword search. In: ICC, vol. 2010(4), pp. 1–6 (2011)
Acknowledgements
The authors gratefully acknowledge the contribution of the National Science Foundation of China [61572330][61472258], the Natural Science foundation of Guangdong Province [2014A030313554], and the Technology Planning Project (Grant No. 2014B010 118005) from Guangdong Province.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Wang, H., Li, J., Yang, Y., Ming, Z. (2017). Attribute-Based and Keywords Vector Searchable Public Key Encryption. In: Qiu, M. (eds) Smart Computing and Communication. SmartCom 2016. Lecture Notes in Computer Science(), vol 10135. Springer, Cham. https://doi.org/10.1007/978-3-319-52015-5_32
Download citation
DOI: https://doi.org/10.1007/978-3-319-52015-5_32
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-52014-8
Online ISBN: 978-3-319-52015-5
eBook Packages: Computer ScienceComputer Science (R0)