Secure Fine-Grained Keyword Search With Efficient User Revocation and Traitor Tracing in the Cloud

Secure Fine-Grained Keyword Search With Efficient User Revocation and Traitor Tracing in the Cloud

Mamta, Brij B. Gupta
Copyright: © 2020 |Pages: 26
DOI: 10.4018/JOEUC.2020100106
Article PDF Download
Open access articles are freely available for download

Abstract

Fine-grained searching is an important feature in multi-user cloud environment and a combination of attribute-based encryption (ABE) and searchable encryption (SE) is used to facilitate it. This combination provides a powerful tool where multiple data owners can share their data with multiple data users in an independent and differential manner. In this article, the authors have used key-policy design framework of attribute-based encryption to construct the multi-keyword search scheme where access rights assigned to a data user are associated with his/her secret key. This leads to a situation where a data user can abuse his secret key to distribute it illegally to the unauthorized users to perform search over the shared data which is not intended for him/her. Therefore, to track such kind of key abusers the authors have embedded an extra functionality of tracing the traitors. For this purpose, each user is assigned a unique identity in the form of binary string where each bit represents an attribute related to his identity. In addition to the normal attributes, the access structure of a user also possesses identity-related attributes which are hidden from the user along with some normal attributes. Hence, the proposed scheme supports partial anonymity. Further, in the event of user revocation the proposed scheme efficiently handles the system update process by delegating the computationally intensive tasks to the cloud server. Finally, the proposed scheme is proved secure under Decisional Bilinear Diffie-Hellman (DBDH) assumption and decision linear assumption in the selective security model.
Article Preview
Top

Introduction

Cloud computing is one of the most promising technologies of the recent times as it has fundamentally changed the way we store and access our data. In cloud, the storage and management of data is delegated to a remote cloud server. This unburdens the user from the overhead of local storage and management of data and moreover, this stored data could be accessed anywhere anytime and on any device. Owing to these advantages more and more users are shifting towards cloud-based storage. But apart from these benefits there are some privacy concerns associated with the data stored over the cloud because the data is stored over a remote server which could not be fully trusted. One simple solution to this issue could be to store the data in an encrypted form. This definitely solve the issue of data privacy but will beget another problem (Gupta, 2016; Gupta, 2018). Searching operation is one of the most basic and essential operations and encryption of data will severely debilitate this basic operation. Hence, there arises a need for a technique which should be conducive for search operation and at the same time ensures the privacy of data. Secure searchable encryption is the answer for this need (Yu, 2018; Yu, 2018; Gupta, 2017; Subramaniyaswamy, 2017).

Searchable encryption (SE) scheme enables the cloud server to perform keyword search over encrypted data without disclosing any information about the keyword being searched (San Nicolas-Rocca, T., 2013). SE scheme can be developed using either symmetric key or asymmetric/public key cryptographic primitive. Between these two, public key setting is a more preferable choice as it solves the issue of complicated key sharing in symmetric key setting when there are multiple users in the system. Further, there are several choices available in public key setting like Identity Based Encryption (IBE), Attribute Based Encryption (ABE), Functional Encryption (FE), etc. In this paper, we have used ABE scheme and particularly the key-policy (KP) design framework to develop SE scheme as it provides fine-grained searching capability in multi-user setting. In KP-ABE, the access policy is embedded in the secret key of the user. Any authorized user can misuse his/her access rights by sharing his secret key with other users who are not supposed to have access to the information. Consider a database which contains digital media in an encrypted form and a user is provided access depending upon the subscription and the amount he paid. There is no way of tracing if the user who has got the subscription is not sharing his secret credentials with other users, which usually happens. To prevent such unauthorized searching and retrieval of information, we have added an extra functionality of tracing given by Yu et al. (2010). There are several key-policy attribute based keyword search schemes in the literature given by Zheng et al. (2014), Li et al. (2017), Ameri et al. (2018) and Mamta and Gupta (2019) but none of them has incorporated the feature of tracing the key abusers, which is the main contribution of this paper. Following are the key highlights of the proposed scheme:

  • It provides protection against key abusers by incorporating extra ciphertext components which are used for tracing the identity of the traitors. The ciphertext used in the normal operation and in the tracing operation is indistinguishable under decisional linear assumption.

  • It efficiently handles the event of user revocation by delegating the task of updating the secret key of remaining users to the cloud.

  • The proposed scheme takes multi-valued attributes and also partially hides the access structure associated with the user.

  • The proposed scheme performs multi-keyword search and supports monotonic predicate which consists of AND, OR and threshold gates. It uses the top-down approach for distributing the secret values to an access structure.

  • The proposed scheme is proved secure against chosen keyword attack in selective security model under decisional Diffie-Hellman assumption.

Complete Article List

Search this Journal:
Reset
Volume 36: 1 Issue (2024)
Volume 35: 3 Issues (2023)
Volume 34: 10 Issues (2022)
Volume 33: 6 Issues (2021)
Volume 32: 4 Issues (2020)
Volume 31: 4 Issues (2019)
Volume 30: 4 Issues (2018)
Volume 29: 4 Issues (2017)
Volume 28: 4 Issues (2016)
Volume 27: 4 Issues (2015)
Volume 26: 4 Issues (2014)
Volume 25: 4 Issues (2013)
Volume 24: 4 Issues (2012)
Volume 23: 4 Issues (2011)
Volume 22: 4 Issues (2010)
Volume 21: 4 Issues (2009)
Volume 20: 4 Issues (2008)
Volume 19: 4 Issues (2007)
Volume 18: 4 Issues (2006)
Volume 17: 4 Issues (2005)
Volume 16: 4 Issues (2004)
Volume 15: 4 Issues (2003)
Volume 14: 4 Issues (2002)
Volume 13: 4 Issues (2001)
Volume 12: 4 Issues (2000)
Volume 11: 4 Issues (1999)
Volume 10: 4 Issues (1998)
Volume 9: 4 Issues (1997)
Volume 8: 4 Issues (1996)
Volume 7: 4 Issues (1995)
Volume 6: 4 Issues (1994)
Volume 5: 4 Issues (1993)
Volume 4: 4 Issues (1992)
Volume 3: 4 Issues (1991)
Volume 2: 4 Issues (1990)
Volume 1: 3 Issues (1989)
View Complete Journal Contents Listing