An Attribute-Based Searchable Encryption Scheme for Non-Monotonic Access Structure

An Attribute-Based Searchable Encryption Scheme for Non-Monotonic Access Structure

Mamta ­, Brij B. Gupta
Copyright: © 2020 |Pages: 21
DOI: 10.4018/978-1-7998-2242-4.ch013
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Attribute based encryption (ABE) is a widely used technique with tremendous application in cloud computing because it provides fine-grained access control capability. Owing to this property, it is emerging as a popular technique in the area of searchable encryption where the fine-grained access control is used to determine the search capabilities of a user. But, in the searchable encryption schemes developed using ABE it is assumed that the access structure is monotonic which contains AND, OR and threshold gates. Many ABE schemes have been developed for non-monotonic access structure which supports NOT gate, but this is the first attempt to develop a searchable encryption scheme for the same. The proposed scheme results in fast search and generates secret key and search token of constant size and also the ciphertext components are quite fewer than the number of attributes involved. The proposed scheme is proven secure against chosen keyword attack (CKA) in selective security model under Decisional Bilinear Diffie-Hellman (DBDH) assumption.
Chapter Preview
Top

Introduction

Recently, cloud computing has become a technology trend. Considering its flexibility, affordability and availability more and more organizations are shifting to cloud paradigm as it also unburdens them from the cumbersome task of data management. Although, cloud computing provides some innovative benefits yet this concept has also raised some privacy concerns as the data stored over third party cloud server cloud be misused. To address such concerns the concept of searchable encryption is introduced which not only provides data security by encrypting data but also facilitate seamless search over encrypted data (Zheng, et. al, 2017; Yu et al., 2018; Premkamal et al., 2020; Olakanmi et al., 2019;).

To develop a searchable encryption scheme using public key cryptographic primitives, there are several options like identity-based encryption (IBE), attribute-based encryption (ABE), homomorphic encryption (HE) and function encryption (FE) etc. In this paper, we have used attribute-based encryption scheme and particularly its ciphertext policy (CP) framework to build a searchable encryption scheme (CP-ABSE) for non-monotonic access structure. All the searchable encryption schemes based on ABE which have developed so far considers the access structure to be monotonic which does not support negative attributes. To support non-monotonic access structure, we have used a reduced ordered binary decision diagram (ROBDD) which efficiently supports all the Boolean operations (AND, OR, NOT) over attributes. The first attempt of using ordered binary decision diagram for the construction of ABE was done by Li et al. (2017). But the access structure represented by OBDD contains many redundant nodes which leads to increased computation cost. Hence, to reduce this cost we have used ROBDD which does not contain any redundant node and developed a CP-ABSE scheme which is efficient in terms of computational and storage cost.

Contributions

The major contributions of this chapter are as follows:

  • In attribute-based searchable encryption scheme the access policy is assumed to be monotonic which does not support negative attributes. If an access policy can handle the negative attributes in addition to AND, OR gates; then it is known to have more expressiveness. Most of the attribute-based searchable encryption schemes do not possess this feature. The proposed scheme in this chapter is an attempt to increase the expressiveness of the access policy in terms of the support for the negative attributes.

  • To achieve the primary goal stated above, the authors have used reduced ordered binary decision diagrams which can represent any Boolean formula with great efficiency. In the literature OBDD have been used to develop the ABE scheme but this is the first attempt where authors have further applied reduction methods to minimize the redundant nodes in an OBDD.

  • The size of the ciphertext is independent of the number of attributes in the access policy, thus a reduction in storage cost is observed. Further, the number of pairing operations in the search operation are again independent of the number of attributes which results in fast search.

Complete Chapter List

Search this Book:
Reset