Loading [MathJax]/extensions/MathMenu.js
A Verifiable and Efficient Secure Sharing Scheme in Multiowner Multiuser Settings | IEEE Journals & Magazine | IEEE Xplore

A Verifiable and Efficient Secure Sharing Scheme in Multiowner Multiuser Settings


Abstract:

Data security has remained a challenging problem in cloud storage, especially in multiowner data sharing scenarios. As one of the most effective solutions for secure data...Show More

Abstract:

Data security has remained a challenging problem in cloud storage, especially in multiowner data sharing scenarios. As one of the most effective solutions for secure data sharing, multikeyword ranked searchable encryption (MRSE) has been widely used. However, most of the existing MRSE schemes have some shortcomings in multiowner data sharing, such as index trees generated by data owners, relevance scores in plaintext form, and lack of verification function. In this article, we propose a verifiable and efficient secure sharing scheme in multiowner multiuser settings, where the index tree is generated by the trusted authority. To achieve verifiable functionality, the blockchain-based smart contract is adopted to execute the search algorithm. Based on a distributed two-trapdoor public-key cryptosystem, the data uploaded and used are in ciphertext form, and the proposed algorithms are secure in our scheme. For improving efficiency, the encrypted data are aggregated according to the category and the Category ID-based index tree is generated. Extensive experiments are conducted to demonstrate that it can reduce the time cost of index construction by 75% and the time cost of search by 53%, approximately. Moreover, multithreaded optimization is introduced in our scheme, which can reduce the time cost of index construction by 76% and the time cost of search by 67%, approximately (with 16 threads).
Published in: IEEE Systems Journal ( Volume: 17, Issue: 4, December 2023)
Page(s): 5798 - 5809
Date of Publication: 14 September 2023

ISSN Information:

Funding Agency:

References is not available for this document.

I. Introduction

Cloud computing offers economic savings and flexible usage [1], providing users with universal and efficient network access. Instead of purchasing lots of equipment to store and manage data, both individuals and enterprises are motivated to outsource their data to the cloud. However, the hidden security issues prompt cloud users to encrypt the data before outsourcing [2]. With the increasing network attacks, secure data sharing in multiowner scenarios still remains a significant challenge.

Select All
1.
L. M. Vaquero, L. Rodero-Merino, J. Caceres and M. Lindner, "A break in the clouds: Towards a cloud definition", ACM SIGCOMM Comput. Commun. Rev., vol. 39, no. 1, pp. 50-55, Jan. 2009.
2.
S. Kamara and K. Lauter, "Cryptographic cloud storage", Proc. Int. Conf. Financial Cryptogr. Data Secur., pp. 136-149, 2010.
3.
D. X. Song, D. Wagner and A. Perrig, "Practical techniques for searches on encrypted data", Proc. IEEE Symp. Secur. Privacy, pp. 44-55, 2000.
4.
X. Ge, J. Yu, R. Hao and H. Lv, "Verifiable keyword search supporting sensitive information hiding for the cloud-based healthcare sharing system", IEEE Trans. Ind. Informat., vol. 18, no. 8, pp. 5573-5583, Aug. 2022.
5.
Y. Yang, Y. Miao, Z. Ying, J. Ning, X. Meng and K.-K. R. Choo, "Privacy-preserving threshold spatial keyword search in cloud-assisted IIoT", IEEE Internet Things J., vol. 9, no. 18, pp. 16990-17001, Sep. 2022.
6.
N. Eltayieb, R. Elhabob, A. Hassan and F. Li, "An efficient attribute-based online/offline searchable encryption and its application in cloud-based reliable smart grid", J. Syst. Archit., vol. 98, pp. 165-172, Sep. 2019.
7.
Q. Huang, G. Yan and Y. Yang, "Privacy-preserving traceable attribute-based keyword search in multi-authority medical cloud", IEEE Trans. Cloud Comput., vol. 11, no. 1, pp. 678-691, Jan.–Mar. 2023.
8.
H. T. Poon and A. Miri, "An efficient conjunctive keyword and phase search scheme for encrypted cloud storage systems", Proc. IEEE 8th Int. Conf. Cloud Comput., pp. 508-515, 2015.
9.
N. Cao, C. Wang, M. Li, K. Ren and W. Lou, "Privacy-preserving multi-keyword ranked search over encrypted cloud data", IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 1, pp. 222-233, Jan. 2014.
10.
Z. Xia, X. Wang, X. Sun and Q. Wang, "A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data", IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 2, pp. 340-352, Feb. 2016.
11.
U. S. Varri, S. Kasani, S. K. Pasupuleti and K. Kadambari, "FELT-ABKS: Fog-enabled lightweight traceable attribute-based keyword search over encrypted data", IEEE Internet Things J., vol. 9, no. 10, pp. 7559-7571, May 2022.
12.
X. Li et al., "VRFMS: Verifiable ranked fuzzy multi-keyword search over encrypted data", IEEE Trans. Serv. Comput., vol. 16, no. 1, pp. 698-710, Jan./Feb. 2023.
13.
D. Boneh, G. D. Crescenzo, R. Ostrovsky and G. Persiano, "Public key encryption with keyword search" in Advances in Cryptology - EUROCRYPT, Berlin, Germany:Springer, pp. 506-522, 2004.
14.
E. Shen, E. Shi and B. Waters, "Predicate privacy in encryption systems" in Theory of Cryptography, Berlin, Germany:Springer, pp. 457-473, 2009.
15.
A. Lewko, T. Okamoto, A. Sahai, K. Takashima and B. Waters, "Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption" in Advances in Cryptology EUROCRYPT, Berlin, Germany:Springer, pp. 62-91, 2010.
16.
W. Sun, S. Yu, W. Lou, Y. T. Hou and H. Li, "Protecting your right: Verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud", IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 4, pp. 1187-1198, Apr. 2016.
17.
Y. Miao, R. H. Deng, K.-K. R. Choo, X. Liu, J. Ning and H. Li, "Optimized verifiable fine-grained keyword search in dynamic multi-owner settings", IEEE Trans. Dependable Secure Comput., vol. 18, no. 4, pp. 1804-1820, Jul./Aug. 2021.
18.
Y. Miao, J. Ma, X. Liu, J. Zhang and Z. Liu, "VKSE-MO: Verifiable keyword search over encrypted data in multi-owner settings", Sci. China Inf. Sci., vol. 60, no. 12, Dec. 2017.
19.
Q. Tong, Y. Miao, X. Liu, K.-K. R. Choo, R. H. Deng and H. Li, "VPSL: Verifiable privacy-preserving data search for cloud-assisted Internet of Things", IEEE Trans. Cloud Comput., vol. 10, no. 4, pp. 2964-2976, Oct.–Dec. 2022.
20.
Z. Fu, K. Ren, J. Shu, X. Sun and F. Huang, "Enabling personalized search over encrypted outsourced data with efficiency improvement", IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 9, pp. 2546-2559, Sep. 2016.
21.
J. Li, J. Ma, Y. Miao, Y. Ruikang, X. Liu and K.-K. R. Choo, "Practical multi-keyword ranked search with access control over encrypted cloud data", IEEE Trans. Cloud Comput., vol. 10, no. 3, pp. 2005-2019, Jul.–Sep. 2022.
22.
H. Yin, Z. Qin, J. Zhang, L. Ou, F. Li and K. Li, "Secure conjunctive multi-keyword ranked search over encrypted cloud data for multiple data owners", Future Gener. Comput. Syst., vol. 100, pp. 689-700, Nov. 2019.
23.
S. Gao, Y. Chen, J. Zhu, Z. Sui, R. Zhang and X. Ma, "BPMS: Blockchain-based privacy-preserving multi-keyword search in multi-owner setting", IEEE Trans. Cloud Comput., Aug. 2022.
24.
X. Tang, C. Guo, Y. Ren, C. Wang and K.-K. R. Choo, "A global secure ranked multikeyword search based on the multiowner model for cloud-based systems", IEEE Syst. J., vol. 16, no. 2, pp. 1717-1728, Jun. 2022.
25.
M. Wang, Y. Miao, Y. Guo, H. Huang, C. Wang and X. Jia, "AESM2 attribute-based encrypted search for multi-owner and multi-user distributed systems", IEEE Trans. Parallel Distrib. Syst., vol. 34, no. 1, pp. 92-107, Jan. 2023.
26.
S. Nakamoto, vol. 4, pp. 2, 2008, [online] Available: https://bitcoin.org/bitcoin.pdf.
27.
D. Berdik, S. Otoum, N. Schmidt, D. Porter and Y. Jararweh, "A survey on blockchain for information systems management and security", Inf. Process. Manage., vol. 58, no. 1, Jan. 2021.
28.
N. Deepa et al., "A survey on blockchain for Big Data: Approaches opportunities and future directions", Future Gener. Comput. Syst., vol. 131, pp. 209-226, Jun. 2022.
29.
H. M. Hussien, S. M. Yasin, N. I. Udzir, M. I. H. Ninggal and S. Salman, "Blockchain technology in the healthcare industry: Trends and opportunities", J. Ind. Inf. Integration, vol. 22, Jun. 2021.
30.
J. Kang et al., "Blockchain for secure and efficient data sharing in vehicular edge computing and networks", IEEE Internet Things J., vol. 6, no. 3, pp. 4660-4670, Jun. 2019.

Contact IEEE to Subscribe

References

References is not available for this document.