可验证的可搜索加密方案,在云中具有灵活的访问控制

IF 3.4 3区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS
Yang Li , Chungen Xu , Lei Xu , Lin Mei , Yanzhe Zhu
{"title":"可验证的可搜索加密方案,在云中具有灵活的访问控制","authors":"Yang Li ,&nbsp;Chungen Xu ,&nbsp;Lei Xu ,&nbsp;Lin Mei ,&nbsp;Yanzhe Zhu","doi":"10.1016/j.jpdc.2024.105025","DOIUrl":null,"url":null,"abstract":"<div><div>The exponential growth of digital data demands secure and efficient cloud data management. Encryption technologies, especially searchable encryption and attribute-based encryption, have become tools for protecting data confidentiality while allowing authorized users to access data for ciphertext retrieval. Confronting complex multi-user and multi-owner (M2M) scenarios, certain searchable attribute-based encryption schemes are designed to manage both owner-level and user-level permission simultaneously. However, their permission management depends on the cooperation of an honest server, which may not be practical in the M2M cloud storage environment. Hence, there is a need for a robust scheme that ensures secure and flexible access control, maintains performance and scalability, and is applicable to servers that may not always be honest, thereby accommodating a broader spectrum of real-world scenarios. This paper introduces a <strong>V</strong>erifiable <strong>S</strong>earchable <strong>E</strong>ncryption Scheme with <strong>F</strong>lexible <strong>A</strong>ccess <strong>C</strong>ontrol in the Cloud (VSEFAC), which adeptly manages both owner-level and user-level permission based on searchable attribute-based encryption, with the added advantage of owner-level permission management being independent of a careless cloud server. At the same time, our scheme manages owner-level permission through a lightweight method for updating owner-level permission, providing strong defense against unauthorized searches and attacks. Finally, our scheme further validates the practical efficiency and effectiveness of our scheme in real-world cloud storage applications through rigorous security analysis and performance evaluation.</div></div>","PeriodicalId":54775,"journal":{"name":"Journal of Parallel and Distributed Computing","volume":"197 ","pages":"Article 105025"},"PeriodicalIF":3.4000,"publicationDate":"2024-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Verifiable searchable encryption scheme with flexible access control in the cloud\",\"authors\":\"Yang Li ,&nbsp;Chungen Xu ,&nbsp;Lei Xu ,&nbsp;Lin Mei ,&nbsp;Yanzhe Zhu\",\"doi\":\"10.1016/j.jpdc.2024.105025\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>The exponential growth of digital data demands secure and efficient cloud data management. Encryption technologies, especially searchable encryption and attribute-based encryption, have become tools for protecting data confidentiality while allowing authorized users to access data for ciphertext retrieval. Confronting complex multi-user and multi-owner (M2M) scenarios, certain searchable attribute-based encryption schemes are designed to manage both owner-level and user-level permission simultaneously. However, their permission management depends on the cooperation of an honest server, which may not be practical in the M2M cloud storage environment. Hence, there is a need for a robust scheme that ensures secure and flexible access control, maintains performance and scalability, and is applicable to servers that may not always be honest, thereby accommodating a broader spectrum of real-world scenarios. This paper introduces a <strong>V</strong>erifiable <strong>S</strong>earchable <strong>E</strong>ncryption Scheme with <strong>F</strong>lexible <strong>A</strong>ccess <strong>C</strong>ontrol in the Cloud (VSEFAC), which adeptly manages both owner-level and user-level permission based on searchable attribute-based encryption, with the added advantage of owner-level permission management being independent of a careless cloud server. At the same time, our scheme manages owner-level permission through a lightweight method for updating owner-level permission, providing strong defense against unauthorized searches and attacks. Finally, our scheme further validates the practical efficiency and effectiveness of our scheme in real-world cloud storage applications through rigorous security analysis and performance evaluation.</div></div>\",\"PeriodicalId\":54775,\"journal\":{\"name\":\"Journal of Parallel and Distributed Computing\",\"volume\":\"197 \",\"pages\":\"Article 105025\"},\"PeriodicalIF\":3.4000,\"publicationDate\":\"2024-12-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Parallel and Distributed Computing\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S0743731524001898\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, THEORY & METHODS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Parallel and Distributed Computing","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0743731524001898","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
引用次数: 0

摘要

数字数据的指数级增长要求安全高效的云数据管理。加密技术,特别是可搜索加密和基于属性的加密,已经成为保护数据机密性的工具,同时允许授权用户访问数据以进行密文检索。针对复杂的多用户和多所有者(M2M)场景,设计了一些可搜索的基于属性的加密方案,以同时管理所有者级和用户级权限。但是,它们的权限管理依赖于一个诚实服务器的配合,这在M2M云存储环境中可能不太实用。因此,需要一种健壮的方案来确保安全和灵活的访问控制,维护性能和可伸缩性,并适用于可能并不总是诚实的服务器,从而适应更广泛的现实场景。本文介绍了一种具有灵活访问控制的可验证可搜索加密方案(VSEFAC),该方案基于可搜索的基于属性的加密,熟练地管理所有者级和用户级权限,并且具有所有者级权限管理独立于不谨慎的云服务器的优点。同时,我们的方案通过一种轻量级的方法来更新所有者级权限,管理所有者级权限,为未经授权的搜索和攻击提供强大的防御。最后,通过严格的安全分析和性能评估,进一步验证了方案在实际云存储应用中的实际效率和有效性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Verifiable searchable encryption scheme with flexible access control in the cloud
The exponential growth of digital data demands secure and efficient cloud data management. Encryption technologies, especially searchable encryption and attribute-based encryption, have become tools for protecting data confidentiality while allowing authorized users to access data for ciphertext retrieval. Confronting complex multi-user and multi-owner (M2M) scenarios, certain searchable attribute-based encryption schemes are designed to manage both owner-level and user-level permission simultaneously. However, their permission management depends on the cooperation of an honest server, which may not be practical in the M2M cloud storage environment. Hence, there is a need for a robust scheme that ensures secure and flexible access control, maintains performance and scalability, and is applicable to servers that may not always be honest, thereby accommodating a broader spectrum of real-world scenarios. This paper introduces a Verifiable Searchable Encryption Scheme with Flexible Access Control in the Cloud (VSEFAC), which adeptly manages both owner-level and user-level permission based on searchable attribute-based encryption, with the added advantage of owner-level permission management being independent of a careless cloud server. At the same time, our scheme manages owner-level permission through a lightweight method for updating owner-level permission, providing strong defense against unauthorized searches and attacks. Finally, our scheme further validates the practical efficiency and effectiveness of our scheme in real-world cloud storage applications through rigorous security analysis and performance evaluation.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Journal of Parallel and Distributed Computing
Journal of Parallel and Distributed Computing 工程技术-计算机:理论方法
CiteScore
10.30
自引率
2.60%
发文量
172
审稿时长
12 months
期刊介绍: This international journal is directed to researchers, engineers, educators, managers, programmers, and users of computers who have particular interests in parallel processing and/or distributed computing. The Journal of Parallel and Distributed Computing publishes original research papers and timely review articles on the theory, design, evaluation, and use of parallel and/or distributed computing systems. The journal also features special issues on these topics; again covering the full range from the design to the use of our targeted systems.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信