Yang Li , Chungen Xu , Lei Xu , Lin Mei , Yanzhe Zhu
{"title":"可验证的可搜索加密方案,在云中具有灵活的访问控制","authors":"Yang Li , Chungen Xu , Lei Xu , Lin Mei , Yanzhe Zhu","doi":"10.1016/j.jpdc.2024.105025","DOIUrl":null,"url":null,"abstract":"<div><div>The exponential growth of digital data demands secure and efficient cloud data management. Encryption technologies, especially searchable encryption and attribute-based encryption, have become tools for protecting data confidentiality while allowing authorized users to access data for ciphertext retrieval. Confronting complex multi-user and multi-owner (M2M) scenarios, certain searchable attribute-based encryption schemes are designed to manage both owner-level and user-level permission simultaneously. However, their permission management depends on the cooperation of an honest server, which may not be practical in the M2M cloud storage environment. Hence, there is a need for a robust scheme that ensures secure and flexible access control, maintains performance and scalability, and is applicable to servers that may not always be honest, thereby accommodating a broader spectrum of real-world scenarios. This paper introduces a <strong>V</strong>erifiable <strong>S</strong>earchable <strong>E</strong>ncryption Scheme with <strong>F</strong>lexible <strong>A</strong>ccess <strong>C</strong>ontrol in the Cloud (VSEFAC), which adeptly manages both owner-level and user-level permission based on searchable attribute-based encryption, with the added advantage of owner-level permission management being independent of a careless cloud server. At the same time, our scheme manages owner-level permission through a lightweight method for updating owner-level permission, providing strong defense against unauthorized searches and attacks. Finally, our scheme further validates the practical efficiency and effectiveness of our scheme in real-world cloud storage applications through rigorous security analysis and performance evaluation.</div></div>","PeriodicalId":54775,"journal":{"name":"Journal of Parallel and Distributed Computing","volume":"197 ","pages":"Article 105025"},"PeriodicalIF":3.4000,"publicationDate":"2024-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Verifiable searchable encryption scheme with flexible access control in the cloud\",\"authors\":\"Yang Li , Chungen Xu , Lei Xu , Lin Mei , Yanzhe Zhu\",\"doi\":\"10.1016/j.jpdc.2024.105025\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>The exponential growth of digital data demands secure and efficient cloud data management. Encryption technologies, especially searchable encryption and attribute-based encryption, have become tools for protecting data confidentiality while allowing authorized users to access data for ciphertext retrieval. Confronting complex multi-user and multi-owner (M2M) scenarios, certain searchable attribute-based encryption schemes are designed to manage both owner-level and user-level permission simultaneously. However, their permission management depends on the cooperation of an honest server, which may not be practical in the M2M cloud storage environment. Hence, there is a need for a robust scheme that ensures secure and flexible access control, maintains performance and scalability, and is applicable to servers that may not always be honest, thereby accommodating a broader spectrum of real-world scenarios. This paper introduces a <strong>V</strong>erifiable <strong>S</strong>earchable <strong>E</strong>ncryption Scheme with <strong>F</strong>lexible <strong>A</strong>ccess <strong>C</strong>ontrol in the Cloud (VSEFAC), which adeptly manages both owner-level and user-level permission based on searchable attribute-based encryption, with the added advantage of owner-level permission management being independent of a careless cloud server. At the same time, our scheme manages owner-level permission through a lightweight method for updating owner-level permission, providing strong defense against unauthorized searches and attacks. Finally, our scheme further validates the practical efficiency and effectiveness of our scheme in real-world cloud storage applications through rigorous security analysis and performance evaluation.</div></div>\",\"PeriodicalId\":54775,\"journal\":{\"name\":\"Journal of Parallel and Distributed Computing\",\"volume\":\"197 \",\"pages\":\"Article 105025\"},\"PeriodicalIF\":3.4000,\"publicationDate\":\"2024-12-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Parallel and Distributed Computing\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S0743731524001898\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, THEORY & METHODS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Parallel and Distributed Computing","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0743731524001898","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
Verifiable searchable encryption scheme with flexible access control in the cloud
The exponential growth of digital data demands secure and efficient cloud data management. Encryption technologies, especially searchable encryption and attribute-based encryption, have become tools for protecting data confidentiality while allowing authorized users to access data for ciphertext retrieval. Confronting complex multi-user and multi-owner (M2M) scenarios, certain searchable attribute-based encryption schemes are designed to manage both owner-level and user-level permission simultaneously. However, their permission management depends on the cooperation of an honest server, which may not be practical in the M2M cloud storage environment. Hence, there is a need for a robust scheme that ensures secure and flexible access control, maintains performance and scalability, and is applicable to servers that may not always be honest, thereby accommodating a broader spectrum of real-world scenarios. This paper introduces a Verifiable Searchable Encryption Scheme with Flexible Access Control in the Cloud (VSEFAC), which adeptly manages both owner-level and user-level permission based on searchable attribute-based encryption, with the added advantage of owner-level permission management being independent of a careless cloud server. At the same time, our scheme manages owner-level permission through a lightweight method for updating owner-level permission, providing strong defense against unauthorized searches and attacks. Finally, our scheme further validates the practical efficiency and effectiveness of our scheme in real-world cloud storage applications through rigorous security analysis and performance evaluation.
期刊介绍:
This international journal is directed to researchers, engineers, educators, managers, programmers, and users of computers who have particular interests in parallel processing and/or distributed computing.
The Journal of Parallel and Distributed Computing publishes original research papers and timely review articles on the theory, design, evaluation, and use of parallel and/or distributed computing systems. The journal also features special issues on these topics; again covering the full range from the design to the use of our targeted systems.