Advanced Search
Volume 41 Issue 3
Mar.  2019
Turn off MathJax
Article Contents
Yulei ZHANG, Xiangzhen LIU, Xiaoli LANG, Yongjie ZHANG, Wenjuan CHEN, Caifen WANG. Multi-server Key Aggregation Searchable Encryption Scheme in Cloud Environment[J]. Journal of Electronics & Information Technology, 2019, 41(3): 674-679. doi: 10.11999/JEIT180418
Citation: Yulei ZHANG, Xiangzhen LIU, Xiaoli LANG, Yongjie ZHANG, Wenjuan CHEN, Caifen WANG. Multi-server Key Aggregation Searchable Encryption Scheme in Cloud Environment[J]. Journal of Electronics & Information Technology, 2019, 41(3): 674-679. doi: 10.11999/JEIT180418

Multi-server Key Aggregation Searchable Encryption Scheme in Cloud Environment

doi: 10.11999/JEIT180418
Funds:  The National Natural Science Foundation of China (61163038, 61262056, 61262057), The Higher Educational Scientific Research Foundation of Gansu Province (2017A-003, 2018A-207)
  • Received Date: 2018-05-03
  • Rev Recd Date: 2018-11-27
  • Available Online: 2018-12-07
  • Publish Date: 2019-03-01
  • Key aggregation searchable encryption can not only retrieve ciphertext through keywords, but also can reduce user key management costs and security risks. This paper analyzes a verifiable key aggregation searchable encryption scheme, noting that the scheme does not satisfy keyword guessing attacks, and that unauthorized internal users can guess the private keys of other users. In order to improve the security of the original scheme, a multi-server key aggregation searchable encryption scheme is proposed in the cloud environment. The new scheme not only improves the security of the original solution, but also adds multi-service features, and improves the storage and search efficiency. Therefore, it is more suitable for a one-to-many user environment.

  • loading
  • 张键红, 李鹏燕. 一种有效的云存储数据完整性验证方案[J]. 信息网络安全, 2017(3): 1–5. doi: 10.3969/j.issn.1671-1122.2017.03.001

    ZHANG Jianhong and LI Pengyan. An efficient data integrity verification scheme for cloud storage[J]. Netinfo Security, 2017(3): 1–5. doi: 10.3969/j.issn.1671-1122.2017.03.001
    陆海宁. 可隐藏搜索模式的对称可搜索加密方案[J]. 信息网络安全, 2017(1): 38–42. doi: 10.3969/j.issn.1671-1122.017.01.006

    LU Haining. Searchable symmetric encryption with hidden search pattern[J]. Netinfo Security, 2017(1): 38–42. doi: 10.3969/j.issn.1671-1122.017.01.006
    SONG D X, WAGNER D, and PERRIG A. Practical techniques for searches on encrypted data[C]. IEEE Symposium on Security and Privacy, Berkeley, USA, 2000: 44–55.
    DAN B, CRESCENZO G D, OSTROVSKY R, et al. Public key encryption with keyword search[J]. Lecture Notes in Computer Science, 2004, 3027: 506–522. doi: 10.1007/978-3-540-24676-3_30
    王尚平, 刘利军, 张亚玲. 一个高效的基于连接关键词的可搜索加密方案[J]. 电子与信息学报, 2013, 35(9): 2266–2271. doi: 10.3724/SP.J.1146.2012.01036

    WANG Shangping, LIU Lijun, and ZHANG Yaling. An efficient conjunctive keyword searchable encryption scheme[J]. Journal of Electronics &Information Technology, 2013, 35(9): 2266–2271. doi: 10.3724/SP.J.1146.2012.01036
    CHANG Yujui and WU Jaling. Multi user searchable encryption scheme with constant size keys[C]. IEEE International Symposium on Cloud and Service Computing, Kanazawa, Japan, 2017: 98–103.
    刘振华, 周佩琳, 段淑红. 支持关键词搜索的属性代理重加密方案[J]. 电子与信息学报, 2018, 40(3): 683–689. doi: 10.11999/JEIT170448

    LIU Zhenhua, ZHOU Peilin, and DUAN Shuhong. Attribute based proxy reencryption scheme with keyword search[J]. Journal of Electronics &Information Technology, 2018, 40(3): 683–689. doi: 10.11999/JEIT170448
    PENG Yanguo, CUI Jiangtao, PENG Changgen, et al. Certificateless public key encryption with keyword search[J]. China Communications, 2014, 11(11): 100–113. doi: 10.1109/CC.2014.7004528
    WU Tsuyang, MENG Fanya, CHEN Chienming, et al. On the security of a certificateless searchable public key encryption scheme[C]. International Conference on Genetic and Evolutionary Computing, Fuzhou, China, 2016: 113–119.
    MA Mimi, HE Debiao, KUMAR N, et al. Certificateless searchable public key encryption scheme for industrial internet of things[J]. IEEE Transactions on Industrial Informatics, 2017, 14(2): 759–767. doi: 10.1109/TII.2017.2703922
    MA Mimi, HE Debiao, KHAN M K, et al. Certificateless searchable public key encryption scheme for mobile healthcare system[J]. Computers & Electrical Engineering, 2017, 65(5): 413–424. doi: 10.1016/j.compeleceng.2017.05.014
    黄海平, 杜建澎, 戴华, 等. 一种基于云存储的多服务器多关键词可搜索加密方案[J]. 电子与信息学报, 2017, 39(2): 389–396. doi: 10.11999/JEIT160338

    HUANG Haiping, DU Jianpeng, DAI Hua, et al. Multi sever multi keyword searchable encryption scheme based on cloud storage[J]. Journal of Electronics &Information Technology, 2017, 39(2): 389–396. doi: 10.11999/JEIT160338
    CHU C K, CHOW S S M, TZENG W G, et al. Key aggregate cryptosystem for scalable data sharing in cloud storage[J]. IEEE Transactions on Parallel and Distributed Systems, 2014, 25(2): 468–477. doi: 10.1109/TPDS.2013.112
    CUI Baojiang, LIU Zheli, and WANG Lingyu. Key-Aggregate Searchable Encryption (KASE) for group data sharing via cloud storage[J]. IEEE Transactions on Computers, 2016, 65(8): 2374–2385. doi: 10.1109/TC.2015.2389959
    LIU Zheli, LI Tong, LI Ping, et al. Verifiable searchable encryption with aggregate keys for data sharing system[J]. Future Generation Computer Systems, 2017, 78(2): 778–788. doi: 10.1016/j.future.2017.02.024
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(1)  / Tables(2)

    Article Metrics

    Article views (2556) PDF downloads(103) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return