Outsourcing Attributed-Based Ranked Searchable Encryption With Revocation for Cloud Storage
With the rapid growth of the cloud computing and strengthening of security requirements, encrypted cloud services are of importance and benefit. For the huge ciphertext data stored in the cloud, many secure searchable methods based on cryptography with keywords are introduced. In all the methods, at...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2020-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/9108226/ |
_version_ | 1818933100282904576 |
---|---|
author | Leyou Zhang Jian Su Yi Mu |
author_facet | Leyou Zhang Jian Su Yi Mu |
author_sort | Leyou Zhang |
collection | DOAJ |
description | With the rapid growth of the cloud computing and strengthening of security requirements, encrypted cloud services are of importance and benefit. For the huge ciphertext data stored in the cloud, many secure searchable methods based on cryptography with keywords are introduced. In all the methods, attribute-based searchable encryption is considered as the truthful and efficient method since it supports the flexible access policy. However, the attribute-based system suffers from two defects when applied in the cloud storage. One of them is that the huge data in the cloud makes the users process all the relevant files related to the certain keyword. For the other side, the users and users' attributes inevitably change frequently. Therefore, attribute revocation is also an important problem in the system. To overcome these drawbacks, an attribute-based ranked searchable encryption scheme with revocation is proposed. We rank the ciphertext documents according to the TF×IDF principle, and then only return the relevant top-k files. Besides the decryption sever, an encryption sever is also introduced. And a large number of computations are outsourced to the encryption server and decryption server, which reduces the computing overhead of the client. In addition, the proposed scheme uses a real-time revocation method to achieve attribute revocation and delegates most of the update tasks to the cloud, which also reduces the calculation overhead of the user side. The performance evaluations show the scheme is feasible and more efficient than the available ones. |
first_indexed | 2024-12-20T04:43:00Z |
format | Article |
id | doaj.art-bde82288393e492ba071f7f4d73d9b1e |
institution | Directory Open Access Journal |
issn | 2169-3536 |
language | English |
last_indexed | 2024-12-20T04:43:00Z |
publishDate | 2020-01-01 |
publisher | IEEE |
record_format | Article |
series | IEEE Access |
spelling | doaj.art-bde82288393e492ba071f7f4d73d9b1e2022-12-21T19:53:04ZengIEEEIEEE Access2169-35362020-01-01810434410435610.1109/ACCESS.2020.30000499108226Outsourcing Attributed-Based Ranked Searchable Encryption With Revocation for Cloud StorageLeyou Zhang0Jian Su1https://orcid.org/0000-0003-1346-1271Yi Mu2https://orcid.org/0000-0002-1637-845XSchool of Mathematics and Statistics, Xidian University, Xi’an, ChinaSchool of Mathematics and Statistics, Xidian University, Xi’an, ChinaFujian Provincial Key Laboratory of Network Security and Cryptology, College of Mathematics and Informatics, Fujian Normal University, Fuzhou, ChinaWith the rapid growth of the cloud computing and strengthening of security requirements, encrypted cloud services are of importance and benefit. For the huge ciphertext data stored in the cloud, many secure searchable methods based on cryptography with keywords are introduced. In all the methods, attribute-based searchable encryption is considered as the truthful and efficient method since it supports the flexible access policy. However, the attribute-based system suffers from two defects when applied in the cloud storage. One of them is that the huge data in the cloud makes the users process all the relevant files related to the certain keyword. For the other side, the users and users' attributes inevitably change frequently. Therefore, attribute revocation is also an important problem in the system. To overcome these drawbacks, an attribute-based ranked searchable encryption scheme with revocation is proposed. We rank the ciphertext documents according to the TF×IDF principle, and then only return the relevant top-k files. Besides the decryption sever, an encryption sever is also introduced. And a large number of computations are outsourced to the encryption server and decryption server, which reduces the computing overhead of the client. In addition, the proposed scheme uses a real-time revocation method to achieve attribute revocation and delegates most of the update tasks to the cloud, which also reduces the calculation overhead of the user side. The performance evaluations show the scheme is feasible and more efficient than the available ones.https://ieeexplore.ieee.org/document/9108226/Attribute-based searchable encryptionattribute revocationflexible access policyrank |
spellingShingle | Leyou Zhang Jian Su Yi Mu Outsourcing Attributed-Based Ranked Searchable Encryption With Revocation for Cloud Storage IEEE Access Attribute-based searchable encryption attribute revocation flexible access policy rank |
title | Outsourcing Attributed-Based Ranked Searchable Encryption With Revocation for Cloud Storage |
title_full | Outsourcing Attributed-Based Ranked Searchable Encryption With Revocation for Cloud Storage |
title_fullStr | Outsourcing Attributed-Based Ranked Searchable Encryption With Revocation for Cloud Storage |
title_full_unstemmed | Outsourcing Attributed-Based Ranked Searchable Encryption With Revocation for Cloud Storage |
title_short | Outsourcing Attributed-Based Ranked Searchable Encryption With Revocation for Cloud Storage |
title_sort | outsourcing attributed based ranked searchable encryption with revocation for cloud storage |
topic | Attribute-based searchable encryption attribute revocation flexible access policy rank |
url | https://ieeexplore.ieee.org/document/9108226/ |
work_keys_str_mv | AT leyouzhang outsourcingattributedbasedrankedsearchableencryptionwithrevocationforcloudstorage AT jiansu outsourcingattributedbasedrankedsearchableencryptionwithrevocationforcloudstorage AT yimu outsourcingattributedbasedrankedsearchableencryptionwithrevocationforcloudstorage |