期刊文献+

Multi-Owner Keyword Search over Shared Data without Secure Channels in the Cloud

Multi-Owner Keyword Search over Shared Data without Secure Channels in the Cloud
在线阅读 下载PDF
导出
摘要 Searchable encryption allows cloud users to outsource the massive encrypted data to the remote cloud and to search over the data without revealing the sensitive information. Many schemes have been proposed to support the keyword search in a public cloud. However,they have some potential limitations. First,most of the existing schemes only consider the scenario with the single data owner. Second,they need secure channels to guarantee the secure transmission of secret keys from the data owner to data users. Third,in some schemes,the data owner should be online to help data users when data users intend to perform the search,which is inconvenient.In this paper,we propose a novel searchable scheme which supports the multi-owner keyword search without secure channels. More than that,our scheme is a non-interactive solution,in which all the users only need to communicate with the cloud server. Furthermore,the analysis proves that our scheme can guarantee the security even without secure channels. Unlike most existing public key encryption based searchable schemes,we evaluate the performance of our scheme,which shows that our scheme is practical. Searchable encryption allows cloud users to outsource the massive encrypted data to the remote cloud and to search over the data without revealing the sensitive information. Many schemes have been proposed to support the keyword search in a public cloud. However, they have some potential limitations. First, most of the existing schemes only consider the scenario with the single data owner. Second, they need secure channels to guarantee the secure transmission of secret keys from the data owner to data users. Third, in some schemes, the data owner should be online to help data users when data users intend to perform the search, which is inconvenient.In this paper, we propose a novel searchable scheme which supports the multi-owner keyword search without secure channels. More than that, our scheme is a non-interactive solution, in which all the users only need to communicate with the cloud server. Furthermore, the analysis proves that our scheme can guarantee the security even without secure channels. Unlike most existing public key encryption based searchable schemes, we evaluate the performance of our scheme, which shows that our scheme is practical.
出处 《China Communications》 SCIE CSCD 2017年第5期124-133,共10页 中国通信(英文版)
基金 supported by Natural Science Foundation of China(No.61303264)
关键词 keyword search cloud security secure channels proxy re-encryption 关键字搜索 安全通道 共享数据 加密数据 敏感信息 安全传输 联机帮助 非交互式
作者简介 Yilun Wu, is a Ph.D. candidate at National University of Defense Technology. He received his master degree of Computer Science from National University of Defense Technology in 2011. He is interested in cloud security, computer network and information security. He was a visiting student at the University of Toronto between Oct. 2014 and Sept. 2015.Xicheng Lu, is a professor in College of Computer, National University of Defense Technology, China. He received his B.Sc. degree in computer science from Harbin Military Engineering Institute, China, in 1970. He was a visiting scholar at the University of Massachusetts between 1982 and 1984. He is an academician of the Chinese Academy of Engineering. His research interests include distributed computing, computer networks, parallel computing, etc.Jinshu Su, is a full professor in College of Computer, National University of Defense Technology (NUDT), China. He received his B.S degree of mathematics from Nankai University, 1985, and his M.S, and Ph.D. degrees from NUDT in 1988 and 2000 respectively, both in Computer Science. He has lead several national key projects of CHINA, including one national 973 projects, several national 863 projects and NSFC Key projects. His current research interests includes computer network, information security and network security.Peixin Chen, received his master degree of Computer Science from National University of Defense Technology in 2011. He is interested in cloud computing, cryptographic technology and quality of services. Currently, he is a Ph.D. candidate at National University of Defense Technology.Xiaofeng Wang, received the BS, MS, and PhD degrees from the National University of Defense Technology (NUDT), all in the School of Computer. He has been a research assistant in the School of Computer, NUDT since 2010. His current research interests are in trustworthy networks, secure communication and applied cryptography.Bofeng Zhang, is an assistant professor in College of Computer Science, National University of Defense Technology, where he received his B.S., MS. and Ph.D. degrees in 2000, 2002 and 2007, respectively. His research interests include machine learning and data mining.
  • 相关文献

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部