摘要
Searchable encryption allows cloud users to outsource the massive encrypted data to the remote cloud and to search over the data without revealing the sensitive information. Many schemes have been proposed to support the keyword search in a public cloud. However,they have some potential limitations. First,most of the existing schemes only consider the scenario with the single data owner. Second,they need secure channels to guarantee the secure transmission of secret keys from the data owner to data users. Third,in some schemes,the data owner should be online to help data users when data users intend to perform the search,which is inconvenient.In this paper,we propose a novel searchable scheme which supports the multi-owner keyword search without secure channels. More than that,our scheme is a non-interactive solution,in which all the users only need to communicate with the cloud server. Furthermore,the analysis proves that our scheme can guarantee the security even without secure channels. Unlike most existing public key encryption based searchable schemes,we evaluate the performance of our scheme,which shows that our scheme is practical.
Searchable encryption allows cloud users to outsource the massive encrypted data to the remote cloud and to search over the data without revealing the sensitive information. Many schemes have been proposed to support the keyword search in a public cloud. However, they have some potential limitations. First, most of the existing schemes only consider the scenario with the single data owner. Second, they need secure channels to guarantee the secure transmission of secret keys from the data owner to data users. Third, in some schemes, the data owner should be online to help data users when data users intend to perform the search, which is inconvenient.In this paper, we propose a novel searchable scheme which supports the multi-owner keyword search without secure channels. More than that, our scheme is a non-interactive solution, in which all the users only need to communicate with the cloud server. Furthermore, the analysis proves that our scheme can guarantee the security even without secure channels. Unlike most existing public key encryption based searchable schemes, we evaluate the performance of our scheme, which shows that our scheme is practical.
基金
supported by Natural Science Foundation of China(No.61303264)
作者简介
Yilun Wu, is a Ph.D. candidate at National University of Defense Technology. He received his master degree of Computer Science from National University of Defense Technology in 2011. He is interested in cloud security, computer network and information security. He was a visiting student at the University of Toronto between Oct. 2014 and Sept. 2015.Xicheng Lu, is a professor in College of Computer, National University of Defense Technology, China. He received his B.Sc. degree in computer science from Harbin Military Engineering Institute, China, in 1970. He was a visiting scholar at the University of Massachusetts between 1982 and 1984. He is an academician of the Chinese Academy of Engineering. His research interests include distributed computing, computer networks, parallel computing, etc.Jinshu Su, is a full professor in College of Computer, National University of Defense Technology (NUDT), China. He received his B.S degree of mathematics from Nankai University, 1985, and his M.S, and Ph.D. degrees from NUDT in 1988 and 2000 respectively, both in Computer Science. He has lead several national key projects of CHINA, including one national 973 projects, several national 863 projects and NSFC Key projects. His current research interests includes computer network, information security and network security.Peixin Chen, received his master degree of Computer Science from National University of Defense Technology in 2011. He is interested in cloud computing, cryptographic technology and quality of services. Currently, he is a Ph.D. candidate at National University of Defense Technology.Xiaofeng Wang, received the BS, MS, and PhD degrees from the National University of Defense Technology (NUDT), all in the School of Computer. He has been a research assistant in the School of Computer, NUDT since 2010. His current research interests are in trustworthy networks, secure communication and applied cryptography.Bofeng Zhang, is an assistant professor in College of Computer Science, National University of Defense Technology, where he received his B.S., MS. and Ph.D. degrees in 2000, 2002 and 2007, respectively. His research interests include machine learning and data mining.