Searchable Attribute-Based Encryption Scheme over Cloud Data

Authors(3) :-Prajot Deshmukh, Prof. Gajanan Patle, Prof. Ektaa Meshram

From the time in memorial, Information Security has remained a primary concern and today when most of the sensitive data is stored on Cloud with client organization having lesser control over the stored data, the fundamental way to fix this issue is to encrypt such data. So, a secure user-imposed data access control system must be given, before the users outsource any data to the cloud for storage. Attribute Based Encryption (ABE) system is one such asymmetric key based cryptosystem that has received much attention that provides fine-grained access control to data stored on the cloud. In this paper, we propose a more proficient and richer type of Attribute Based Encryption technique that not only considers the Outsourced ABE construction but also address the issue of revocation in case of user leaving the group or organization; once a user is removed from the group, the keys are updated and these new keys are distributed among the existing users also our system supports the Keyword search over encrypted data in the mobile cloud storage. In multi keyword search; data owners and users can generate the keywords index and search trapdoor, respectively, without relying on always online trusted authority. Experimental results prove that the performance of the proposed system is greater than existing system in terms of security, time consumption and memory utilization.

Authors and Affiliations

Prajot Deshmukh
PG Scholar, Department of Computer Science Engineering, Abha-Gaikwad Patil College of Engineering, Nagpur, Maharashtra, India
Prof. Gajanan Patle
Assistant Professor, Department of Computer Science Engineering, Abha-Gaikwad Patil College of Engineering, Nagpur, Maharashtra, India
Prof. Ektaa Meshram
Assistant Professor, Department of Computer Science Engineering, Abha-Gaikwad Patil College of Engineering, Nagpur, Maharashtra, India

Attribute-Based Encryption, Attributes Revocation, Fine-Grained Access Control, Keywords Search, Mobile Cloud Storage.

  1. SHANGPING WANG, DUO ZHANG, YALING ZHANG, AND LIHUA LIU, "Efficiently Revocable and Searchable Attribute-Based Encryption Scheme for Mobile Cloud Storage", IEEE Access Volume 6, June 2018.
  2. Y. Li, F. Zhou, Y. Qin, M. Lin, and Z. Xu, “Integrity-veri_able conjunctive keyword searchable encryption in cloud storage,'' Int. J. Inf. Secur., vol. 17, pp. 1_20, Nov. 2017, doi: 10.1007/s10207-017-0394-9.
  3. D. Cash, J. Jaeger, S. Jarecki, C. Jutla, H. Krawczyk, M.-C. Rosu, and M. Steiner, Dynamic searchable encryption in very large databases: Data structures and implementation, in Proc. of NDSS, vol. 14, 2014.
  4. J. Lai, R. Deng, C. Guan, and J. Weng, “Attribute-based Encryption with Verifiable Outsourced Decryption”, IEEE Trans. Inf. Forensics Security, vol. 8, no. 8, pp. 1343-1354, Aug. 2013.
  5. M. Green, S. Hohenberger, and B.Waters, “Outsourcing the decryption of ABE ciphertexts,'' in Proc. 20th USENIX Conf. Secur. (SEC). Berkeley, CA, USA: USENIX Association, 2011, p. 34.
  6. S. Yu, C. Wang, K. Ren, and W.Lou, “Achieving Secure, Scalable, Fine-Grained Data Access Control in Cloud Computing”, in Proc. IEEE 29th INFOCOM, 2010, pp. 534-542.
  7. L. Cheung and C. Newport, “Provably Secure Ciphertext Policy ABE”, in Proc. 14th ACM Conf. CCS, 2007, pp. 456- 465.
  8. V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute- Based Encryption for Fine-Grained Access Control of Encrypted Data,” in Proc. 13th ACM Conf. Comput. Commun. Security, 2006, pp. 89-98
  9. R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, Searchable symmetric encryption: improved definitions and efficient constructions, in Proceedings of the 13th ACM conference on Computer and communications security. ACM, 2006, pp. 79-88.
  10. A. Sahai and B. Waters, “Fuzzy Identity-Based Encryption”, in Proc. Adv. Cryptol.- EUROCRYPT, LNCS 3494, R. Cramer, Ed., Berlin, Germany, 2005, pp. 457-473, Springer- Verlag.
  11. D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano, Public key encryption with keyword search, in Advances in Cryptology- Eurocrypt 2004. Springer, 2004, pp. 506-522.

Publication Details

Published in : Volume 6 | Issue 2 | March-April 2019
Date of Publication : 2019-04-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 547-552
Manuscript Number : IJSRST1962114
Publisher : Technoscience Academy

Print ISSN : 2395-6011, Online ISSN : 2395-602X

Cite This Article :

Prajot Deshmukh, Prof. Gajanan Patle, Prof. Ektaa Meshram, " Searchable Attribute-Based Encryption Scheme over Cloud Data", International Journal of Scientific Research in Science and Technology(IJSRST), Print ISSN : 2395-6011, Online ISSN : 2395-602X, Volume 6, Issue 2, pp.547-552, March-April-2019.
Journal URL : https://ijsrst.com/IJSRST1962114
Citation Detection and Elimination     |      | |
  • Y. Li, F. Zhou, Y. Qin, M. Lin, and Z. Xu, “Integrity-veri_able conjunctive keyword searchable encryption in cloud storage,'' Int. J. Inf. Secur., vol. 17, pp. 1_20, Nov. 2017, doi: 10.1007/s10207-017-0394-9.
  • D. Cash, J. Jaeger, S. Jarecki, C. Jutla, H. Krawczyk, M.-C. Rosu, and M. Steiner, Dynamic searchable encryption in very large databases: Data structures and implementation, in Proc. of NDSS, vol. 14, 2014.
  • J. Lai, R. Deng, C. Guan, and J. Weng, “Attribute-based Encryption with Verifiable Outsourced Decryption”, IEEE Trans. Inf. Forensics Security, vol. 8, no. 8, pp. 1343-1354, Aug. 2013.
  • M. Green, S. Hohenberger, and B.Waters, “Outsourcing the decryption of ABE ciphertexts,'' in Proc. 20th USENIX Conf. Secur. (SEC). Berkeley, CA, USA: USENIX Association, 2011, p. 34.
  • S. Yu, C. Wang, K. Ren, and W.Lou, “Achieving Secure, Scalable, Fine-Grained Data Access Control in Cloud Computing”, in Proc. IEEE 29th INFOCOM, 2010, pp. 534-542.
  • L. Cheung and C. Newport, “Provably Secure Ciphertext Policy ABE”, in Proc. 14th ACM Conf. CCS, 2007, pp. 456- 465.
  • V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute- Based Encryption for Fine-Grained Access Control of Encrypted Data,” in Proc. 13th ACM Conf. Comput. Commun. Security, 2006, pp. 89-98
  • R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, Searchable symmetric encryption: improved definitions and efficient constructions, in Proceedings of the 13th ACM conference on Computer and communications security. ACM, 2006, pp. 79-88.
  • A. Sahai and B. Waters, “Fuzzy Identity-Based Encryption”, in Proc. Adv. Cryptol.- EUROCRYPT, LNCS 3494, R. Cramer, Ed., Berlin, Germany, 2005, pp. 457-473, Springer- Verlag.
  • D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano, Public key encryption with keyword search, in Advances in Cryptology- Eurocrypt 2004. Springer, 2004, pp. 506-522.
  • " target="_blank"> BibTeX
    |
  • Y. Li, F. Zhou, Y. Qin, M. Lin, and Z. Xu, “Integrity-veri_able conjunctive keyword searchable encryption in cloud storage,'' Int. J. Inf. Secur., vol. 17, pp. 1_20, Nov. 2017, doi: 10.1007/s10207-017-0394-9.
  • D. Cash, J. Jaeger, S. Jarecki, C. Jutla, H. Krawczyk, M.-C. Rosu, and M. Steiner, Dynamic searchable encryption in very large databases: Data structures and implementation, in Proc. of NDSS, vol. 14, 2014.
  • J. Lai, R. Deng, C. Guan, and J. Weng, “Attribute-based Encryption with Verifiable Outsourced Decryption”, IEEE Trans. Inf. Forensics Security, vol. 8, no. 8, pp. 1343-1354, Aug. 2013.
  • M. Green, S. Hohenberger, and B.Waters, “Outsourcing the decryption of ABE ciphertexts,'' in Proc. 20th USENIX Conf. Secur. (SEC). Berkeley, CA, USA: USENIX Association, 2011, p. 34.
  • S. Yu, C. Wang, K. Ren, and W.Lou, “Achieving Secure, Scalable, Fine-Grained Data Access Control in Cloud Computing”, in Proc. IEEE 29th INFOCOM, 2010, pp. 534-542.
  • L. Cheung and C. Newport, “Provably Secure Ciphertext Policy ABE”, in Proc. 14th ACM Conf. CCS, 2007, pp. 456- 465.
  • V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute- Based Encryption for Fine-Grained Access Control of Encrypted Data,” in Proc. 13th ACM Conf. Comput. Commun. Security, 2006, pp. 89-98
  • R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, Searchable symmetric encryption: improved definitions and efficient constructions, in Proceedings of the 13th ACM conference on Computer and communications security. ACM, 2006, pp. 79-88.
  • A. Sahai and B. Waters, “Fuzzy Identity-Based Encryption”, in Proc. Adv. Cryptol.- EUROCRYPT, LNCS 3494, R. Cramer, Ed., Berlin, Germany, 2005, pp. 457-473, Springer- Verlag.
  • D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano, Public key encryption with keyword search, in Advances in Cryptology- Eurocrypt 2004. Springer, 2004, pp. 506-522.
  • " target="_blank">RIS
    |
  • Y. Li, F. Zhou, Y. Qin, M. Lin, and Z. Xu, “Integrity-veri_able conjunctive keyword searchable encryption in cloud storage,'' Int. J. Inf. Secur., vol. 17, pp. 1_20, Nov. 2017, doi: 10.1007/s10207-017-0394-9.
  • D. Cash, J. Jaeger, S. Jarecki, C. Jutla, H. Krawczyk, M.-C. Rosu, and M. Steiner, Dynamic searchable encryption in very large databases: Data structures and implementation, in Proc. of NDSS, vol. 14, 2014.
  • J. Lai, R. Deng, C. Guan, and J. Weng, “Attribute-based Encryption with Verifiable Outsourced Decryption”, IEEE Trans. Inf. Forensics Security, vol. 8, no. 8, pp. 1343-1354, Aug. 2013.
  • M. Green, S. Hohenberger, and B.Waters, “Outsourcing the decryption of ABE ciphertexts,'' in Proc. 20th USENIX Conf. Secur. (SEC). Berkeley, CA, USA: USENIX Association, 2011, p. 34.
  • S. Yu, C. Wang, K. Ren, and W.Lou, “Achieving Secure, Scalable, Fine-Grained Data Access Control in Cloud Computing”, in Proc. IEEE 29th INFOCOM, 2010, pp. 534-542.
  • L. Cheung and C. Newport, “Provably Secure Ciphertext Policy ABE”, in Proc. 14th ACM Conf. CCS, 2007, pp. 456- 465.
  • V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute- Based Encryption for Fine-Grained Access Control of Encrypted Data,” in Proc. 13th ACM Conf. Comput. Commun. Security, 2006, pp. 89-98
  • R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, Searchable symmetric encryption: improved definitions and efficient constructions, in Proceedings of the 13th ACM conference on Computer and communications security. ACM, 2006, pp. 79-88.
  • A. Sahai and B. Waters, “Fuzzy Identity-Based Encryption”, in Proc. Adv. Cryptol.- EUROCRYPT, LNCS 3494, R. Cramer, Ed., Berlin, Germany, 2005, pp. 457-473, Springer- Verlag.
  • D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano, Public key encryption with keyword search, in Advances in Cryptology- Eurocrypt 2004. Springer, 2004, pp. 506-522.
  • " target="_blank">CSV

    Article Preview