Abstract

The way services offered by cloud computing gets its unprecedented and undisputed popularity, so its security concerns. Among them the storage as service model (SaaS) is of the forefront of these concerns. SaaS liberates individuals and enterprises from management of IT infrastructure and data centers to concentrate on their core business. Because of untrusted and out-of-premise architecture users are reluctant to outsource their personal and important data. Encryption before outsourcing addresses some of these issues but at the same time strips the data of its useful operation such as sharing and searching. Now to address this issue, the combination of keyword based searchable encryption (KSE) and attribute-based encryption (ABE) leads to an attribute-based keyword searching (ABKS). The resultant combined concept is capable of fine-grained search operation in the multi-owner/multi-user (M/M) setting. However, the underlying costly pairing operation and complex secret sharing mechanism of ABE makes it unsuitable in practical application for resource-limited devices. On top of it, in most of the existing ABKS schemes the size of the secret key and its associated pairing operation linearly expands to the number of attributes. This paper aims at presenting a novel ABKS scheme with pairing-free access verification and constant size secret key based on AND gate access structure and ciphertext-policy (CP) framework. The security of the proposed work is reduced to the standard Decisional Diffie-Hellmen (DDH) assumption, and also collision free and error tolerant. Finally, the performance evaluation and experimental results shows that the proposed scheme improved the overall efficiency and communication overhead.

Highlights

  • Nowadays cloud computing provides an attractive computing architecture, enabling the on-demand computing allocation and ubiquitous access over the Internet

  • We reduced the storage size of KeyGen by generating a constant-size key for data owner, EncInd and Trapdor algorithm, used to generate keyword query by data user

  • The size of the Setup algorithm takes more space in attribute-based keyword searching (ABKS)-PBM scheme, in practice it is acceptable since Setup phase is a one time cost and runs on resource rich trusted attribute authority (TAA)

Read more

Summary

Introduction

Nowadays cloud computing provides an attractive computing architecture, enabling the on-demand computing allocation and ubiquitous access over the Internet. This computing paradigm relieves individuals and enterprises from establishing their own IT infrastructure and proprietary data centers to focus on their core business. Speaking for protection and privacy of data, encryption is performed before storing it on untrusted cloud servers. A simple approach to address this dilemma is to first download all the ciphertext data and perform decryption operation locally. This naive approach will incur huge computation, bandwidth and storage cost and is inefficient

Objectives
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call