Abstract

In the recent past, few works have been done by combining attribute-based access control with multi-user PEKS, i.e., public key encryption with keyword search. Such attribute enabled searchable encryption is most suitable for applications where the changing of privileges is done once in a while. However, to date, no efficient and secure scheme is available in the literature that is suitable for these applications where changing privileges are done frequently. In this paper our contributions are twofold. Firstly, we propose a new PEKS scheme for string search, which, unlike the previous constructions, is free from bi-linear mapping and is efficient by 97% compared to PEKS for string search proposed by Ray et.al in TrustCom 2017. Secondly, we introduce role based access control (RBAC) to multi-user PEKS, where an arbitrary group of users can search and access the encrypted files depending upon roles. We termed this integrated scheme as R-PEKS. The efficiency of R-PEKS over the PEKS scheme is up to 90%. We provide formal security proofs for the different components of R-PEKS and validate these schemes using a commercial dataset.

Highlights

  • IntroductionEncryption prevents searching within the data which is essential for better usability of the encrypted data

  • I N cloud, encryption may be a suitable mechanism to protect the data at rest

  • The users and files are given as an input to RMiner [29], which is a role mining tool used for the generation of UP and for the creation of role based access control (RBAC) configuration, i.e., UA and PA

Read more

Summary

Introduction

Encryption prevents searching within the data which is essential for better usability of the encrypted data. This gives rise to a new area of research, called searchable encryption (SE). Many researches has been carried out on single-user searchable encryption (SUSE) with access control mechanisms. Multi-user searchable encryption (MUSE) is becoming more relevant for most of the commercial applications involving large group of users with complex access structure. Some work has been done on MUSE by delegating the permission of searching among multiple users in an access controlled environment. Most of these works involve attribute based access structure

Results
Discussion
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.