Reference Hub6
Secure Fine-Grained Keyword Search With Efficient User Revocation and Traitor Tracing in the Cloud

Secure Fine-Grained Keyword Search With Efficient User Revocation and Traitor Tracing in the Cloud

Mamta, Brij B. Gupta
Copyright: © 2020 |Volume: 32 |Issue: 4 |Pages: 26
ISSN: 1546-2234|EISSN: 1546-5012|EISBN13: 9781522583714|DOI: 10.4018/JOEUC.2020100106
Cite Article Cite Article

MLA

Mamta, and Brij B. Gupta. "Secure Fine-Grained Keyword Search With Efficient User Revocation and Traitor Tracing in the Cloud." JOEUC vol.32, no.4 2020: pp.112-137. http://doi.org/10.4018/JOEUC.2020100106

APA

Mamta & Gupta, B. B. (2020). Secure Fine-Grained Keyword Search With Efficient User Revocation and Traitor Tracing in the Cloud. Journal of Organizational and End User Computing (JOEUC), 32(4), 112-137. http://doi.org/10.4018/JOEUC.2020100106

Chicago

Mamta, and Brij B. Gupta. "Secure Fine-Grained Keyword Search With Efficient User Revocation and Traitor Tracing in the Cloud," Journal of Organizational and End User Computing (JOEUC) 32, no.4: 112-137. http://doi.org/10.4018/JOEUC.2020100106

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Fine-grained searching is an important feature in multi-user cloud environment and a combination of attribute-based encryption (ABE) and searchable encryption (SE) is used to facilitate it. This combination provides a powerful tool where multiple data owners can share their data with multiple data users in an independent and differential manner. In this article, the authors have used key-policy design framework of attribute-based encryption to construct the multi-keyword search scheme where access rights assigned to a data user are associated with his/her secret key. This leads to a situation where a data user can abuse his secret key to distribute it illegally to the unauthorized users to perform search over the shared data which is not intended for him/her. Therefore, to track such kind of key abusers the authors have embedded an extra functionality of tracing the traitors. For this purpose, each user is assigned a unique identity in the form of binary string where each bit represents an attribute related to his identity. In addition to the normal attributes, the access structure of a user also possesses identity-related attributes which are hidden from the user along with some normal attributes. Hence, the proposed scheme supports partial anonymity. Further, in the event of user revocation the proposed scheme efficiently handles the system update process by delegating the computationally intensive tasks to the cloud server. Finally, the proposed scheme is proved secure under Decisional Bilinear Diffie-Hellman (DBDH) assumption and decision linear assumption in the selective security model.