Chinese Journal of Network and Information Security ›› 2022, Vol. 8 ›› Issue (2): 112-121.doi: 10.11959/j.issn.2096-109x.2022019

• Papers • Previous Articles     Next Articles

Searchable encryption scheme based on attribute policy hiding in a cloud environment

Yihua ZHOU1,2, Xinyu HU1,2, Meiqi LI1,2, Yuguang YANG1,2   

  1. 1 Faculty of Information Technology, Beijing University of Technology, Beijing 100124, China
    2 Beijing Key Laboratory of Trusted Computing, Beijing 100124, China
  • Revised:2022-03-02 Online:2022-04-15 Published:2022-04-01
  • Supported by:
    The National Natural Science Foundation of China(62071015)

Abstract:

Attribute-based searchable encryption technology can achieve fine-grained access control of data, but the existing searchable encryption scheme, keyword search, access control and file encryption are basically performed separately, causing the attacker to directly skip the access policy for keyword index matching and file decryption.Besides, the data owners in the existing schemes need to pass the key of the encrypted file to the user in a secure channel, which increases the cost of the data owner.Furthermore, most tree-based access control policies are open and easy to cause privacy leakage.Therefore, based on the LSSS (linear secret sharing schemes) access architecture, the searchable encryption scheme based on attribute policy hiding in a cloud environment was proposed.Through the embedding of policy secret values into keyword encryption and file storage encryption, the combination of access control, keyword search and file encryption were realized.The aggregate key technology enables users to decrypt files without interacting with the data owner, reducing the burden of key management and increasing storage space by approximately 30%.The experimental results and security analysis show that the proposed scheme guarantees the security of stored data, privacy of access strategy and non-connectivity of trap gate.Compared with the existing mainstream scheme, the retrieval efficiency of the proposed scheme has improved to more than 20%.

Key words: searchable encryption, attribute-based encryption, policy hiding, aggregation key

CLC Number: 

No Suggested Reading articles found!