2020
DOI: 10.1109/access.2020.3007179
|View full text |Cite
|
Sign up to set email alerts
|

A Secure Enhanced Key-Policy Attribute-Based Temporary Keyword Search Scheme in the Cloud

Abstract: Attribute-based keyword search (ABKS), as an important type of searchable encryption, has been widely utilized for secure cloud storage. In a key-policy attribute-based temporary keyword search (KP-ABTKS) scheme, a private key is associated with an access policy that controls the search ability of the user, while a search token is associated with a time interval that controls the search time of the cloud server. However, after a careful study, we uncover that the only existing KP-ABTKS construction [1] is not … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(6 citation statements)
references
References 39 publications
0
6
0
Order By: Relevance
“…Figure 3 depicts the computational cost required to produce an index, which again varies linearly with number of attributes utilized. For the proposed approach, it is observed that the time complexity exceeds the work proposed in 2 and 15 however, it is again lesser than 1 . Figure 4 displays the mean execution time for generating the search token.…”
Section: Security and Performance Analysismentioning
confidence: 73%
See 3 more Smart Citations
“…Figure 3 depicts the computational cost required to produce an index, which again varies linearly with number of attributes utilized. For the proposed approach, it is observed that the time complexity exceeds the work proposed in 2 and 15 however, it is again lesser than 1 . Figure 4 displays the mean execution time for generating the search token.…”
Section: Security and Performance Analysismentioning
confidence: 73%
“…The obtained outcomes demonstrate a linear correlation between the execution time and the number of attributes in the schemes under consideration. The proposed scheme and the scheme in 1 have comparable time complexity with a very small difference, however it is slightly higher than 2 and 15 . The average execution time for cloud server search operations is shown in Fig.…”
Section: Security and Performance Analysismentioning
confidence: 90%
See 2 more Smart Citations
“…For reflecting on the progress of our current research, we took into consideration the recent advances that have been accomplished in attribute-based encryption with keyword search [24][25][26][27][28] and attribute-based encryption with privacy protection and accountability [29][30][31][32][33][34][35].…”
Section: State-of-the-art Approachmentioning
confidence: 99%