Abstract:Abstract-An increasing number of applications have been proposed and discussed on the cloud computing environment because it can bring many benefits like reducing the cost of maintaining data centers in an enterprise, low data management cost and retrieval of data whenever you want, etc. As more and more sensitive information and personal data are centralized into the cloud servers, how to protect data privacy and combat the unauthorized accesses is an important issue in the cloud computing environment since t… Show more
“…So, the trapdoor distribution is obviously a cumbersome task. C. Wang et al [21] gave a keyword search encryption and some properties of their scheme appear similar to ours. They integrate the symmetric key predicate encryption into KP-ABE, which provides the keyword search with the property of fine-grained access control.…”
Section: Discussionmentioning
confidence: 83%
“…If the owner wants to add/remove an index, the only way is to reconstruct the whole ciphertext data. Consequently, works of keyword search schemes [4], [6], [13], [20], [21] do not support the (multi-user) update of indexes. Table 1 gives a comparison between these existing schemes and our scheme.…”
Section: Discussionmentioning
confidence: 99%
“…The owner generates a signature with a specific valid period, and then encrypts the timelimited signature and the time information by a public-key encryption algorithm (Details of signature and public-key encryption algorithms are not specified, and we use C sign and C enc to denote their computation cost for a comparison in Table 3). Their update access control frequently requires [20] no no no no no -no C. Wang et al [21] yes no no yes yes -no Our Scheme yes yes yes yes yes yes yes the owner's help. Moreover, different from our scheme, [12] discussed a different revocation, attribute revocation, which revokes the read access privilege.…”
Section: Discussionmentioning
confidence: 99%
“…Works of [9], [12], [22] are related to the access control of cryptographic cloud storage, and [2], [4], [6], [13], [20], [21], [23] are related to the multi-user encrypted keyword search schemes.…”
Section: Discussionmentioning
confidence: 99%
“…Consequently, neither of these schemes achieves the OI-MWMR for multi-user cryptographic cloud storage. Works of [2], [4], [6], [13], [20], [21], [23] considered the multi-user encrypted keyword search scenario. Bao et al [2], [23] is one of the design bases of our scheme.…”
SUMMARYWe consider the problems of access control and encrypted keyword search for cryptographic cloud storage in such a way that they can be implemented for a multiple users setting. Our fine-grained access control aware multi-user secure keyword search approach interdependently harmonizes these two security notions, access control and encrypted keyword search. Owing to the shrinkage of the cloud server's search space to the user's decryptable subset, the proposed scheme both decreases information leakage and is shown to be efficient by the results of our contrastive performance simulation.
“…So, the trapdoor distribution is obviously a cumbersome task. C. Wang et al [21] gave a keyword search encryption and some properties of their scheme appear similar to ours. They integrate the symmetric key predicate encryption into KP-ABE, which provides the keyword search with the property of fine-grained access control.…”
Section: Discussionmentioning
confidence: 83%
“…If the owner wants to add/remove an index, the only way is to reconstruct the whole ciphertext data. Consequently, works of keyword search schemes [4], [6], [13], [20], [21] do not support the (multi-user) update of indexes. Table 1 gives a comparison between these existing schemes and our scheme.…”
Section: Discussionmentioning
confidence: 99%
“…The owner generates a signature with a specific valid period, and then encrypts the timelimited signature and the time information by a public-key encryption algorithm (Details of signature and public-key encryption algorithms are not specified, and we use C sign and C enc to denote their computation cost for a comparison in Table 3). Their update access control frequently requires [20] no no no no no -no C. Wang et al [21] yes no no yes yes -no Our Scheme yes yes yes yes yes yes yes the owner's help. Moreover, different from our scheme, [12] discussed a different revocation, attribute revocation, which revokes the read access privilege.…”
Section: Discussionmentioning
confidence: 99%
“…Works of [9], [12], [22] are related to the access control of cryptographic cloud storage, and [2], [4], [6], [13], [20], [21], [23] are related to the multi-user encrypted keyword search schemes.…”
Section: Discussionmentioning
confidence: 99%
“…Consequently, neither of these schemes achieves the OI-MWMR for multi-user cryptographic cloud storage. Works of [2], [4], [6], [13], [20], [21], [23] considered the multi-user encrypted keyword search scenario. Bao et al [2], [23] is one of the design bases of our scheme.…”
SUMMARYWe consider the problems of access control and encrypted keyword search for cryptographic cloud storage in such a way that they can be implemented for a multiple users setting. Our fine-grained access control aware multi-user secure keyword search approach interdependently harmonizes these two security notions, access control and encrypted keyword search. Owing to the shrinkage of the cloud server's search space to the user's decryptable subset, the proposed scheme both decreases information leakage and is shown to be efficient by the results of our contrastive performance simulation.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.