Visible to the public Outsourcing Attributed-Based Ranked Searchable Encryption With Revocation for Cloud Storage

TitleOutsourcing Attributed-Based Ranked Searchable Encryption With Revocation for Cloud Storage
Publication TypeJournal Article
Year of Publication2020
AuthorsZhang, L., Su, J., Mu, Y.
JournalIEEE Access
Volume8
Pagination104344–104356
ISSN2169-3536
KeywordsAccess Control, attribute revocation, attribute-based searchable encryption, cloud computing, composability, Encryption, flexible access policy, Frequency measurement, outsourcing, pubcrawl, rank, Resiliency, Searchable encryption
AbstractWith the rapid growth of the cloud computing and strengthening of security requirements, encrypted cloud services are of importance and benefit. For the huge ciphertext data stored in the cloud, many secure searchable methods based on cryptography with keywords are introduced. In all the methods, attribute-based searchable encryption is considered as the truthful and efficient method since it supports the flexible access policy. However, the attribute-based system suffers from two defects when applied in the cloud storage. One of them is that the huge data in the cloud makes the users process all the relevant files related to the certain keyword. For the other side, the users and users' attributes inevitably change frequently. Therefore, attribute revocation is also an important problem in the system. To overcome these drawbacks, an attribute-based ranked searchable encryption scheme with revocation is proposed. We rank the ciphertext documents according to the TFxIDF principle, and then only return the relevant top-k files. Besides the decryption sever, an encryption sever is also introduced. And a large number of computations are outsourced to the encryption server and decryption server, which reduces the computing overhead of the client. In addition, the proposed scheme uses a real-time revocation method to achieve attribute revocation and delegates most of the update tasks to the cloud, which also reduces the calculation overhead of the user side. The performance evaluations show the scheme is feasible and more efficient than the available ones.
DOI10.1109/ACCESS.2020.3000049
Citation Keyzhang_outsourcing_2020