Oblivious encrypted keyword search with fine-grained access control for cloud storage
Publication Type
Journal Article
Publication Date
5-2025
Abstract
With the rapid expansion of data volumes in cloud computing, more data owners are opting to outsource their data to cloud service providers to reduce local storage and management costs. However, data outsourcing deprives data owners of direct physical control over their data, increasing the risk of unauthorized access and exposure of sensitive information. To mitigate these risks, various privacy-preserving keyword search schemes with access control have been developed, but many are vulnerable to leakage-abuse attacks due to the exposure of access, search or volume patterns, which can lead to privacy breaches in outsourced data and queries. To solve this problem, we propose an oblivious encrypted keyword search scheme with fine-grained access control, called OEKA. It enables efficient oblivious keyword search over encrypted multi-maps by using the adapted XOR filter and distributed point function, ensuring protection of access, search and volume patterns. Moreover, OEKA enforces role-based access control by using polynomial-based access strategy and keyword-based private information retrieval, allowing access policies of retrieved objects to be detecting without revealing the objects themselves. A formal security analysis verifies the scheme’s robustness, and experimental results demonstrate its practical efficiency.
Keywords
Access, search and volume pattern, oblivious keyword search, access control
Discipline
Information Security
Research Areas
Cybersecurity
Publication
IEEE Transactions on Information Forensics and Security
Volume
20
First Page
5521
Last Page
5533
ISSN
1556-6013
Identifier
10.1109/TIFS.2025.3574985
Publisher
Institute of Electrical and Electronics Engineers
Citation
TONG, Qiuyun; DENG, Junyi; LI, Xinghua; MIAO, Yinbin; WANG, Yunwei; and DENG, Robert H..
Oblivious encrypted keyword search with fine-grained access control for cloud storage. (2025). IEEE Transactions on Information Forensics and Security. 20, 5521-5533.
Available at: https://ink.library.smu.edu.sg/sis_research/10241
Additional URL
https://doi.org/10.1109/TIFS.2025.3574985