Publication Type

Journal Article

Version

acceptedVersion

Publication Date

1-2023

Abstract

Keyword-based search over encrypted data is an important technique to achieve both data confidentiality and utilization in cloud outsourcing services. While commonly used access control mechanisms, such as identity-based encryption and attribute-based encryption, do not generally scale well for hierarchical access permissions. To solve this problem, we propose a Role-based Encrypted Keyword Search (REKS) scheme by using the role-based access control and broadcast encryption. Specifically, REKS allows owners to deploy hierarchical access control by allowing users with parent roles to have access permissions from child roles. Using REKS, we further facilitate token generation preprocessing and efficient user management, thereby significantly reducing the users' final token generation and index update overheads, respectively. Formal security analysis proves that REKS is secure against chosen keyword and internal keyword guessing attacks, and findings from the empirical evaluations demonstrate that REKS is efficient and practical.

Keywords

Access control, Access control, attribute-based encryption, Cloud computing, Encryption, identity-based encryption, Indexes, Keyword search, keyword-based search, role-based access control, Security, Servers

Discipline

Databases and Information Systems | Information Security

Research Areas

Cybersecurity

Publication

IEEE Transactions on Dependable and Secure Computing

First Page

1

Last Page

15

ISSN

1545-5971

Identifier

10.1109/TDSC.2023.3324640

Publisher

Institute of Electrical and Electronics Engineers

Copyright Owner and License

Authors

Additional URL

https://doi.org/10.1109/TDSC.2023.3324640

Share

COinS