Title: Keyword search protocol with privacy preservation using ID-based proxy reencryption

Authors: Feng Shao; Shun Zhang; Hong Zhong; Run-hua Shi; Jie Cui

Addresses: School of Computer Science and Technology, Anhui University, Hefei 230601, China ' School of Computer Science and Technology, Anhui University, Hefei 230601, China ' School of Computer Science and Technology, Anhui University, Hefei 230601, China ' School of Computer Science and Technology, Anhui University, Hefei 230601, China ' School of Computer Science and Technology, Anhui University, Hefei 230601, China

Abstract: The data owner encrypts the data stored in the cloud to protect data privacy. However, when it comes to user revocation, the data owner must re-encrypt all data in order to prevent revoked users from decrypting the ciphertext. To reduce the computational cost of the data owner while simultaneously supporting privacy preservation, this paper proposes an efficient keyword search scheme by using identity (ID)-based proxy re-encryption technology. When a user sends a query request to the cloud server, the cloud server returns the corresponding query results encrypted by using a proxy re-encryption algorithm. Effective user revocation is achieved by simply managing re-encryption keys rather than re-encrypting the entirety of the data. Additionally, the proposed scheme supports preservation of privacy in query results. Analytical results demonstrate that the proposed protocol significantly reduces the computation and communication costs of the data owner while achieving secure user revocation.

Keywords: cloud computing; keyword search; rank search; privacy preservation; identity-based proxy reencryption; privacy protection; cloud security; cryptography; user revocation.

DOI: 10.1504/IJSN.2016.079307

International Journal of Security and Networks, 2016 Vol.11 No.4, pp.188 - 195

Received: 26 Mar 2016
Accepted: 01 Apr 2016

Published online: 26 Sep 2016 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article