TY - GEN
T1 - VABKS
T2 - 33rd IEEE Conference on Computer Communications, IEEE INFOCOM 2014
AU - Zheng, Qingji
AU - Xu, Shouhuai
AU - Ateniese, Giuseppe
PY - 2014
Y1 - 2014
N2 - It is common nowadays for data owners to outsource their data to the cloud. Since the cloud cannot be fully trusted, the outsourced data should be encrypted. This however brings a range of problems, such as: How should a data owner grant search capabilities to the data users? How can the authorized data users search over a data owner's outsourced encrypted data? How can the data users be assured that the cloud faithfully executed the search operations on their behalf? Motivated by these questions, we propose a novel cryptographic solution, called verifiable attribute-based keyword search (VABKS). The solution allows a data user, whose credentials satisfy a data owner's access control policy, to (i) search over the data owner's outsourced encrypted data, (ii) outsource the tedious search operations to the cloud, and (iii) verify whether the cloud has faithfully executed the search operations. We formally define the security requirements of VA B K S and describe a construction that satisfies them. Performance evaluation shows that the proposed schemes are practical and deployable.
AB - It is common nowadays for data owners to outsource their data to the cloud. Since the cloud cannot be fully trusted, the outsourced data should be encrypted. This however brings a range of problems, such as: How should a data owner grant search capabilities to the data users? How can the authorized data users search over a data owner's outsourced encrypted data? How can the data users be assured that the cloud faithfully executed the search operations on their behalf? Motivated by these questions, we propose a novel cryptographic solution, called verifiable attribute-based keyword search (VABKS). The solution allows a data user, whose credentials satisfy a data owner's access control policy, to (i) search over the data owner's outsourced encrypted data, (ii) outsource the tedious search operations to the cloud, and (iii) verify whether the cloud has faithfully executed the search operations. We formally define the security requirements of VA B K S and describe a construction that satisfies them. Performance evaluation shows that the proposed schemes are practical and deployable.
UR - http://www.scopus.com/inward/record.url?scp=84904410658&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84904410658&partnerID=8YFLogxK
U2 - 10.1109/INFOCOM.2014.6847976
DO - 10.1109/INFOCOM.2014.6847976
M3 - Conference contribution
AN - SCOPUS:84904410658
SN - 9781479933600
T3 - Proceedings - IEEE INFOCOM
SP - 522
EP - 530
BT - IEEE INFOCOM 2014 - IEEE Conference on Computer Communications
Y2 - 27 April 2014 through 2 May 2014
ER -