International Journal of Information Technology & Computer Science ( IJITCS )
Cloud computing is an improvement product of combining web technology, grid computing and virtualization. It has become one of the most important issues for the information technology in recent years. A lot of applications have been proposed and discussed on the cloud computing environment because it can bring many benefits like reducing the cost of maintaining data centers in an enterprise, low data management cost and retrieval of data whenever you want, etc. As more sensitive and personal data is shared and stored in the cloud computing server, a question of trust on cloud computing is wildly been discussed. One method to alleviate the security worries is storing data in the encrypting form. The drawback of encrypting data is the limitation of usability. In this paper, we construct a group oriented data access model with keyword search that allows multi-users as one sharing group to reduce the duplication of the sharing file. Once the user wants to retrieve the file, he must be in the authorized sharing group and provide correct keywords. The proposed scheme provides the space efficiency for key storage size and computation efficiency for data retrieving .
: Cloud computing, keyword search encryption, hidden vector encryption, broadcast encryption, data access control
- J. Baek, R. Safavi-Naini, and W. Susilo, “Public key encryption with keyword search revisited,”in Computational Science and Its Applications-ICCSA 2008, LNCS, vol. 5072, pp. 1249-1259, 2008.
- D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano, “Public key encryption with keyword search,” in Eurocrypt 2004, LNCS, vol. 3027, pp. 506–522, 2004.
- D. Boneh and B. Waters, “Conjunctive, subset, and range queries on encrypted data,”in Proceedings of TCC'07, LNCS, vol. 4392, pp. 535-554, 2007.
- D. Boneh, C. Gentry and B. Waters, “Collusion resistant broadcast encryption with short ciphertexts and private keys,”in Crypto’05, vol. 3621, pp. 258-275, 2005.
- D. Boneh, X. Boyen, and E. J. Goh, “Hierarchical identity based encryption with constant size ciphertext,” in Advances in Cryptology–Eurocrypt’05, LNCS, vol. 3494, pp. 440–456, 2005.
- V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data,”in CCS '06 proceedings of the 13th ACM conference on Computer and communications security, pp. 89-98, 2006.
- Y. H. Hwang and P.J. Lee, “Public key encryption with conjunctive keyword search and its extension to a multi-user system,”in Pairing-based Cryptography –PAIRING 2007, LNCS, vol. 4575, pp. 2-22, 2007.
- D. Naor, M. Maor, and J. Lotspiech, “Revocation and tracing schemes for stateless receivers,”in Advances in Cryptology–Crypto’01, vol. 2139, pp. 41–62, 2001.
- M. Naor and B. Pinkas, “Efficient trace and revoke schemes,” inProceedings of the 4th International Conference on Financial Cryptography (FC’00), vol. 1962, pp. 1–20, 2000.
- J. H. Park, “Efficient hidden vector encryption for conjunctive queries on encrypted data,”IEEE Transactions on Knowledge and Data Engineering, vol. 23, no. 10, pp. 1483-1497, 2011.
- J. H. Park, H. J. Kim, M. H. Sung and D. H. Lee, “Public key broadcast encryption schemes with shorter transmissions,”IEEE Transactions on Broadcasting, vol. 54, no. 3, pp.401-411, 2008.
- A. Sahai and B. Waters, “Fuzzy identity based encryption,”in Advances in Cryptology–Eurocrypt 2005, LNCS, vol. 3494, pp. 457–473, 2005