
Research Article
Puncturable Search: Enabling Authorized Search in Cross-data Federation
@INPROCEEDINGS{10.1007/978-3-030-91424-0_18, author={Lin Mei and Chungen Xu and Qianmu Li}, title={Puncturable Search: Enabling Authorized Search in Cross-data Federation}, proceedings={Quality, Reliability, Security and Robustness in Heterogeneous Systems. 17th EAI International Conference, QShine 2021, Virtual Event, November 29--30, 2021, Proceedings}, proceedings_a={QSHINE}, year={2021}, month={11}, keywords={Cloud storage Data federation Searchable encryption Puncturable encryption Keyword guessing attack}, doi={10.1007/978-3-030-91424-0_18} }
- Lin Mei
Chungen Xu
Qianmu Li
Year: 2021
Puncturable Search: Enabling Authorized Search in Cross-data Federation
QSHINE
Springer
DOI: 10.1007/978-3-030-91424-0_18
Abstract
Recently, most popular cloud storage solutions offer data syncing and federation, but it also brings security risks. Generally, users can deploy encryption technology to dispel data privacy concerns, but the usability of data will be hindered, e.g., searchability. Multi-user searchable encryption (MUSE) scheme is a paradigm that enables search over encrypted data federated from different users. However, to the best of our knowledge, most of the existing MUSEs are vulnerable to the insider keyword guessing attack (IKGA). Besides, therein real-time team collaboration incurs significant communication and computation costs, leading to high latency. To this end, in this paper, we focus on developing a secure and efficient encrypted search scheme with little cost. Specifically, we first propose a dual-server Public-key Puncturable Encryption with Keyword Search (dPPEKS) scheme in a cross data federation scenario by extending the Puncturable Encryption (PE) and searchable encryption (SE) technologies. Our scheme realizes the efficient and dynamic update of teammates, including user joining and exiting. Through analysis, we prove that our scheme can achieve IND-CKA2 security and resist IKGA. In addition, the performance analysis demonstrates that our scheme gains a better balance in security and efficiency.