We developed RBAC enabled PEKS scheme, i.e., R-PEKS, for secure access of cloud data, which is suitable for the applications where changing privileges are done frequently...
Abstract:
In the recent past, few works have been done by combining attribute-based access control with multi-user PEKS, i.e., public key encryption with keyword search. Such attri...Show MoreMetadata
Abstract:
In the recent past, few works have been done by combining attribute-based access control with multi-user PEKS, i.e., public key encryption with keyword search. Such attribute enabled searchable encryption is most suitable for applications where the changing of privileges is done once in a while. However, to date, no efficient and secure scheme is available in the literature that is suitable for these applications where changing privileges are done frequently. In this paper our contributions are twofold. Firstly, we propose a new PEKS scheme for string search, which, unlike the previous constructions, is free from bi-linear mapping and is efficient by 97% compared to PEKS for string search proposed by Ray et.al in TrustCom 2017. Secondly, we introduce role based access control (RBAC) to multi-user PEKS, where an arbitrary group of users can search and access the encrypted files depending upon roles. We termed this integrated scheme as R-PEKS. The efficiency of R-PEKS over the PEKS scheme is up to 90%. We provide formal security proofs for the different components of R-PEKS and validate these schemes using a commercial dataset.
We developed RBAC enabled PEKS scheme, i.e., R-PEKS, for secure access of cloud data, which is suitable for the applications where changing privileges are done frequently...
Published in: IEEE Access ( Volume: 7)
Funding Agency:
Keywords assist with retrieval of results and provide a means to discovering other relevant content. Learn more.
- IEEE Keywords
- Index Terms
- Secure Access ,
- Role-based Access Control ,
- Search String ,
- Access Control ,
- Public Key ,
- Bilinear Map ,
- Security Scheme ,
- Security Proof ,
- Encrypted File ,
- User Data ,
- Small And Medium-sized Enterprises ,
- Hash Function ,
- Secret Key ,
- Polynomial-time Algorithm ,
- Data Owner ,
- Encrypted Data ,
- Personal Health Records ,
- Key Generation ,
- Threat Model ,
- Access Control Mechanism ,
- Word Position ,
- Public Cloud ,
- Huge Computational Cost ,
- Grouping Scheme ,
- Security Parameter ,
- Symmetric Set ,
- Encryption Scheme ,
- Cryptographic Primitives ,
- Experimental Output
- Author Keywords
- Access control ,
- cloud computing ,
- MUSE ,
- PEKS ,
- RBAC ,
- SUSE
Keywords assist with retrieval of results and provide a means to discovering other relevant content. Learn more.
- IEEE Keywords
- Index Terms
- Secure Access ,
- Role-based Access Control ,
- Search String ,
- Access Control ,
- Public Key ,
- Bilinear Map ,
- Security Scheme ,
- Security Proof ,
- Encrypted File ,
- User Data ,
- Small And Medium-sized Enterprises ,
- Hash Function ,
- Secret Key ,
- Polynomial-time Algorithm ,
- Data Owner ,
- Encrypted Data ,
- Personal Health Records ,
- Key Generation ,
- Threat Model ,
- Access Control Mechanism ,
- Word Position ,
- Public Cloud ,
- Huge Computational Cost ,
- Grouping Scheme ,
- Security Parameter ,
- Symmetric Set ,
- Encryption Scheme ,
- Cryptographic Primitives ,
- Experimental Output
- Author Keywords
- Access control ,
- cloud computing ,
- MUSE ,
- PEKS ,
- RBAC ,
- SUSE