Author Login Editor-in-Chief Peer Review Editor Work Office Work

Computer Engineering ›› 2023, Vol. 49 ›› Issue (12): 121-128. doi: 10.19678/j.issn.1000-3428.0067398

• Cyberspace Security • Previous Articles     Next Articles

Sortable Attribute-Based Searchable Encryption Scheme Under Cloud-Edge Collaboration

Zheng WANG, Suzhen CAO, Xiao ZHAO, Dawei ZHOU, Dandan XING   

  1. College of Computer Science and Engineering, Northwest Normal University, Lanzhou 730070, China
  • Received:2023-04-13 Online:2023-12-15 Published:2023-07-27

云边协同下可排序的属性基可搜索加密方案

王正, 曹素珍, 赵晓, 周大伟, 邢丹丹   

  1. 西北师范大学 计算机科学与工程学院, 兰州 730070
  • 作者简介:

    王正(1998-), 女, 硕士研究生, CCF学生会员, 主研方向为网络与信息安全

    曹素珍, 副教授

    赵晓, 硕士研究生

    周大伟, 硕士研究生

    邢丹丹, 硕士研究生

  • 基金资助:
    国家自然科学基金(62262060); 甘肃省教育厅产业支撑计划项目(2022CYZC-17)

Abstract:

Cloud and edge computing technologies can effectively solve the complex storage and computing needs of the explosive growth of network edge traffic. However, after data outsourcing, users' sensitive information may be leaked due to incomplete trust in cloud and edge devices. An Attribute-Based Searchable Encryption(ABSE) scheme with cloud-edge collaboration is proposed to solve this problem. Cloud-edge collaboration technology is adopted to store many ciphertexts on the cloud server, and the corresponding encryption index is uploaded to the nearest edge node for multi-keyword search and auxiliary decryption to improve communication efficiency. The TF-IDF rule is used to return only the Top-k files that meet the users' needs in the search results, hence the multi-keyword sorting. The user attribute is divided into value and name, and only the attribute name is disclosed to protect the users' sensitive information by hiding the attribute value. At the same time, online/offline hybrid encryption technology is used to reduce the users' computing overhead. Based on DBDH and q-parallel DBDH hypothesis, the proposed scheme is proved to be INDistinguishable against Chosen Keyword Attack(IND-CKA) in the random prediction model. According to the analysis of experimental results, compared with a suboptimal scheme, the computational overhead of this scheme is reduced by 10% and 25%. Simultaneously, the scheme remains constant in the decryption stage and has higher efficiency and practicability of ciphertext retrieval.

Key words: edge computing, TF-IDF rule, Searchable Encryption(SE), attribute encryption, policy hiding

摘要:

云计算和边缘计算技术可以有效解决网络边缘流量爆炸式增长带来的巨大存储和计算需求,但数据外包后用户的敏感信息可能会因云端和边缘设备的不完全可信出现泄露问题。为了解决该问题,提出云边协同下可排序的属性基可搜索加密方案。采用云边协同技术,将大量的密文存储到云服务器,使与其对应的加密索引上传到距离最近的边缘节点进行多关键字搜索和辅助解密,提高通信效率。采用TF-IDF规则使搜索结果中仅返回最符合用户需求的Top-k文件,从而实现多关键字排序。将用户的属性分为属性值和属性名,仅公开属性名,从而通过隐藏属性值的方式达到保护用户敏感信息的目的,同时采用在线/离线混合加密技术降低用户计算开销。基于DBDH和q-parallel DBDH假设证明了该方案在随机预言模型中的选择关键字攻击下满足不可区分性。分析结果表明,该方案在加密和陷门生成阶段的计算开销相比于次优方案降低了10%和25%,同时在解密阶段保持恒定,具有更高的密文检索效率。

关键词: 边缘计算, TF-IDF规则, 可搜索加密, 属性加密, 策略隐藏