DOI QR코드

DOI QR Code

Concealed Policy and Ciphertext Cryptography of Attributes with Keyword Searching for Searching and Filtering Encrypted Cloud Email

  • Alhumaidi, Hind (Department of Computer Science, College of Computer and Information Systems, Umm Al-Qura University) ;
  • Alsuwat, Hatim (Department of Computer Science, College of Computer and Information Systems, Umm Al-Qura University)
  • Received : 2022.06.05
  • Published : 2022.06.30

Abstract

There has been a rapid increase in the use of cloud email services. As a result, email encryption has become more commonplace as concerns about cloud privacy and security grow. Nevertheless, this increase in usage is creating the challenge of how to effectively be searching and filtering the encrypted emails. They are popular technologies of solving the issue of the encrypted emails searching through searchable public key encryption. However, the problem of encrypted email filtering remains to be solved. As a new approach to finding and filtering encrypted emails in the cloud, we propose a ciphertext-based encrypted policy attribute-based encryption scheme and keyword search procedure based on hidden policy ciphertext. This feature allows the user of searching using some encrypted emails keywords in the cloud as well as allowing the emails filter-based server toward filter the content of the encrypted emails, similar to the traditional email keyword filtering service. By utilizing composite order bilinear groups, a hidden policy system has been successfully demonstrated to be secure by our dual system encryption process. Proposed system can be used with other scenarios such as searching and filtering files as an applicable method.

Keywords

References

  1. Email Statistics Report, 2021-2025 Executive Summary. Accessed: Mar. 3, 2021. [Online]. Available: https://www.radicati.com/wp/wpcontent/uploads/2020/12
  2. D. Boneh, G. Di Crescenzo, and R. Ostrovsky, ''Public key encryption with keyword search,'' in Proc. Int. Conf. Theory Appl. Cryptograph. Techn., Interlaken, Switzerland, 2004, pp. 506-522.
  3. Y. Zhang, Y. Li, and Y. Wang, ''Efficient conjunctive keywords search over encrypted E-Mail data in public key setting,'' Appl. Sci., vol. 9, no. 18, p. 3655, Sep. 2019. https://doi.org/10.3390/app9183655
  4. P. Xu, S. Tang, P. Xu, Q. Wu, H. Hu, and W. Susilo, ''Practical multi-keyword and Boolean search over encrypted E-mail in cloud server,'' IEEE Trans. Services Comput., vol. 14, no. 6, pp. 1877-1889, Nov. 2021. https://doi.org/10.1109/TSC.2019.2903502
  5. H. Li, Q. Huang, J. Shen, G. Yang, and W. Susilo, ''Designatedserver identity-based authenticated encryption with keyword search for encrypted emails,'' Inf. Sci., vol. 481, pp. 330-343, May 2019. https://doi.org/10.1016/j.ins.2019.01.004
  6. J. Byun, H. Rhee, and H. Park, ''Off-line keyword guessing attacks on recent keyword search schemes over encrypted data,'' in Proc. Secure Data Manage., 2006, pp. 75-83.
  7. H. S. Rhee, W. Susilo, and H.-J. Kim, ''Secure searchable public key encryption scheme against keyword guessing attacks,'' IEICE Electron. Exp., vol. 6, no. 5, pp. 237-243, 2009. https://doi.org/10.1587/elex.6.237
  8. Q. Tang and L. Chen, ''Public-key encryption with registered keyword search,'' in Proc. Eur. Public Infrastruct. Workshop. Berlin, Germany: Springer, 2009, pp. 163-178.
  9. J. Chen, ''Cloud storage third-party data security scheme based on fully homomorphic encryption,'' in Proc. Int. Conf. Netw. Inf. Syst. Comput. (ICNISC), Apr. 2016, pp. 155-159.
  10. D. Boneh, A. Sahai, and B. Waters, ''Functional encryption: A new vision for public-key cryptography,'' Commun. ACM, vol. 55, no. 11, pp. 58-64, 2012.
  11. A. Sahai and B. Waters, ''Fuzzy identity-based encryption,'' in Proc. 24th Annu. Int. Conf. Theory Appl. Cryptograph. Techn. Berlin, Germany: Springer, 2005, pp. 457-473.
  12. J. Li, W. Yao, Y. Zhang, H. Qian, and J. Han, ''Flexible and fine-grained attribute-based data storage in cloud computing,'' IEEE Trans. Services Comput., vol. 10, no. 5, pp. 785-796, Jan. 2016. https://doi.org/10.1109/TSC.2016.2520932
  13. J. Li, W. Yao, J. Han, Y. Zhang, and J. Shen, ''User collusion avoidance CP-ABE with efficient attribute revocation for cloud storage,'' IEEE Syst. J., vol. 12, no. 2, pp. 1767-1777, Jun. 2018. https://doi.org/10.1109/jsyst.2017.2667679
  14. J. Li, N. Chen, and Y. Zhang, ''Extended file hierarchy access control scheme with attribute based encryption in cloud computing,'' IEEE Trans. Emerg. Topics Comput., vol. 9, no. 2, pp. 983-993, Apr./Jun. 2021. https://doi.org/10.1109/TETC.2019.2904637
  15. V. Goyal, O. Pandey, A. Sahai, and B. Waters, ''Attribute-based encryption for fine-grained access control of encrypted data,'' in Proc. 13th ACM Conf. Comput. Commun. Secur., 2006, pp. 89-98.
  16. N. Attrapadung and B. Libert, ''Expressive key-policy attribute-based encryption with constant-size ciphertexts,'' in Proc. 14th Int. Conf. Pract. Theory Public Cryptogr. Berlin, Germany: Springer, 2011, pp. 90-108.
  17. J. Li, Q. Yu, and Y. Zhang, ''Key-policy attribute-based encryption against continual auxiliary input leakage,'' Inf. Sci., vol. 470, pp. 175-188, Jan. 2019. https://doi.org/10.1016/j.ins.2018.07.077
  18. T. Nishide, K. Yoneyama, and K. Ohta, ''Attribute-based encryption with partially hidden encryptor-specified access structures,'' in Proc. 6th Int. Conf. Appl. Cryptogr. Netw. Secur., New York, NY, USA, 2008, pp. 111-129.
  19. J. Lai, R. H. Deng, and Y. Li, ''Expressive CP-ABE with partially hidden access structures,'' in Proc. 7th ACM Symp. Inf., Comput. Commun. Secur., Seoul, South Korea, 2012, pp. 18-19.
  20. S. Qiu, J. Liu, Y. Shi, and R. Zhang, ''Hidden policy ciphertext-policy attribute-based encryption with keyword search against keyword guessing attack,'' Sci. China Inf. Sci., vol. 60, no. 5, May 2017, Art. no. 052105.
  21. A. Wu, D. Zheng, Y. Zhang, and M. Yang, ''Hidden policy attribute-based data sharing with direct revocation and keyword search in cloud computing,'' Sensors, vol. 18, no. 7, pp. 2-17, 2018.
  22. A. Lewko, ''Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption,'' Eurocrypt, vol. 6110, pp. 62-91, Dec. 2010.
  23. B. Waters, ''Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions,'' in Advances in Cryptology (Lecture Notes in Computer Science), vol. 5677, S. Halevi, Ed. Berlin, Germany: Springer, 2009, pp. 619-636.
  24. A. Lewko and B. Waters, ''New techniques for dual system encryption and fully secure HIBE wITH SHORT CIPHERtexts,'' in Theory of Cryptography (Lecture Notes in Computer Science), vol. 5978, D. Micciancio, Ed. Berlin, Germany: Springer, 2010, pp. 455-479.
  25. Q. Zheng, S. Xu, and G. Ateniese, ''VABKS: Verifiable attribute-based keyword search over outsourced encrypted data,'' in Proc. IEEE Conf. Comput. Commun., Toronto, ON, Canada, Apr. 2014, pp. 522-530.
  26. W. Sun, S. Yu, W. Lou, Y. T. Hou, and H. Li, ''Protecting your right: Attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud,'' in Proc. IEEE Conf. Comput. Commun., Toronto, ON, Canada, Apr. 2014, pp. 226-234.
  27. S. Wang, D. Zhao, and Y. Zhang, ''Searchable attribute-based encryption scheme with attribute revocation in cloud storage,'' PLoS ONE, vol. 12, no. 8, Aug. 2017, Art. no. e0183459.
  28. J. Li, X. Lin, Y. Zhang, and J. Han, ''KSF-OABE: Outsourced attribute-based encryption with keyword search function for cloud storage,'' IEEE Trans. Services Comput., vol. 10, no. 5, pp. 715-725, Sep./Oct. 2017. https://doi.org/10.1109/TSC.2016.2542813
  29. X. Liu, T. Lu, X. He, X. Yang, and S. Niu, ''Verifiable attribute-based keyword search over encrypted cloud data supporting data deduplication,'' IEEE Access, vol. 8, pp. 52062-52074, 2020. https://doi.org/10.1109/access.2020.2980627
  30. S. Qiu, J. Liu, Y. Shi, and R. Zhang, ''Hidden policy ciphertext-policy attribute-based encryption with keyword search against keyword guessing attack,'' Sci. China Inf. Sci., vol. 60, no. 5, May 2017, Art. no. 052105.
  31. A. Wu, D. Zheng, Y. Zhang, and M. Yang, ''Hidden policy attribute-based data sharing with direct revocation and keyword search in cloud computing,'' Sensors, vol. 18, no. 7, pp. 2-17, 2018.
  32. X. Liu, T. Lu, X. He, X. Yang, and S. Niu, ''Verifiable attribute-based keyword search over encrypted cloud data supporting data deduplication,'' IEEE Access, vol. 8, pp. 52062-52074, 2020. https://doi.org/10.1109/access.2020.2980627
  33. F. Han, J. Qin, H. Zhao, and J. Hu, ''A general transformation from KPABE to searchable encryption,'' Future Gener. Comput. Syst., vol. 30, pp. 107-115, Jan. 2014. https://doi.org/10.1016/j.future.2013.09.013
  34. Y. Zhang, Y. Li, and Y. Wang, ''Efficient conjunctive keywords search over encrypted E-Mail data in public key setting,'' Appl. Sci., vol. 9, no. 18, p. 3655, Sep. 2019. https://doi.org/10.3390/app9183655
  35. H. Li, Q. Huang, J. Shen, G. Yang, and W. Susilo, ''Designatedserver identity-based authenticated encryption with keyword search for encrypted emails,'' Inf. Sci., vol. 481, pp. 330-343, May 2019. https://doi.org/10.1016/j.ins.2019.01.004
  36. D. Boneh, E. J. Goh, and K. Nissim, ''Evaluating 2-DNF formulas on ciphertexts,'' in Theory of Cryptography, vol. 3378, J. Kilian, Ed. Berlin, Germany: Springer, 2005, pp. 325-341. https://doi.org/10.1007/978-3-540-30576-7_18
  37. V. Goyal, A. Jain, and O. Pandey, ''Bounded ciphertext policy attribute based encryption,'' in Proc. 35th Int. Colloq. Autom., Lang. Program., 2008, pp. 1-5.
  38. J. Gao and F. Zhou, "An Encrypted Cloud Email Searching and Filtering Scheme Based on Hidden Policy Ciphertext-Policy Attribute-Based Encryption With Keyword Search," in IEEE Access, vol. 10, pp. 8184-8193, 2022, doi: 10.1109/ACCESS.2021.3136331.
  39. Ulrich, Jan. Supervised machine learning for email thread summarization. Diss. University of British Columbia, 2008.
  40. J. Ulrich, G. Murray, and G. Carenini, ''A publicly available annotated corpus for supervised email summarization,'' in Proc. AAAI Workshop, 2008, pp. 77-82
  41. The Java Pairing Based Cryptography Library. Accessed: Apr. 23, 2022. [Online]. Available: http://gas.dia.unisa.it/projects/jpbc/