Controllable Predicate Encryption Schemes for Privacy Preserving Search in Cloud Storage
博士 === 國立中山大學 === 資訊工程學系研究所 === 101 === In traditional public-key encryption, a receiver generates a pair of keys, a private key SK and a corresponding public key PK. A sender obtains the above public key and encrypts a message with this key. Only the owner of SK, the receiver, can decrypt the ciphe...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2013
|
Online Access: | http://ndltd.ncl.edu.tw/handle/69505113963058303313 |
id |
ndltd-TW-101NSYS5392022 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-101NSYS53920222015-10-13T22:40:31Z http://ndltd.ncl.edu.tw/handle/69505113963058303313 Controllable Predicate Encryption Schemes for Privacy Preserving Search in Cloud Storage 運用於雲儲存隱私保護搜尋之可控制謂語加密機制 Shi-Yuan Huang 黃士原 博士 國立中山大學 資訊工程學系研究所 101 In traditional public-key encryption, a receiver generates a pair of keys, a private key SK and a corresponding public key PK. A sender obtains the above public key and encrypts a message with this key. Only the owner of SK, the receiver, can decrypt the ciphertext and read the message. The above scenario only suits point-to-point communication. Recently, cloud computing prevails over the whole world, and a lot of sensitive data will be stored into the cloud. Due to the data privacy, it is necessary for users to encrypt their sensitive data before storing them into the cloud. However, there exist some shortcomings in the setting of traditional public-key encryption. When the receiver wants to search some particular data that are stored in the cloud server, the server cannot perform search over the ciphertext space. In order to solve this problem, predicate encryption schemes were proposed. Predicate encryption is a new cryptographic primitive that provides fine-grained control over the accesses to encrypted data. In the setting of predicate encryption, any message can be encrypted with PK and a set of attributes. The receiver can make use of SK to generate a search token corresponding to a predicate. The cloud server can take this token generated by the receiver to test or decrypt the ciphertexts if and only if the set of attributes of the ciphertexts satisfies the predicate of the secret token. In this dissertation, we propose a controllable predicate encryption scheme for inner product predicates, which is the first work that can provide timed-release services and data self-destruction property. Owing to these properties, the sender can set the readable/unreadable time of the files to be sent to the receiver. The receiver can read the sent file only after the readable time. After the unreadable time, the structure of the file will be destroyed and the file will become unreadable. Furthermore, for practical usage purposes, an extended scheme, which is based on the proposed scheme, provides not only timed-release services and data self-destruction but also long message encryption and search without decryption. In the extended scheme, the length of encrypted messages does not depend on the order of the group. Moreover, the cloud server can obtain only the matched ciphertexts after the search. In order to improve efficiency of predicate encryption, we construct a lightweight scheme of the predicate encryption that uses hidden vector predicates rather than inner product predicates. We also present a lightweight symmetric scheme of the predicate encryption, which provides two privacy preserving search functionalities, including revocable delegated search and delegated search without decryption. Due to these functionalities, the owner of a cloud storage can easily control the lifetimes and search privileges of cloud data. We also present system implementations of the above lightweight schemes in the Appendixes. Chun-I Fan 范俊逸 2013 學位論文 ; thesis 107 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
博士 === 國立中山大學 === 資訊工程學系研究所 === 101 === In traditional public-key encryption, a receiver generates a pair of keys, a private key SK and a corresponding public key PK. A sender obtains the above public key and encrypts a message with this key. Only the owner of SK, the receiver, can decrypt the ciphertext and read the message. The above scenario only suits point-to-point communication. Recently, cloud computing prevails over the whole world, and a lot of sensitive data will be stored into the cloud. Due to the data privacy, it is necessary for users to encrypt their sensitive data before storing them into the cloud. However, there exist some shortcomings in the setting of traditional public-key encryption. When the receiver wants to search some particular data that are stored in the cloud server, the server cannot perform search over the ciphertext space. In order to solve this problem, predicate encryption schemes were proposed. Predicate encryption is a new cryptographic primitive that provides fine-grained control over the accesses to encrypted data. In the setting of predicate encryption, any message can be encrypted with PK and a set of attributes. The receiver can make use of SK to generate a search token corresponding to a predicate. The cloud server can take this token generated by the receiver to test or decrypt the ciphertexts if and only if the set of attributes of the ciphertexts satisfies the predicate of the secret token.
In this dissertation, we propose a controllable predicate encryption scheme for inner product predicates, which is the first work that can provide timed-release services and data self-destruction property. Owing to these properties, the sender can set the readable/unreadable time of the files to be sent to the receiver. The receiver can read the sent file only after the readable time. After the unreadable time, the structure of the file will be destroyed and the file will become unreadable. Furthermore, for practical usage purposes, an extended scheme, which is based on the proposed scheme, provides not only timed-release services and data self-destruction but also long message encryption and search without decryption. In the extended scheme, the length of encrypted messages does not depend on the order of the group. Moreover, the cloud server can obtain only the matched ciphertexts after the search.
In order to improve efficiency of predicate encryption, we construct a lightweight scheme of the predicate encryption that uses hidden vector predicates rather than inner product predicates. We also present a lightweight symmetric scheme of the predicate encryption, which provides two privacy preserving search functionalities, including revocable delegated search and delegated search without decryption. Due to these functionalities, the owner of a cloud storage can easily control the lifetimes and search privileges of cloud data. We also present system implementations of the above lightweight schemes in the Appendixes.
|
author2 |
Chun-I Fan |
author_facet |
Chun-I Fan Shi-Yuan Huang 黃士原 |
author |
Shi-Yuan Huang 黃士原 |
spellingShingle |
Shi-Yuan Huang 黃士原 Controllable Predicate Encryption Schemes for Privacy Preserving Search in Cloud Storage |
author_sort |
Shi-Yuan Huang |
title |
Controllable Predicate Encryption Schemes for Privacy Preserving Search in Cloud Storage |
title_short |
Controllable Predicate Encryption Schemes for Privacy Preserving Search in Cloud Storage |
title_full |
Controllable Predicate Encryption Schemes for Privacy Preserving Search in Cloud Storage |
title_fullStr |
Controllable Predicate Encryption Schemes for Privacy Preserving Search in Cloud Storage |
title_full_unstemmed |
Controllable Predicate Encryption Schemes for Privacy Preserving Search in Cloud Storage |
title_sort |
controllable predicate encryption schemes for privacy preserving search in cloud storage |
publishDate |
2013 |
url |
http://ndltd.ncl.edu.tw/handle/69505113963058303313 |
work_keys_str_mv |
AT shiyuanhuang controllablepredicateencryptionschemesforprivacypreservingsearchincloudstorage AT huángshìyuán controllablepredicateencryptionschemesforprivacypreservingsearchincloudstorage AT shiyuanhuang yùnyòngyúyúnchǔcúnyǐnsībǎohùsōuxúnzhīkěkòngzhìwèiyǔjiāmìjīzhì AT huángshìyuán yùnyòngyúyúnchǔcúnyǐnsībǎohùsōuxúnzhīkěkòngzhìwèiyǔjiāmìjīzhì |
_version_ |
1718079621352652800 |