ETRI-Knowledge Sharing Plaform

KOREAN
논문 검색
Type SCI
Year ~ Keyword

Detail

Journal Article A Secure Key Aggregate Searchable Encryption with Multi Delegation in Cloud Data Sharing Service
Cited 8 time in scopus Download 142 time Share share facebook twitter linkedin kakaostory
Authors
JoonYoung Lee, MyeongHyun Kim, JiHyeon Oh, YoungHo Park, KiSung Park, Sungkee Noh
Issue Date
2021-10
Citation
Applied Sciences, v.11, no.19, pp.1-20
ISSN
2076-3417
Publisher
MDPI
Language
English
Type
Journal Article
DOI
https://dx.doi.org/10.3390/app11198841
Project Code
21ZR1300, Research on Intelligent Cyber Security and Trust Infra, Kim Ik Kyun
Abstract
As the amount of data generated in various distributed environments is rapidly increasing, cloud servers and computing technologies are attracting considerable attention. However, the cloud server has privacy issues, including personal information and requires the help of a Trusted Third Party (TTP) for data sharing. However, because the amount of data generated and value increases, the data owner who produces data must become the subject of data sharing. In this study, we use key aggregate searchable encryption (KASE) technology, which enables keyword search, to efficiently share data without using TTP. The traditional KASE scheme approach only discusses the authority delegation from the data owner to another user. The traditional KASE scheme approach only discusses delegation of authority from the data owner to another user. However, if the delegated entity cannot perform time-critical tasks because the shared data are unavailable, the delegate must further delegate the rights given to other users. Consequently, this paper proposes a new KASE scheme that enables multi-delegation without TTP and includes an authentication technique between the user and the server. After that, we perform informal and formal analysis using BAN logic and AVISPA for security evaluation, and compare the security and performance aspects with existing schemes.
KSP Keywords
Authentication technique, BAN logic, Cloud server, Computing technology, Critical task, Distributed Environment, Existing schemes, Formal Analysis, Personal information, Privacy issues, Searchable Encryption
This work is distributed under the term of Creative Commons License (CCL)
(CC BY)
CC BY