Attribute-Based Searchable Encryption: A Survey
Abstract
:1. Introduction
1.1. Related Work
1.2. Main Contributions
- Detailed discussion on the current status and trends of ABE research from the aspects of enhancing security, improving computational efficiency, and enhancing flexibility.
- Summarization of the common application domains of ABSE, such as smart grids, healthcare, and the Internet of Things (IoT), along with relevant schemes.
- Discussion on the challenges and future directions of ABSE development.
1.3. Research Methodology
1.4. Organization
2. Attribute-Based Searchable Encryption
2.1. Introduction to Attribute-Based Searchable Encryption
2.2. Syntax of Attribute-Based Searchable Encryption
3. Enhanced Security
3.1. Enhanced Privacy Protection
3.1.1. Policy Hiding
3.1.2. Keyword Privacy Protection
3.2. Optimization of Access Control Techniques
3.2.1. Traceability
3.2.2. Revocability
3.3. Security Models
Security Models | Description | Schemes |
---|---|---|
Chosen Plaintext Attack (CPA) | Attackers may choose random plaintexts that are encrypted to obtain the corresponding ciphertexts. | [46,58,64,65,66] |
Chosen Ciphertext Attack (CCA) | Attackers can not only obtain ciphertext corresponding to plaintext but can also obtain plaintext corresponding to a limited number of ciphertexts. | [61,64] |
Chosen Keywords Attack (CKA) | Attackers selectively target keywords to obtain the decryption of the chosen keywords. | [23,46,57,58,61,63,64,65,67,68] |
Keyword Guessing Attack (KGA) | Attackers attempt to guess potential keywords and generate ciphertexts for testing. | [24,33,69,70] |
Indistinguishability under CKA (IND-CKA) | In the CKA model, it is examined whether encryption algorithms can achieve indistinguishability of ciphertexts. | [23,61,63] |
Indistinguishability under CPA (IND-CPA) | In the CPA model, it is examined whether encryption algorithms can achieve indistinguishability of ciphertexts. | [64] |
Indistinguishability under CCA (IND-CCA) | In the CCA model, it is examined whether encryption algorithms can achieve indistinguishability of ciphertexts. | [61,62,64] |
3.4. Discussion
4. Efficiency Improvement
4.1. Outsourcing Computation
4.2. Online/Offline Encryption Mechanism
4.3. Index Structure Optimization
4.4. Discussion
5. Enhanced Flexibility
5.1. Enhanced Search Capability
5.2. Expressiveness Diversity
5.3. Support for Large Universe
5.4. Discussion
6. Application Areas
6.1. Smart Grid
6.2. Healthcare
6.3. Internet of Things
6.4. Discussion
7. Future Directions
7.1. Enhanced Security
7.2. Improved Efficiency
7.3. Integration into Multiple Application Areas
7.4. Integration with Advanced Technologies
8. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
Abbreviations
ABE | Attribute-Based Encryption |
ABSE | Attribute-Based Searchable Encryption |
CCA | Chosen Ciphertext Attack |
CKA | Chosen Keyword Attack |
CPA | Chosen Plaintext Attack |
CP-ABE | Ciphertext-Policy Attribute-Based Encryption |
CS | Cloud Server |
DO | Data Owner |
DU | Data User |
EMR | Electronic Medical Record |
FIBE | Fuzzy Identity Binary Encryption |
IBE | Identity-Based Encryption |
IoT | Internet of Things |
IIoT | Industrial Internet of Things |
IND | Indistinguishability Security |
KGA | Keyword Guessing Attack |
KP-ABE | Key-Policy Attribute-Based Encryption |
LSSS | Linear Secret Sharing Scheme |
mIoT | Medical Internet of Things |
PEKS | Public-Key Encryption with Keyword Search |
PHR | Personal Health Records |
SE | Searchable Encryption |
SSE | Searchable Symmetric Encryption |
TA | Trusted Application |
References
- Song, D.X.; Wagner, D.; Perrig, A. Practical techniques for searches on encrypted data. In Proceedings of the 2000 IEEE Symposium on Security and Privacy. S&P 2000, Berkeley, CA, USA, 14–17 May 2000; pp. 44–55. [Google Scholar] [CrossRef]
- Boneh, D.; Di Crescenzo, G.; Ostrovsky, R.; Persiano, G. Public Key Encryption with Keyword Search. In Proceedings of the Advances in Cryptology-EUROCRYPT 2004: International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, 2–6 May 2004; Cachin, C., Camenisch, J.L., Eds.; Springer: Berlin/Heidelberg, Germany, 2004; pp. 506–522. [Google Scholar]
- Varri, U.; Varri, U.; Pasupuleti, S.K.; Kadambari, K.V. A scoping review of searchable encryption schemes in cloud computing: Taxonomy, methods, and recent developments. J. Supercomput. 2019, 76, 3013–3042. [Google Scholar] [CrossRef]
- Sahai, A.; Waters, B. Fuzzy Identity-Based Encryption. In Proceedings of the Advances in Cryptology—EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, 22–26 May 2005; Cramer, R., Ed.; Springer: Berlin/Heidelberg, Germany, 2005; pp. 457–473. [Google Scholar]
- Goyal, V.; Pandey, O.; Sahai, A.; Waters, B. Attribute-based encryption for fine-grained access control of encrypted data. IACR Cryptol. ePrint Arch. 2006, 2006, 309. [Google Scholar]
- Bethencourt, J.; Sahai, A.; Waters, B. Ciphertext-Policy Attribute-Based Encryption. In Proceedings of the 2007 IEEE Symposium on Security and Privacy (SP ’07), Berkeley, CA, USA, 20–23 May 2007; pp. 321–334. [Google Scholar]
- Wang, C.; Li, W.; Li, Y.; Xu, X. A Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Keyword Search Function. In Proceedings of the Cyberspace Safety and Security: 5th International Symposium, CSS 2013, Zhangjiajie, China, 13–15 November 2013; Wang, G., Ray, I., Feng, D., Rajarajan, M., Eds.; Springer: Cham, Switzerland, 2013; pp. 377–386. [Google Scholar]
- Zheng, Q.; Xu, S.; Ateniese, G. VABKS: Verifiable attribute-based keyword search over outsourced encrypted data. In Proceedings of the IEEE INFOCOM 2014—IEEE Conference on Computer Communications, Toronto, ON, Canada, 27 April–2 May 2014; pp. 522–530. [Google Scholar] [CrossRef]
- Andola, N.; Gahlot, R.; Yadav, V.K.; Venkatesan, S.; Verma, S. Searchable encryption on the cloud: A survey. J. Supercomput. 2022, 78, 9952–9984. [Google Scholar] [CrossRef]
- Sookhak, M.; Yu, F.R.; Khan, M.K.; Xiang, Y.; Buyya, R. Attribute-based data access control in mobile cloud computing: Taxonomy and open issues. Future Gener. Comput. Syst. 2017, 72, 273–287. [Google Scholar] [CrossRef]
- Kumar, P.; Alphonse, P.J. Attribute based encryption in cloud computing: A survey, gap analysis, and future directions. J. Netw. Comput. Appl. 2018, 108, 37–52. [Google Scholar] [CrossRef]
- Porwal, S.; Mittal, S. A Review of Key Delegation Schemes in Ciphertext Policy-Attribute Based Encryption. In Proceedings of the 2023 International Conference on Computational Intelligence, Communication Technology and Networking (CICTN), Ghaziabad, India, 20–21 April 2023; pp. 309–314. [Google Scholar]
- Bhajantri, L.B.; Mujawar, T.N. A Comprehensive Review of Access Control Mechanism Based on Attribute Based Encryption Scheme for Cloud Computing. Res. Anthol. Artif. Intell. Appl. Secur. 2021, 11, 33–52. [Google Scholar]
- Nishide, T.; Yoneyama, K.; Ohta, K. Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures. In Proceedings of the Applied Cryptography and Network Security: 6th International Conference, ACNS 2008, New York, NY, USA, 3–6 June 2008; Bellovin, S.M., Gennaro, R., Keromytis, A., Yung, M., Eds.; Springer: Berlin/Heidelberg, Germany, 2008; pp. 111–129. [Google Scholar]
- Lai, J.; Deng, R.H.; Li, Y. Fully Secure Cipertext-Policy Hiding CP-ABE. In Proceedings of the Information Security Practice and Experience: 7th International Conference, ISPEC 2011, Guangzhou, China, 30 May–1 June 2011; Bao, F., Weng, J., Eds.; Springer: Berlin/Heidelberg, Germany, 2011; pp. 24–39. [Google Scholar]
- Balu, A.; Kuppusamy, K. Privacy Preserving Ciphertext Policy Attribute Based Encryption. In Proceedings of the Applied Cryptography and Network Security: 6th International Conference, ACNS 2008, New York, NY, USA, 3–6 June 2008; Meghanathan, N., Boumerdassi, S., Chaki, N., Nagamalai, D., Eds.; Springer: Berlin/Heidelberg, Germany, 2010; pp. 402–409. [Google Scholar]
- Lai, J.; Deng, R.H.; Li, Y. Expressive CP-ABE with partially hidden access structures. In Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, ASIACCS ’12, Seoul, Republic of Korea, 2–4 May 2012; pp. 18–19. [Google Scholar]
- Zhang, Y.; Deng, R.H.; Han, G.; Zheng, D. Secure smart health with privacy-aware aggregate authentication and access control in Internet of Things. J. Netw. Comput. Appl. 2018, 123, 89–100. [Google Scholar] [CrossRef]
- Koo, D.; Hur, J.; Yoon, H. Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage. Comput. Electr. Eng. 2013, 39, 34–46. [Google Scholar] [CrossRef]
- Chaudhari, P.; Das, M.L. On the Security of a Searchable Anonymous Attribute Based Encryption. In Proceedings of the Mathematics and Computing: Third International Conference, ICMC 2017, Haldia, India, 17–21 January 2017; Giri, D., Mohapatra, R.N., Begehr, H., Obaidat, M.S., Eds.; Springer: Singapore, 2017; pp. 16–25. [Google Scholar]
- Shi, J.; Lai, J.; Li, Y.; Deng, R.H.; Weng, J. Authorized Keyword Search on Encrypted Data. In Proceedings of the Computer Security-ESORICS 2014: 19th European Symposium on Research in Computer Security, Wroclaw, Poland, 7–11 September 2014; Kutyłowski, M., Vaidya, J., Eds.; Springer: Cham, Switzerland, 2014; pp. 419–435. [Google Scholar]
- Wang, H.; Dong, X.; Cao, Z. Multi-Value-Independent Ciphertext-Policy Attribute Based Encryption with Fast Keyword Search. IEEE Trans. Serv. Comput. 2020, 13, 1142–1151. [Google Scholar] [CrossRef]
- Chaudhari, P.; Das, M.L. KeySea: Keyword-Based Search with Receiver Anonymity in Attribute-Based Searchable Encryption. IEEE Trans. Serv. Comput. 2022, 15, 1036–1044. [Google Scholar] [CrossRef]
- Miao, Y.; Liu, X.; Choo, K.K.R.; Deng, R.H.; Li, J.; Li, H.; Ma, J. Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting. IEEE Trans. Dependable Secur. Comput. 2021, 18, 1080–1094. [Google Scholar] [CrossRef]
- Sun, J.; Xiong, H.; Nie, X.; Zhang, Y.; Wu, P. On the Security of Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-Owner Setting. IEEE Trans. Dependable Secur. Comput. 2021, 18, 2518–2519. [Google Scholar] [CrossRef]
- Byun, J.W.; Rhee, H.S.; Park, H.A.; Lee, D.H. Off-Line Keyword Guessing Attacks on Recent Keyword Search Schemes over Encrypted Data. In Proceedings of the Secure Data Management, Seoul, Republic of Korea, 10–11 September 2006; Jonker, W., Petković, M., Eds.; Springer: Berlin/Heidelberg, Germany, 2006; pp. 75–83. [Google Scholar]
- Baek, J.; Safavi-Naini, R.; Susilo, W. Public Key Encryption with Keyword Search Revisited. In Proceedings of the Computational Science and Its Applications–ICCSA 2008: International Conference, Perugia, Italy, 30 June–3 July 2008; Gervasi, O., Murgante, B., Laganà, A., Taniar, D., Mun, Y., Gavrilova, M.L., Eds.; Springer: Berlin/Heidelberg, Germany, 2008; pp. 1249–1259. [Google Scholar]
- Yau, W.C.; Phan, R.C.W.; Heng, S.H.; Goi, B.M. Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester. Int. J. Comput. Math. 2013, 90, 2581–2587. [Google Scholar] [CrossRef]
- Jeong, I.R.; Kwon, J.O.; Hong, D.; Lee, D.H. Constructing PEKS schemes secure against keyword guessing attacks is possible? Comput. Commun. 2009, 32, 394–396. [Google Scholar] [CrossRef]
- Rhee, H.S.; Park, J.H.; Susilo, W.; Lee, D.H. Trapdoor security in a searchable public-key encryption scheme with a designated tester. J. Syst. Softw. 2010, 83, 763–771. [Google Scholar] [CrossRef]
- Wang, C.H.; Tu, T.Y. Keyword search encryption scheme resistant against keyword-guessing attack by the untrusted server. J. Shanghai Jiaotong Univ. 2014, 19, 440–442. [Google Scholar] [CrossRef]
- Huang, Q.; Li, H. An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks. Inf. Sci. 2017, 403, 1–14. [Google Scholar] [CrossRef]
- Yu, Y.; Shi, J.; Li, H.; Li, Y.; Du, X.; Guizani, M. Key-Policy Attribute-Based Encryption with Keyword Search in Virtualized Environments. IEEE J. Sel. Areas Commun. 2020, 38, 1242–1251. [Google Scholar] [CrossRef]
- Qiu, S.; Liu, J.; Shi, Y.; Zhang, R. Hidden policy ciphertext-policy attribute-based encryption with keyword search against keyword guessing attack. Sci. China Inf. Sci. 2017, 60, 052105:1–052105:12. [Google Scholar] [CrossRef]
- Luo, F.; Wang, H.; Lin, C.; Yan, X. ABAEKS: Attribute-Based Authenticated Encryption with Keyword Search Over Outsourced Encrypted Data. IEEE Trans. Inf. Forensics Secur. 2023, 18, 4970–4983. [Google Scholar] [CrossRef]
- Liu, Z.; Cao, Z.; Wong, D.S. Traceable CP-ABE: How to Trace Decryption Devices Found in the Wild. IEEE Trans. Inf. Forensics Secur. 2015, 10, 55–68. [Google Scholar]
- Hinek, M.J.; Jiang, S.; Safavi-Naini, R.; Shahandashti, S.F. Attribute-Based Encryption with Key Cloning Protection. IACR Cryptol. ePrint Arch. 2008, 2008, 478. [Google Scholar]
- Yu, S.; Ren, K.; Lou, W.; Li, J. Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems. In Proceedings of the Security and Privacy in Communication Networks: 5th International ICST Conference, SecureComm 2009, Athens, Greece, 14–18 September 2009; Chen, Y., Dimitriou, T.D., Zhou, J., Eds.; Springer: Berlin/Heidelberg, Germany, 2009; pp. 311–329. [Google Scholar]
- Katz, J.; Schröder, D. Tracing Insider Attacks in the Context of Predicate Encryption Schemes. Available online: http://www.cs.umd.edu/~jkatz/papers/ACITA11.pdf (accessed on 21 April 2024).
- Liu, Z.; Cao, Z.; Wong, D.S. White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Any Monotone Access Structures. IEEE Trans. Inf. Forensics Secur. 2013, 8, 76–88. [Google Scholar]
- Liu, Z.; Cao, Z.; Wong, D.S. Blackbox traceable CP-ABE: How to catch people leaking their keys by selling decryption devices on ebay. In Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, Berlin, Germany, 4–8 November 2013. [Google Scholar]
- Liu, Z.; Wong, D.S. Traceable CP-ABE on Prime Order Groups: Fully Secure and Fully Collusion-Resistant Blackbox Traceable. In Proceedings of the Information and Communications Security, Beijing, China, 9–11 December 2015; Qing, S., Okamoto, E., Kim, K., Liu, D., Eds.; Springer: Cham, Switzerland, 2016; pp. 109–124. [Google Scholar]
- Ziegler, D.; Marsalek, A.; Palfinger, G. White-Box Traceable Attribute-Based Encryption with Hidden Policies and Outsourced Decryption. In Proceedings of the 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Shenyang, China, 20–22 October 2021; pp. 331–338. [Google Scholar]
- Luo, F.; Al-Kuwari, S.M. Generic Construction of Black-Box Traceable Attribute-Based Encryption. IEEE Trans. Cloud Comput. 2023, 11, 942–955. [Google Scholar] [CrossRef]
- Yang, Y.; Liu, X.; Deng, R.H.; Li, Y. Lightweight Sharable and Traceable Secure Mobile Health System. IEEE Trans. Dependable Secur. Comput. 2020, 17, 78–91. [Google Scholar] [CrossRef]
- Varri, U.; Kasani, S.; Pasupuleti, S.K.; Kv, K. FELT-ABKS: Fog-Enabled Lightweight Traceable Attribute-Based Keyword Search Over Encrypted Data. IEEE Internet Things J. 2022, 9, 7559–7571. [Google Scholar] [CrossRef]
- Pirretti, M.; Traynor, P.; Mcdaniel, P.; Waters, B. Secure attribute-based systems. J. Comput. Secur. 2006, 18, 799–837. [Google Scholar] [CrossRef]
- Ostrovsky, R.M.; Sahai, A.; Waters, B. Attribute-based encryption with non-monotonic access structures. IACR Cryptol. ePrint Arch. 2007, 2007, 323. [Google Scholar]
- Attrapadung, N.; Imai, H. Conjunctive Broadcast and Attribute-Based Encryption. In Proceedings of the Pairing-Based Cryptography–Pairing 2009: Third International Conference, Palo Alto, CA, USA, 12–14 August 2009; Shacham, H., Waters, B., Eds.; Springer: Berlin/Heidelberg, Germany, 2009; pp. 248–265. [Google Scholar]
- Wang, S.; Zhang, X.; Zhang, Y. Efficient revocable and grantable attribute-based encryption from lattices with fine-grained access control. IET Inf. Secur. 2017, 12, 141–149. [Google Scholar] [CrossRef]
- Tu, S.; Waqas, M.M.; Huang, F.C.; Abbas, G.; Abbas, Z.H. A revocable and outsourced multi-authority attribute-based encryption scheme in fog computing. Comput. Netw. 2021, 195, 108196. [Google Scholar] [CrossRef]
- Dong, X.; Zhang, Y.; Wang, B.; Chen, J. Server-Aided Revocable Attribute-Based Encryption from Lattices. Secur. Commun. Netw. 2020, 2020, 1460531. [Google Scholar] [CrossRef]
- Wei, J.; Chen, X.; Huang, X.; Hu, X.; Susilo, W. RS-HABE: Revocable-Storage and Hierarchical Attribute-Based Access Scheme for Secure Sharing of e-Health Records in Public Cloud. IEEE Trans. Dependable Secur. Comput. 2019, 18, 2301–2315. [Google Scholar] [CrossRef]
- Zhang, R.; Li, J.; Lu, Y.; Han, J.; Zhang, Y. Key escrow-free attribute based encryption with user revocation. Inf. Sci. 2022, 600, 59–72. [Google Scholar] [CrossRef]
- Chen, S.; Li, J.; Zhang, Y.; Han, J. Efficient Revocable Attribute-Based Encryption with Verifiable Data Integrity. IEEE Internet Things J. 2024, 11, 10441–10451. [Google Scholar] [CrossRef]
- Bao, Y.; Qiu, W.; Tang, P.; Cheng, X. Efficient, Revocable, and Privacy-Preserving Fine-Grained Data Sharing with Keyword Search for the Cloud-Assisted Medical IoT System. IEEE J. Biomed. Health Inform. 2022, 26, 2041–2051. [Google Scholar] [CrossRef] [PubMed]
- Miao, Y.; Li, F.; Li, X.; Liu, Z.; Ning, J.; Li, H.; Choo, K.K.; Deng, R. Time-Controllable Keyword Search Scheme with Efficient Revocation in Mobile E-health Cloud. IEEE Trans. Mob. Comput. 2023, 23, 3650–3665. [Google Scholar] [CrossRef]
- Liu, S.; Yu, J.; Xiao, Y.; Wan, Z.; Wang, S.; Yan, B. BC-SABE: Blockchain-Aided Searchable Attribute-Based Encryption for Cloud-IoT. IEEE Internet Things J. 2020, 7, 7851–7867. [Google Scholar] [CrossRef]
- Liu, S.; Chen, L.; Wu, G.; Wang, H.; Yu, H. Blockchain-Backed Searchable Proxy Signcryption for Cloud Personal Health Records. IEEE Trans. Serv. Comput. 2023, 16, 3210–3223. [Google Scholar] [CrossRef]
- Yu, J.; Liu, S.; Xu, M.; Guo, H.; Zhong, F.; Cheng, W. An Efficient Revocable and Searchable MA-ABE Scheme with Blockchain Assistance for C-IoT. IEEE Internet Things J. 2023, 10, 2754–2766. [Google Scholar] [CrossRef]
- Wang, H.Y.; Fan, K.; Zhang, K.; Wang, Z.; Li, H.; Yang, Y. Secure and Efficient Data-Privacy-Preserving Scheme for Mobile Cyber–Physical Systems. IEEE Internet Things J. 2022, 9, 22375–22388. [Google Scholar] [CrossRef]
- Yang, K.; Shu, J.; Xie, R. Efficient and Provably Secure Data Selective Sharing and Acquisition in Cloud-Based Systems. IEEE Trans. Inf. Forensics Secur. 2023, 18, 71–84. [Google Scholar] [CrossRef]
- Liu, J.; Fan, Y.; Sun, R.; Liu, L.; Wu, C.; Mumtaz, S. Blockchain-Aided Privacy-Preserving Medical Data Sharing Scheme for E-Healthcare System. IEEE Internet Things J. 2023, 10, 21377–21388. [Google Scholar] [CrossRef]
- Niu, S.; Hu, Y.; Zhou, S.; Shao, H.; Wang, C. Attribute-Based Searchable Encryption in Edge Computing for Lightweight Devices. IEEE Syst. J. 2023, 17, 3503–3514. [Google Scholar] [CrossRef]
- Zhang, K.; Long, J.; Wang, X.; Dai, H.; Liang, K.; Imran, M. Lightweight Searchable Encryption Protocol for Industrial Internet of Things. IEEE Trans. Ind. Inform. 2021, 17, 4248–4259. [Google Scholar] [CrossRef]
- Zhang, D.; Wang, S.; Zhang, Q.; Zhang, Y. Attribute Based Conjunctive Keywords Search with Verifiability and Fair Payment Using Blockchain. IEEE Trans. Serv. Comput. 2023, 16, 4168–4182. [Google Scholar] [CrossRef]
- Miao, Y.; Ma, J.; Liu, X.; Li, X.; Liu, Z.; Li, H. Practical Attribute-Based Multi-Keyword Search Scheme in Mobile Crowdsourcing. IEEE Internet Things J. 2018, 5, 3008–3018. [Google Scholar] [CrossRef]
- Gao, H.; Huang, H.; Xue, L.; Xiao, F.; Li, Q. Blockchain-Enabled Fine-Grained Searchable Encryption with Cloud–Edge Computing for Electronic Health Records Sharing. IEEE Internet Things J. 2023, 10, 18414–18425. [Google Scholar] [CrossRef]
- Cui, H.; Wan, Z.; Deng, R.H.; Wang, G.; Li, Y. Efficient and Expressive Keyword Search Over Encrypted Data in Cloud. IEEE Trans. Dependable Secur. Comput. 2016, 15, 409–422. [Google Scholar] [CrossRef]
- Shi, J.; Yu, Y.; Yu, Q.; Li, H.; Wang, L. Toward Data Security in 6G Networks: A Public-Key Searchable Encryption Approach. IEEE Netw. 2022, 36, 166–173. [Google Scholar] [CrossRef]
- Miao, Y.; Ma, J.; Liu, X.; Li, X.; Jiang, Q.; Zhang, J. Attribute-Based Keyword Search over Hierarchical Data in Cloud Computing. IEEE Trans. Serv. Comput. 2020, 13, 985–998. [Google Scholar] [CrossRef]
- Liu, J.; Li, Y.; Sun, R.; Pei, Q.; Zhang, N.; Dong, M.; Leung, V.C.M. EMK-ABSE: Efficient Multikeyword Attribute-Based Searchable Encryption Scheme Through Cloud-Edge Coordination. IEEE Internet Things J. 2022, 9, 18650–18662. [Google Scholar] [CrossRef]
- Wang, M.; Miao, Y.; Guo, Y.; Huang, H.; Wang, C.; Jia, X. AESM2 Attribute-Based Encrypted Search for Multi-Owner and Multi-User Distributed Systems. IEEE Trans. Parallel Distrib. Syst. 2023, 34, 92–107. [Google Scholar] [CrossRef]
- Zhang, K.; Zhang, Y.; Li, Y.; Liu, X.; Lu, L. A Blockchain-Based Anonymous Attribute-Based Searchable Encryption Scheme for Data Sharing. IEEE Internet Things J. 2024, 11, 1685–1697. [Google Scholar] [CrossRef]
- Green, M.; Hohenberger, S.; Waters, B. Outsourcing the decryption of ABE ciphertexts. In Proceedings of the 20th USENIX Conference on Security, SEC’11, Sanfrancisco, CA, USA, 8–12 August 2011; p. 34. [Google Scholar]
- Miao, Y.; Deng, R.H.; Liu, X.; Choo, K.R.; Wu, H.; Li, H. Multi-Authority Attribute-Based Keyword Search over Encrypted Cloud Data. IEEE Trans. Dependable Secur. Comput. 2021, 18, 1667–1680. [Google Scholar] [CrossRef]
- Zhang, P.; Chui, Y.; Liu, H.; Yang, Z.; Wu, D.O.; Wang, R. Efficient and Privacy-Preserving Search Over Edge–Cloud Collaborative Entity in IoT. IEEE Internet Things J. 2023, 10, 3192–3205. [Google Scholar] [CrossRef]
- Liu, X.; Yang, X.; Luo, Y.; Zhang, Q. Verifiable Multikeyword Search Encryption Scheme with Anonymous Key Generation for Medical Internet of Things. IEEE Internet Things J. 2022, 9, 22315–22326. [Google Scholar] [CrossRef]
- Bao, Y.; Qiu, W.; Cheng, X. Secure and Lightweight Fine-Grained Searchable Data Sharing for IoT-Oriented and Cloud-Assisted Smart Healthcare System. IEEE Internet Things J. 2022, 9, 2513–2526. [Google Scholar] [CrossRef]
- Wang, J.; Lin, X.; Wu, Y.; Wu, J. Blockchain-Enabled Lightweight Fine-Grained Searchable Knowledge Sharing for Intelligent IoT. IEEE Internet Things J. 2023, 10, 21566–21579. [Google Scholar] [CrossRef]
- Even, S.; Goldreich, O.; Micali, S. On-line/off-line digital signatures. J. Cryptol. 1996, 9, 35–67. [Google Scholar] [CrossRef]
- Hohenberger, S.; Waters, B. Online/Offline Attribute-Based Encryption. In Proceedings of the Public-Key Cryptography–PKC 2014: 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, 26–28 March 2014; Krawczyk, H., Ed.; Springer: Berlin/Heidelberg, Germany, 2014; pp. 293–310. [Google Scholar]
- Datta, P.; Dutta, R.; Mukhopadhyay, S. Fully Secure Online/Offline Predicate and Attribute-Based Encryption. In Proceedings of the Information Security Practice and Experience, Beijing, China, 5–8 May 2015; Lopez, J., Wu, Y., Eds.; Springer: Cham, Switzerland, 2015; pp. 331–345. [Google Scholar]
- Liu, Y.; Zhang, Y.; Ling, J.; Liu, Z. Secure and fine-grained access control on e-healthcare records in mobile cloud computing. Future Gener. Comput. Syst. 2018, 78, 1020–1026. [Google Scholar] [CrossRef]
- Cui, J.; Zhou, H.; Xu, Y.; Zhong, H. OOABKS: Online/offline attribute-based encryption for keyword search in mobile cloud. Inf. Sci. 2019, 489, 63–77. [Google Scholar] [CrossRef]
- Wang, B.; Li, M.; Wang, H. Geometric Range Search on Encrypted Spatial Data. IEEE Trans. Inf. Forensics Secur. 2016, 11, 704–719. [Google Scholar] [CrossRef]
- Xia, Z.; Wang, X.; Sun, X.; Wang, Q. A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data. IEEE Trans. Parallel Distrib. Syst. 2016, 27, 340–352. [Google Scholar] [CrossRef]
- Curtmola, R.; Garay, J.A.; Kamara, S.; Ostrovsky, R.M. Searchable symmetric encryption: Improved definitions and efficient constructions. IACR Cryptol. ePrint Arch. 2006, 2006, 210. [Google Scholar]
- Cash, D.; Jarecki, S.; Jutla, C.; Krawczyk, H.; Roşu, M.C.; Steiner, M. Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries. In Proceedings of the Advances in Cryptology–CRYPTO 2013: 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, 18–22 August 2013; Canetti, R., Garay, J.A., Eds.; Springer: Berlin/Heidelberg, Germany, 2013; pp. 353–373. [Google Scholar]
- Zhang, K.; Wen, M.; Lu, R.; Chen, K. Multi-Client Sub-Linear Boolean Keyword Searching for Encrypted Cloud Storage with Owner-Enforced Authorization. IEEE Trans. Dependable Secur. Comput. 2021, 18, 2875–2887. [Google Scholar] [CrossRef]
- Yin, H.; Qin, Z.; Zhang, J.; Deng, H.; Li, F.; Li, K. A fine-grained authorized keyword secure search scheme with efficient search permission update in cloud computing. J. Parallel Distrib. Comput. 2020, 135, 56–69. [Google Scholar] [CrossRef]
- Yin, H.; Li, Y.; Deng, H.; Zhang, W.; Qin, Z.; Li, K. Practical and Dynamic Attribute-Based Keyword Search Supporting Numeric Comparisons Over Encrypted Cloud Data. IEEE Trans. Serv. Comput. 2023, 16, 2855–2867. [Google Scholar] [CrossRef]
- Niu, S.; Hu, Y.; Su, Y.; Yan, S.; Zhou, S. Attribute-based searchable encrypted scheme with edge computing for Industrial Internet of Things. J. Syst. Archit. 2023, 139, 102889. [Google Scholar] [CrossRef]
- Golle, P.; Staddon, J.; Waters, B. Secure Conjunctive Keyword Search over Encrypted Data. In Proceedings of the Applied Cryptography and Network Security: Second International Conference, ACNS 2004, Yellow Mountain, China, 8–11 June 2004; Jakobsson, M., Yung, M., Zhou, J., Eds.; Springer: Berlin/Heidelberg, Germany, 2004; pp. 31–45. [Google Scholar]
- Park, D.J.; Kim, K.; Lee, P.J. Public Key Encryption with Conjunctive Field Keyword Search. In Proceedings of the Information Security Applications, Jeju Island, Republic of Korea, 23–25 August 2004; Lim, C.H., Yung, M., Eds.; Springer: Berlin/Heidelberg, Germany, 2005; pp. 73–86. [Google Scholar]
- Zhang, K.; Wang, X.; Ning, J.; Wen, M.; Lu, R. Multi-Client Boolean File Retrieval with Adaptable Authorization Switching for Secure Cloud Search Services. IEEE Trans. Dependable Secur. Comput. 2023, 20, 4621–4636. [Google Scholar] [CrossRef]
- Huang, Q.; Yan, G.; Wei, Q. Attribute-Based Expressive and Ranked Keyword Search Over Encrypted Documents in Cloud Computing. IEEE Trans. Serv. Comput. 2023, 16, 957–968. [Google Scholar] [CrossRef]
- Shamir, A. How to share a secret. Commun. ACM 1979, 22, 612–613. [Google Scholar] [CrossRef]
- Cheung, L.; Newport, C. Provably secure ciphertext policy ABE. In Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS ’07, Alexandria, VA, USA, 31 October–2 November 2007; pp. 456–465. [Google Scholar]
- Waters, B. Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization. IACR Cryptol. ePrint Arch. 2011, 2008, 290. [Google Scholar]
- Chen, Y. Research on Attribute-Based Encryption Scheme and Its Applications. Ph.D. Thesis, Nanjing University of Posts and Telecommunications, Nanjing, China, 2014. [Google Scholar]
- Lai, J.; Deng, R.H.; Yang, Y.; Weng, J. Adaptable Ciphertext-Policy Attribute-Based Encryption. In Proceedings of the Pairing-Based Cryptography–Pairing 2013: 6th International Conference, Beijing, China, 22–24 November 2013; Cao, Z., Zhang, F., Eds.; Springer: Cham, Switzerland, 2014; pp. 199–214. [Google Scholar]
- Xue, K.; Hong, J.; Xue, Y.; Wei, D.S.L.; Yu, N.; Hong, P. CABE: A New Comparable Attribute-Based Encryption Construction with 0-Encoding and 1-Encoding. IEEE Trans. Comput. 2017, 66, 1491–1503. [Google Scholar] [CrossRef]
- Bishop, A.; Waters, B. Unbounded HIBE and Attribute-Based Encryption. IACR Cryptol. ePrint Arch. 2011, 2011, 49. [Google Scholar]
- Lewko, A.; Waters, B. New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques. In Proceedings of the Advances in Cryptology–CRYPTO 2012, Santa Barbara, CA, USA, 19–23 August 2012; Safavi-Naini, R., Canetti, R., Eds.; Springer: Berlin/Heidelberg, Germany, 2012; pp. 180–198. [Google Scholar]
- Rouselakis, Y.; Waters, B. Practical constructions and new proof methods for large universe attribute-based encryption. In Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, CCS ’13, Berlin, Germany, 4–8 November 2013; pp. 463–474. [Google Scholar] [CrossRef]
- Tao, Z.; Lin, W.; Wang, Y.; Deng, S.; Shi, C.; Chen, L. The design of information security protection framework to support Smart Grid. In Proceedings of the 2010 International Conference on Power System Technology, Hangzhou, China, 24–28 October 2010; pp. 1–5. [Google Scholar]
- Rogers, K.M.; Klump, R.P.; Khurana, H.; Aquino-Lugo, A.A.; Overbye, T.J. An Authenticated Control Framework for Distributed Voltage Support on the Smart Grid. IEEE Trans. Smart Grid 2010, 1, 40–47. [Google Scholar] [CrossRef]
- Su, Q.; Zhang, R.; Xue, R.; Sun, Y.; Gao, S. Distributed Attribute-Based Signature with Attribute Dynamic Update for Smart Grid. IEEE Trans. Ind. Inform. 2023, 19, 9424–9435. [Google Scholar] [CrossRef]
- Ge, J.; Wen, M.; Wang, L.; Xie, R. Attribute-Based Collaborative Access Control Scheme with Constant Ciphertext Length for Smart Grid. In Proceedings of the ICC 2022–IEEE International Conference on Communications, Seoul, Republic of Korea, 16–20 May 2022; pp. 540–546. [Google Scholar]
- Li, J.; Sun, J. A Practical Searchable Symmetric Encryption Scheme for Smart Grid Data. In Proceedings of the ICC 2019–2019 IEEE International Conference on Communications (ICC), Shanghai, China, 20–24 May 2019; pp. 1–6. [Google Scholar]
- Eltayieb, N.; Elhabob, R.; Hassan, A.; Li, F. An efficient attribute-based online/offline searchable encryption and its application in cloud-based reliable smart grid. J. Syst. Archit. 2019, 98, 165–172. [Google Scholar] [CrossRef]
- Ge, X.; Yu, J.; Hao, R.; Lv, H. Verifiable Keyword Search Supporting Sensitive Information Hiding for the Cloud-Based Healthcare Sharing System. IEEE Trans. Ind. Inform. 2022, 18, 5573–5583. [Google Scholar] [CrossRef]
- Mamta; Gupta, B.B.; Li, K.C.; Leung, V.C.M.; Psannis, K.E.; Yamaguchi, S. Blockchain-Assisted Secure Fine-Grained Searchable Encryption for a Cloud-Based Healthcare Cyber-Physical System. IEEE/CAA J. Autom. Sin. 2021, 8, 1877–1890. [Google Scholar] [CrossRef]
- Wang, W.; Xu, P.; Liu, D.; Yang, L.T.; Yan, Z. Lightweighted Secure Searching Over Public-Key Ciphertexts for Edge-Cloud-Assisted Industrial IoT Devices. IEEE Trans. Ind. Inform. 2020, 16, 4221–4230. [Google Scholar] [CrossRef]
- Ali, M.G.; Sadeghi, M.R.; Liu, X.; Miao, Y.; Vasilakos, A.V. Verifiable online/offline multi-keyword search for cloud-assisted Industrial Internet of Things. J. Inf. Secur. Appl. 2022, 65, 103101. [Google Scholar] [CrossRef]
- Zhou, R.; Zhang, X.; Wang, X.; Yang, G.; Dai, H.; Liu, M. Device-Oriented Keyword-Searchable Encryption Scheme for Cloud-Assisted Industrial IoT. IEEE Internet Things J. 2022, 9, 17098–17109. [Google Scholar] [CrossRef]
- Yin, H.; Zhang, W.; Deng, H.; Qin, Z.; Li, K. An Attribute-Based Searchable Encryption Scheme for Cloud-Assisted IIoT. IEEE Internet Things J. 2023, 10, 11014–11023. [Google Scholar] [CrossRef]
Database | N of Results |
---|---|
IEEE Xplore | 245 |
Web of Science | 383 |
Elsevier ScienceDirect | 295 |
Total | 923 |
Type of Criterion | Criterion ID | Description |
---|---|---|
Inclusion | IC1 | Focuses on researching ABSE schemes and belongs to the computer science or cryptography field. |
IC2 | Written in English. | |
IC3 | Published after 2018. | |
IC4 | Has an impact factor of 5.0 or above. | |
Exclusion | EC1 | Not relevant to the research content of this paper. |
EC2 | Written in languages other than English. | |
EC3 | Has a low impact factor. | |
EC4 | Published before 2018. |
System | Publication Time | Policy Hiding | Traceability | Revocability | Security Model |
---|---|---|---|---|---|
[71] | 2020 | × | × | √ | CKA/CPA |
[58] | 2020 | × | √ | √ | CPA/CKA |
[22] | 2020 | √ | × | × | IND-CPA/CKA |
[33] | 2020 | × | × | × | KGA/CKA |
[24] | 2021 | × | √ | × | KGA |
[51] | 2021 | × | × | √ | FS/BS 2 |
[46] | 2022 | × | √ | √ | CKA/CPA |
[23] | 2022 | √ | × | × | IND-CKA |
[72] | 2022 | × | × | × | IND-CKA |
[63] | 2023 | √ | × | × | IND-CKA |
[57] | 2023 | × | × | √ | CKA |
[64] | 2023 | × | × | √ | IND-CKA/CCA |
[73] | 2023 | × | × | √ | CKA |
[60] | 2023 | × | × | √ | RCCA 1/CKA |
[74] | 2024 | √ | × | × | IND-CPA/CKA |
[57] | 2024 | × | × | √ | CKA |
Methods | Advantages | Disadvantages | Related ABSE Schemes |
---|---|---|---|
Outsourcing Computation | Leveraging the advantages of cloud computing to alleviate local computational burden | May result in partial decryption results without guaranteed correctness | [45,46,60,65,68,78,79,80] |
Online/Offline Encryption | Reducing the computational burden on the encryption side | Does not necessarily reduce the total computational workload of encryption algorithms | [60,72,76,85,93] |
Index Structure Optimization | Enhancing search efficiency through optimizing index structures | May incur significant space overhead | [88,90,92] |
Method | Year | Large Universe | Access Structure | Expression | Search Capabilities |
---|---|---|---|---|---|
[71] | 2020 | √ | Access tree | OR|AND| threshold | Multi-Keyword Search |
[58] | 2020 | √ | LSSS | OR|AND| threshold | Single-Keyword Search |
[33] | 2020 | √ | Access tree | OR|AND| threshold | Single-Keyword Search |
[24] | 2021 | × | AND gate on multi-valued attributes | AND | Single-Keyword Search |
[65] | 2021 | √ | AND gate on multi-valued attributes | AND | Multi-Keyword Search |
[90] | 2021 | × | LSSS | OR|AND| threshold | Multi-Keyword Search |
[46] | 2022 | × | LSSS | OR|AND| threshold | Multi-Keyword Search |
[23] | 2022 | √ | AND gate on multi-valued attributes | AND | Single-Keyword Search |
[61] | 2022 | √ | AND gate on multi-valued attributes | AND | Multi-Keyword Search |
[72] | 2022 | √ | LSSS | OR|AND| threshold | Multi-Keyword Search |
[63] | 2023 | × | IPE | AND | Multi-Keyword Search |
[62] | 2023 | √ | LSSS | OR|AND| threshold | Single-Keyword Search |
[63] | 2023 | √ | IPE | AND | Multi-Keyword Search |
[68] | 2023 | √ | LSSS | OR|AND| threshold | Single-Keyword Search |
[74] | 2024 | √ | AND gate on multi-valued attributes | AND | Single-Keyword Search |
[57] | 2024 | √ | Access tree | OR|AND| threshold | Single-Keyword Search |
Domain | Application Area | Data Sources | Data Sensitivity | Data Scale | Latency Requirements | Systems |
---|---|---|---|---|---|---|
Smart Grid | Power Management | Power Sensors, Smart Meters, Monitoring Systems | Critical | Large Scale | High | [112] |
Healthcare | Medical Information | Electronic Health Records, Medical Devices, Sensors | Critical | Large Scale | High | [45,57,59,68,78,79,113,114] |
IoT | Device Management | Sensors, Device Monitoring Systems | Elevated | Large Scale | High | [65,93,115,116,117,118] |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Yan, L.; Wang, G.; Yin, T.; Liu, P.; Feng, H.; Zhang, W.; Hu, H.; Pan, F. Attribute-Based Searchable Encryption: A Survey. Electronics 2024, 13, 1621. https://doi.org/10.3390/electronics13091621
Yan L, Wang G, Yin T, Liu P, Feng H, Zhang W, Hu H, Pan F. Attribute-Based Searchable Encryption: A Survey. Electronics. 2024; 13(9):1621. https://doi.org/10.3390/electronics13091621
Chicago/Turabian StyleYan, Li, Gaozhou Wang, Tian Yin, Peishun Liu, Hongxin Feng, Wenbin Zhang, Hailin Hu, and Fading Pan. 2024. "Attribute-Based Searchable Encryption: A Survey" Electronics 13, no. 9: 1621. https://doi.org/10.3390/electronics13091621
APA StyleYan, L., Wang, G., Yin, T., Liu, P., Feng, H., Zhang, W., Hu, H., & Pan, F. (2024). Attribute-Based Searchable Encryption: A Survey. Electronics, 13(9), 1621. https://doi.org/10.3390/electronics13091621