VABS: Towards verifiable attribute-based search over shared cloud data

Yang Ji, Cheng Xu, Jianliang XU, Haibo HU

Research output: Chapter in book/report/conference proceedingConference contributionpeer-review

Abstract

With the proliferation of cloud computing and data-as-a-service (DaaS), more and more organizations and individuals outsource their data to a third-party service provider. While enjoying the benefits of cloud-based data outsourcing, the data owners are at the risk of losing control of data integrity and access management. In this demonstration, we present a system called vABS, which enables verifiable Attribute-Based Search over shared cloud data. The vABS system adopts the common DaaS architecture, in which the server provides search services to users on behalf of data owners. By employing a novel zero-knowledge approach proposed in our prior work [1], vABS not only provides users with good search experiences, but also supports authenticated query processing with fine-grained access control, which is crucial to many high-security applications.

Original languageEnglish
Title of host publicationProceedings - 2019 IEEE 35th International Conference on Data Engineering, ICDE 2019
PublisherIEEE Computer Society
Pages2028-2031
Number of pages4
ISBN (Electronic)9781538674741
DOIs
Publication statusPublished - Apr 2019
Event35th IEEE International Conference on Data Engineering, ICDE 2019 - Macau, China
Duration: 8 Apr 201911 Apr 2019

Publication series

NameProceedings - International Conference on Data Engineering
Volume2019-April
ISSN (Print)1084-4627

Conference

Conference35th IEEE International Conference on Data Engineering, ICDE 2019
Country/TerritoryChina
CityMacau
Period8/04/1911/04/19

Scopus Subject Areas

  • Software
  • Signal Processing
  • Information Systems

User-Defined Keywords

  • Access control
  • Data integrity
  • Verifiable search
  • Zero knowledge

Fingerprint

Dive into the research topics of 'VABS: Towards verifiable attribute-based search over shared cloud data'. Together they form a unique fingerprint.

Cite this