[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ Skip to main content
Log in

An efficient and secure searchable public key encryption scheme with privacy protection for cloud storage

  • Focus
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

In the area of searchable encryption, the searchable public key encryption (SPE) is an attractive technique in secure cloud storage. SPE assures the data confidentiality without affecting the usage of the data stored in the cloud. Furthermore, compared with the symmetric searchable encryption, SPE does not require key distribution and management. We investigate the security of the searchable public key encryption based on the traditional Boneh’s framework. Although existing SPE schemes can enable users to search over encrypted data, most of these schemes are vulnerable to the file-injection attack and the insider keyword guessing attack. To mitigate these attacks, we propose an efficient and secure searchable public key encryption with privacy protection (SPE-PP). We then provide a concrete construction of SPE-PP that uses the Diffie–Hellman shared secret key, and we prove it can resist these attacks. Both the theoretical analysis and the experimental results show that our scheme achieves strong security along with high efficiency.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (United Kingdom)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

References

  • Abdalla M, Bellare M, Catalano D, Kiltz E, Kohno T, Lange T, Malone-Lee J, Neven G, Paillier P, Shi H (2005) Searchable encryption revisited: consistency properties, relation to anonymous ibe, and extensions. Crypto, Springer 3621:205–222

    MathSciNet  MATH  Google Scholar 

  • AlZain MA, Li AS, Soh B, Pardede E (2015) Multi-cloud data management using shamir’s secret sharing and quantum byzantine agreement schemes. Int J Cloud Appl Comput (IJCAC) 5(3):35–52

    Google Scholar 

  • Arriaga A, Tang Q, Ryan P (2014) Trapdoor privacy in asymmetric searchable encryption schemes. In: International conference on cryptology in Africa, Springer, pp 31–50

  • Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. Eurocrypt, Springer 3027:506–522

    MathSciNet  MATH  Google Scholar 

  • Bost R (2016) o\(\varphi \)o\(\varsigma \): forward secure searchable encryption. In: Proceedings of the 2016 ACM SIGSAC conference on computer and communications security. ACM, pp 1143–1154

  • Byun J, Rhee H, Park HA, Lee D (2006) Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. In: Secure data management, pp 75–83

    Google Scholar 

  • Chen R, Mu Y, Yang G, Guo F, Wang X (2016) Dual-server public-key encryption with keyword search for secure cloud storage. IEEE Trans Inf Forensics Secur 11(4):789–798

    Google Scholar 

  • Chen R, Mu Y, Yang G, Guo F, Wang X (2015) A new general framework for secure public key encryption with keyword search. In: Australasian conference on information security and privacy, Springer, pp 59–76

  • Diffie W, Hellman M (1976) New directions in cryptography. IEEE Trans Inf Theory 22(6):644–654

    Article  MathSciNet  Google Scholar 

  • Gupta B, Badve OP (2017) Taxonomy of dos and ddos attacks and desirable defense mechanism in a cloud computing environment. Neural Comput Appl 28(12):3655–3682

    Article  Google Scholar 

  • Gupta B, Agrawal DP, Yamaguchi S (2016) Handbook of research on modern cryptographic solutions for computer and cyber security. In: IGI Global

  • Hossain MS, Muhammad G, Abdul W, Song B, Gupta B (2017) Cloud-assisted secure video transmission and sharing framework for smart cities. Future Gener Comput Syst 83:569–606

    Google Scholar 

  • Huang Q, Li H (2017) An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks. Inf Sci 403:1–14

    Article  Google Scholar 

  • Ibtihal M, Hassan N et al (2017) Homomorphic encryption as a service for outsourced images in mobile cloud computing environment. Int J Cloud Appl Comput (IJCAC) 7(2):27–40

    Google Scholar 

  • Jeong IR, Kwon JO, Hong D, Lee DH (2009) Constructing peks schemes secure against keyword guessing attacks is possible? Comput Commun 32(2):394–396

    Article  Google Scholar 

  • Li J, Chen X, Li M, Li J, Lee PP, Lou W (2014a) Secure deduplication with efficient and reliable convergent key management. IEEE Trans Parallel Distrib Syst 25(6):1615–1625

    Article  Google Scholar 

  • Li J, Huang X, Li J, Chen X, Xiang Y (2014b) Securely outsourcing attribute-based encryption with checkability. IEEE Trans Parallel Distrib Syst 25(8):2201–2210

    Article  Google Scholar 

  • Li H, Liu D, Dai Y, Luan TH, Shen XS (2015a) Enabling efficient multi-keyword ranked search over encrypted mobile cloud data through blind storage. IEEE Trans Emerg Top Comput 3(1):127–138

    Article  Google Scholar 

  • Li J, Chen X, Xhafa F, Barolli L (2015b) Secure deduplication storage systems supporting keyword search. J Comput Syst Sci 81(8):1532–1541

    Article  MathSciNet  Google Scholar 

  • Li J, Li J, Chen X, Jia C, Lou W (2015c) Identity-based encryption with outsourced revocation in cloud computing. IEEE Trans Comput 64(2):425–437

    Article  MathSciNet  Google Scholar 

  • Li J, Liu Z, Chen X, Xhafa F, Tan X, Wong DS (2015d) L-encdb: a lightweight framework for privacy-preserving data queries in cloud computing. Knowl Based Syst 79:18–26

    Article  Google Scholar 

  • Li H, Liu D, Dai Y, Luan T, Yu S (2015e) Personalized search over encrypted data with efficient and secure update in mobile clouds. IEEE Trans Emerg Topics Comput 6(1):97–109

    Article  Google Scholar 

  • Li T, Gupta BB, Metere R (2017a) Socially-conforming cooperative computation in cloud networks. J Parallel Distrib Comput 117:274–280

    Article  Google Scholar 

  • Li J, Lin X, Zhang Y, Han J (2017b) Ksf-oabe: outsourced attribute-based encryption with keyword search function for cloud storage. IEEE Trans Serv Comput 10(5):715–725

    Article  Google Scholar 

  • Li H, Yang Y, Dai Y, Bai J, Yu S, Xiang Y (2017c) Achieving secure and efficient dynamic searchable symmetric encryption over medical cloud data. IEEE Trans Cloud Comput. https://doi.org/10.1109/TCC.2017.2769645

    Article  Google Scholar 

  • Li J, Zhang Y, Chen X, Xiang Y (2018) Secure attribute-based data sharing for resource-limited users in cloud computing. Computers & Security 72(1–1):2

    Google Scholar 

  • Liu Z, Weng J, Li J, Yang J, Fu C, Jia C (2016) Cloud-based electronic health record system supporting fuzzy keyword search. Soft Comput 20(8):3243–3255

    Article  Google Scholar 

  • Liu Z, Huang Y, Li J, Cheng X, Shen C (2018) Divoram: towards a practical oblivious ram with variable block size. Inf Sci. Doi: 10.1016/j.ins.2018.02.071

    Article  Google Scholar 

  • Ma M, He D, Kumar N, Choo KKR, Chen J (2017) Certificateless searchable public key encryption scheme for industrial internet of things. IEEE Trans Ind Inf 14(2):759–767

    Article  Google Scholar 

  • Miao Y, Ma J, Liu X, Li X, Jiang Q, Zhang J (2017) Attribute based keyword search over hierarchical data in cloud computing. IEEE Trans serv Comput. https://doi.org/10.1109/TSC.2017.2757467

    Article  Google Scholar 

  • Nishioka M (2012) Perfect keyword privacy in peks systems. ProvSec 12:175–192

    MathSciNet  MATH  Google Scholar 

  • Rhee HS, Park JH, Susilo W, Lee DH (2010) Trapdoor security in a searchable public-key encryption scheme with a designated tester. J Syst Softw 83(5):763–771

    Article  Google Scholar 

  • Shao ZY, Yang B (2015) On security against the server in designated tester public key encryption with keyword search. Inf Process Lett 115(12):957–961

    Article  MathSciNet  Google Scholar 

  • Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: Proceedings 2000 IEEE symposium on security and privacy, 2000. S&P 2000. IEEE, pp 44–55

  • Sun W, Yu S, Lou W, Hou YT, Li H (2016) Protecting your right: verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. IEEE Trans Parallel Distrib Syst 27(4):1187–1198

    Article  Google Scholar 

  • Tomida K, Doi H, Mohri M, Shiraishi Y (2015) Ciphertext divided anonymous hibe and its transformation to identity-based encryption with keyword search. J Inf Process 23(5):562–569

    Google Scholar 

  • Wang Ch, Ty Tu (2014) Keyword search encryption scheme resistant against keyword-guessing attack by the untrusted server. J Shanghai Jiaotong Univ (Sci) 19(4):440–442

    Article  Google Scholar 

  • Wang XF, Mu Y, Chen R, Zhang XS (2016) Secure channel free id-based searchable encryption for peer-to-peer group. J Comput Sci Technol 31(5):1012–1027

    Article  MathSciNet  Google Scholar 

  • Xhafa F, Wang J, Chen X, Liu JK, Li J, Krause P (2014) An efficient phr service system supporting fuzzy keyword search and fine-grained access control. Soft Comput 18(9):1795–1802

    Article  Google Scholar 

  • Xu P, Jin H, Wu Q, Wang W (2013) Public-key encryption with fuzzy keyword search: a provably secure scheme under keyword guessing attack. IEEE Trans Comput 62(11):2266–2277

    Article  MathSciNet  Google Scholar 

  • Yau WC, Heng SH, Goi BM (2008) Off-line keyword guessing attacks on recent public key encryption with keyword search schemes. In: Autonomic and trusted computing, pp 100–105

  • Ye J, Wang J, Zhao J, Shen J, Li KC (2017) Fine-grained searchable encryption in multi-user setting. Soft Comput 21(20):6201–6212

    Article  Google Scholar 

  • Zhang Y, Chen X, Li J, Wong DS, Li H, You I (2017) Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing. Inf Sci 379:42–61

    Article  Google Scholar 

  • Zhang Y, Katz J, Papamanthou C (2016) All your queries are belong to us: the power of file-injection attacks on searchable encryption. In: IACR cryptology ePrint archive 2016, pp 172

  • Zhang R, Xue R, Yu T, Liu L (2016a) Pvsae: a public verifiable searchable encryption service framework for outsourced encrypted data. In: 2016 IEEE international conference on web services (ICWS). IEEE, pp 428–435

Download references

Acknowledgements

We thank the anonymous reviewers for their valuable comments which helped us to improve the content and presentation of this paper. The work was supported in part by the National Natural Science Foundation of China under Grants 61472287, 61772377, 61501333 and 61572379, in part by the National Key Research and Development Program of China under Grant 2017YFB0802504 and in part by the Natural Science Foundation of Hubei Province of China under Grants 2015CFA068 and 2017CFA007.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Debiao He.

Ethics declarations

Conflict of Interest

The authors declare that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Informed consent

N/A.

Additional information

Communicated by B. B. Gupta.

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wu, L., Chen, B., Zeadally, S. et al. An efficient and secure searchable public key encryption scheme with privacy protection for cloud storage. Soft Comput 22, 7685–7696 (2018). https://doi.org/10.1007/s00500-018-3224-8

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-018-3224-8

Keywords

Navigation