Abstract
Increasing the popularity of cloud computing raises the importance of efforts to improve the services of this paradigm. Searching over encrypted data is a requirement for cloud storage to provide, in addition to privacy-preserving, convenient and low-cost access to some of the outsourced data. Security and functionality along with efficiency are important characteristics of searchable encryption schemes that improve them make this schemes more applicable to the real world. There are proposed structures for symmetric searchable encryption (SSE) in this paper, by adding functionalities to randomized SSE schemes, to provide a optimal scheme. We design a rFSMSE scheme that allows searching by multiple keywords. This scheme is fully secure and its search time complexity is logarithmic. Then we upgrad this scheme to the verifiable rFSMSE scheme called rFSVMSE, without increasing the complexity of search time, storage, and communication. We demonstrate that the proposed schemes are upgradable to dynamic ones. Simulations show the time taken to search for multi-keywords in the rFSMSE and rFSVMSE schemes is less than that in the previous randomized SSE.
Similar content being viewed by others
References
Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. In: International conference on the theory and applications of cryptographic techniques. Springer, pp 506–522
Bost R, Fouque PA, Pointcheval D (2016) Verifiable dynamic symmetric searchable encryption: Optimality and forward security. IACR Cryptology ePrint Archive 2016:62
Byun JW, Rhee HS, Park HA, Lee DH (2006) Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. In: Workshop on secure data management. Springer, pp 75–83
Cao N, Wang C, Li M, Ren K, Lou W (2013) Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans Parallel Distrib Syst 25(1):222–233
Cash D, Jaeger J, Jarecki S, Jutla CS, Krawczyk H, Rosu MC, Steiner M (2014) Dynamic searchable encryption in very-large databases: Data structures and implementation. In: NDSS, vol 14. Citeseer, pp 23–26
Cash D, Jarecki S, Jutla C, Krawczyk H, Roşu MC, Steiner M (2013) Highly-scalable searchable symmetric encryption with support for boolean queries. In: Advances in cryptology–CRYPTO 2013. Springer, pp 353–373
Chai Q, Gong G (2012) Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers. In: 2012 IEEE International conference on communications (ICC). IEEE, pp 917–922
Chang YC, Mitzenmacher M (2005) Privacy preserving keyword searches on remote encrypted data. In: International conference on applied cryptography and network security. Springer, pp 442–455
Chen R, Mu Y, Yang G, Guo F, Huang X, Wang X, Wang Y (2016) Server-aided public key encryption with keyword search. IEEE Trans Inform Forens Secur 11(12):2833–2842
Coppersmith D (1994) The data encryption standard (des) and its strength against attacks. IBM J Res Develop 38(3):243–250
Curtmola R, Garay J, Kamara S, Ostrovsky R (2011) Searchable symmetric encryption: Improved definitions and efficient constructions. J Comput Secur 19(5):895–934
Fu Z, Ren K, Shu J, Sun X, Huang F (2015) Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans Parallel Distrib Syst 27(9):2546–2559
Fu Z, Wu X, Wang Q, Ren K (2017) Enabling central keyword-based semantic extension search over encrypted outsourced data. IEEE Trans Inform Forensics Secur 12(12):2986–2997
Goh EJ, et al. (2003) Secure indexes. IACR Cryptology ePrint Archive 2003:216
Golle P, Staddon J, Waters B (2004) Secure conjunctive keyword search over encrypted data. In: International conference on applied cryptography and network security. Springer, pp 31–45
Ishai Y, Kushilevitz E, Lu S, Ostrovsky R (2016) Private large-scale databases with distributed searchable symmetric encryption. In: Cryptographers’ track at the RSA conference. Springer, pp 90–107
Jiang X, Yu J, Yan J, Hao R (2017) Enabling efficient and verifiable multi-keyword ranked search over encrypted cloud data. Inf Sci 403:22–41
Kamara S, Papamanthou C, Roeder T (2012) Dynamic searchable symmetric encryption. In: Proceedings of the 2012 ACM conference on Computer and communications security. ACM, pp 965–976
Kurosawa K, Ohtaki Y (2012) Uc-secure searchable symmetric encryption. In: International conference on financial cryptography and data security. Springer, pp 285–298
Li H, Yang Y, Luan TH, Liang X, Zhou L, Shen XS (2016) Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data. IEEE Trans Depend Secure Comput 13(3):312–325
Li Y, Zhou F, Xu Z, Ge Y (2020) An efficient two-server ranked dynamic searchable encryption scheme. IEEE Access 8:86328–86344
Liao X, Li K, Yin J (2017) Separable data hiding in encrypted image based on compressive sensing and discrete fourier transform. Multimed Tools Appl 76(20):20739–20753
Liao X, Yu Y, Li B, Li Z, Qin Z (2019) A new payload partition strategy in color image steganography. IEEE Trans Circ Syst Video Technol 30 (3):685–696
Liu Q, Tian Y, Wu J, Peng T, Wang G (2019) Enabling verifiable and dynamic ranked search over outsourced data. IEEE Trans Serv Comput
Lu CC, Tseng SY (2002) Integrated design of aes (advanced encryption standard) encrypter and decrypter. In: Proceedings IEEE International Conference on Application-Specific Systems, Architectures, and Processors. IEEE, pp 277–285
Najafi A, Javadi HHS, Bayat M (2019) Verifiable ranked search over encrypted data with forward and backward privacy. Future Generation Computer Systems
Ramasamy R, Vivek SS, George P, Kshatriya BSR (2017) Dynamic verifiable encrypted keyword search using bitmap index and homomorphic mac. In: 2017 IEEE 4Th international conference on cyber security and cloud computing (CSCloud). IEEE, pp 357–362
Rizomiliotis P, Gritzalis S (2015) Oram based forward privacy preserving dynamic searchable symmetric encryption schemes. In: Proceedings of the 2015 ACM workshop on cloud computing security workshop. ACM, pp 65–76
Shen E, Shi E, Waters B (2009) Predicate privacy in encryption systems. In: Theory of cryptography conference. Springer, pp 457–473
Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE symposium on security and privacy. S&P 2000. IEEE, pp 44–55
Stefanov E, Papamanthou C, Shi E (2014) Practical dynamic searchable encryption with small leakage. In: NDSS, vol 71, pp 72–75
Sun W, Liu X, Lou W, Hou YT, Li H (2015) Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data. In: Computer communications (INFOCOM), 2015 IEEE conference on. IEEE, pp 2110–2118
Sun W, Wang B, Cao N, Li M, Lou W, Hou YT, Li H (2013) Verifiable privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. IEEE Trans Parallel Distrib Syst 25(11):3025–3035
Vivek SS, Ramasamy R, George P, Kshatriya BSR (2018) Dynamic verifiable encrypted keyword search. J Signal Process Syst 90(8-9):1151–1165
Wang P, Wang H, Pieprzyk J (2008) Keyword field-free conjunctive keyword searches on encrypted data and extension for dynamic groups. In: International conference on cryptology and network security. Springer, pp 178–195
Wang S, Zhou J, Liu JK, Yu J, Chen J, Xie W (2016) An efficient file hierarchy attribute-based encryption scheme in cloud computing. IEEE Trans Inform Forens Secur 11(6):1265–1277
Wong WK, Cheung DWL, Kao B, Mamoulis N (2009) Secure knn computation on encrypted databases. In: Proceedings of the 2009 ACM SIGMOD international conference on management of data. ACM, pp 139–152
Xia Z, Wang X, Sun X, Wang Q (2015) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distribut Syst 27(2):340–352
Xu P, Jin H, Wu Q, Wang W (2012) Public-key encryption with fuzzy keyword search: A provably secure scheme under keyword guessing attack. IEEE Trans Comput 62(11):2266–2277
Yoshino M, Kunihiro N, Naganuma K, Sato H (2012) Symmetric inner-product predicate encryption based on three groups. In: International conference on provable security. Springer, pp 215–234
Zhang R, Xue R, Yu T, Liu L (2016) Dynamic and efficient private keyword search over inverted index–based encrypted data. ACM Trans Int Technol (TOIT) 16(3):21
Acknowledgements
The authors thank the editors and the anonymous reviewers for their valuable comments.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Najafi, A., Javadi, H.H.S. & Bayat, M. Efficient and dynamic verifiable multi-keyword searchable symmetric encryption with full security. Multimed Tools Appl 80, 26049–26068 (2021). https://doi.org/10.1007/s11042-021-10844-w
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-021-10844-w