[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Verifiable searchable symmetric encryption for conjunctive keyword queries in cloud storage

Published: 01 December 2022 Publication History

Abstract

Searchable symmetric encryption (SSE) has been introduced for secure outsourcing the encrypted database to cloud storage, while maintaining searchable features. Of various SSE schemes, most of them assume the server is honest but curious, while the server may be trustless in the real world. Considering a malicious server not honestly performing the queries, verifiable SSE (VSSE) schemes are constructed to ensure the verifiability of the search results. However, existing VSSE constructions only focus on single-keyword search or incur heavy computational cost during verification. To address this challenge, we present an efficient VSSE scheme, built on OXT protocol (Cash et al., CRYPTO 2013), for conjunctive keyword queries with sublinear search overhead. The proposed VSSE scheme is based on a privacy-preserving hash-based accumulator, by leveraging a well-established cryptographic primitive, Symmetric Hidden Vector Encryption (SHVE). Our VSSE scheme enables both correctness and completeness verifiability for the result without pairing operations, thus greatly reducing the computational cost in the verification process. Besides, the proposed VSSE scheme can still provide a proof when the search result is empty. Finally, the security analysis and experimental evaluation are given to demonstrate the security and practicality of the proposed scheme.

References

[1]
Sun P Security and privacy protection in cloud computing: discussions and challenges Journal of Network and Computer Applications 2020 160 102642
[2]
Liu J K, Liang K, Susilo W, Liu J, and Xiang Y Two-factor data security protection mechanism for cloud storage system IEEE Transactions on Computers 2016 65 6 1992-2004
[3]
Bost R. Σoφoς: forward secure searchable encryption. In: Proceedings of 2016 ACM SIGSAC Conference on Computer and Communications Security. 2016, 1143–1154
[4]
Cash D, Jaeger J, Jarecki S, Jutla C, Krawczyk H, Ros M C, Steiner M. Dynamic searchable encryption in very-large databases: data structures and implementation. In: Proceedings of the 21st Annual Network and Distributed System Security Symposium. 2014, 23–26
[5]
Curtmola R, Garay J, Kamara S, and Ostrovsky R Searchable symmetric encryption: improved definitions and efficient constructions Journal of Computer Security 2011 19 5 895-934
[6]
Lai S, Patranabis S, Sakzad A, Liu J K, Mukhopadhyay D, Steinfeld R, Sun S F, Liu D, Zuo C. Result pattern hiding searchable encryption for conjunctive queries. In: Proceedings of 2018 ACM SIGSAC Conference on Computer and Communications Security. 2018, 745–762
[7]
Zuo C, Sun S F, Liu J K, Shao J, Pieprzyk J. Dynamic searchable symmetric encryption schemes supporting range queries with forward/backward privacy. 2019, arXiv preprint arXiv: 1905.08561
[8]
Cash D, Jarecki S, Jutla C, Krawczyk H, Roşu M C, Steiner M. Highly-scalable searchable symmetric encryption with support for Boolean queries. In: Proceedings of the 33rd Annual Cryptology Conference. 2013, 353–373
[9]
Sun S F, Liu J K, Sakzad A, Steinfeld R, Yuen T H. An efficient non-interactive multi-client searchable encryption with support for Boolean queries. In: Proceedings of the 21st European Symposium on Research in Computer Security. 2016, 154–172
[10]
Kermanshahi S K, Liu J K, Steinfeld R, Nepal S, Lai S, Loh R, and Zuo C Multi-client cloud-based symmetric searchable encryption IEEE Transactions on Dependable and Secure Computing 2021 18 5 2419-2437
[11]
Zuo C, Macindoe J, Yang S, Steinfeld R, Liu J K. Trusted Boolean search on cloud using searchable symmetric encryption. In: Proceedings of 2016 IEEE Trustcom/BigDataSE/ISPA. 2016, 113–120
[12]
Faber S, Jarecki S, Krawczyk H, Nguyen Q, Rosu M, Steiner M. Rich queries on encrypted data: beyond exact matches. In: Proceedings of the 20th European Symposium on Research in Computer Security. 2015, 123–145
[13]
Bost R, Fouque P A, and Pointcheval D Verifiable dynamic symmetric searchable encryption: optimality and forward security IACR Cryptology ePrint Archive 2016 2016 62
[14]
Cheng R, Yan J, Guan C, Zhang F, Ren K. Verifiable searchable symmetric encryption from indistinguishability obfuscation. In: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security. 2015, 621–626
[15]
Kurosawa K, Ohtaki Y. How to update documents verifiably in searchable symmetric encryption. In: Proceedings of the 12th International Conference on Cryptology and Network Security. 2013, 309–328
[16]
Ogata W and Kurosawa K No-dictionary searchable symmetric encryption IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences 2019 102 1 114-124
[17]
Soleimanian A and Khazaei S Publicly verifiable searchable symmetric encryption based on efficient cryptographic components Designs, Codes and Cryptography 2019 87 1 123-147
[18]
Zhu J, Li Q, Wang C, Yuan X, Wang Q, and Ren K Enabling generic, verifiable, and secure data search in cloud services IEEE Transactions on Parallel and Distributed Systems 2018 29 8 1721-1735
[19]
Wang J, Chen X, Sun S F, Liu J K, Au M H, Zhan Z H. Towards efficient verifiable conjunctive keyword search for large encrypted database. In: Proceedings of the 23rd European Symposium on Research in Computer Security. 2018, 83–100
[20]
Song D X, Wagner D, Perrig A. Practical techniques for searches on encrypted data. In: Proceedings of 2000 IEEE Symposium on Security and Privacy. 2000, 44–55
[21]
Goh E J Secure indexes IACR Cryptology ePrint Archive 2003 2003 216
[22]
Liu C, Zhu L, and Chen J Efficient searchable symmetric encryption for storing multiple source dynamic social data on cloud Journal of Network and Computer Applications 2017 86 3-14
[23]
Gan Q, Wang X, Huang D, Li J, Zhou D, Wang C. Towards multi-client forward private searchable symmetric encryption in cloud computing. IEEE Transactions on Services Computing, 2021.
[24]
Miao Y, Liu X, Deng R H, Wu H, Li H, Li J, and Wu D Hybrid keyword-field search with efficient key management for industrial internet of things IEEE Transactions on Industrial Informatics 2019 15 6 3206-3217
[25]
Miao Y, Tong Q, Choo K K R, Liu X, Deng R H, and Li H Secure online/offline data sharing framework for cloud-assisted industrial internet of things IEEE Internet of Things Journal 2019 6 5 8681-8691
[26]
Kurosawa K, Ohtaki Y. UC-secure searchable symmetric encryption. In: Proceedings of the 16th International Conference on Financial Cryptography and Data Security. 2012, 285–298
[27]
Chai Q, Gong G. Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers. In: Proceedings of 2012 IEEE International Conference on Communications (ICC). 2012, 917–922
[28]
Taketani S, Ogata W. Improvement of UC secure searchable symmetric encryption scheme. In: Proceedings of the 10th International Workshop on Advances in Information and Computer Security. 2015, 135–152
[29]
Zhang Z, Wang J, Wang Y, Su Y, Chen X. Towards efficient verifiable forward secure searchable symmetric encryption. In: Proceedings of the 24th European Symposium on Research in Computer Security. 2019, 304–321
[30]
Yoneyama K, Kimura S. Verifiable and forward secure dynamic searchable symmetric encryption with storage efficiency. In: Proceedings of the 19th International Conference on Information and Communications Security. 2017, 489–501
[31]
Ge X, Yu J, Zhang H, Hu C, Li Z, Qin Z, and Hao R Towards achieving keyword search over dynamic encrypted cloud data with symmetric-key based verification IEEE Transactions on Dependable and Secure Computing 2021 18 1 490-504
[32]
Miao M, Wang Y, Wang J, and Huang X Verifiable database supporting keyword searches with forward security Computer Standards & Interfaces 2020 77 103491
[33]
Miao M, Wang J, Wen S, and Ma J Publicly verifiable database scheme with efficient keyword search Information Sciences 2019 475 18-28
[34]
Miao Y, Liu X, Choo K K R, Deng R H, Wu H, and Li H Fair and dynamic data sharing framework in cloud-assisted internet of everything IEEE Internet of Things Journal 2019 6 4 7201-7212
[35]
Shao J, Lu R, Guan Y, Wei G. Achieve efficient and verifiable conjunctive and fuzzy queries over encrypted data in cloud. IEEE Transactions on Services Computing, 2019.
[36]
Liu X, Yang G, Mu Y, and Deng R H Multi-user verifiable searchable symmetric encryption for cloud storage IEEE Transactions on Dependable and Secure Computing 2020 17 6 1322-1332
[37]
Sharma D and Jinwala D Simple index based symmetric searchable encryption with result verifiability Frontiers of Computer Science 2021 15 2 152805
[38]
Azraoui M, Elkhiyaoui K, Önen M, Molva R. Publicly verifiable conjunctive keyword search in outsourced databases. In: Proceedings of 2015 IEEE Conference on Communications and Network Security (CNS). 2015, 619–627
[39]
Jiang S, Zhu X, Guo L, and Liu J Publicly verifiable Boolean query over outsourced encrypted data IEEE Transactions on Cloud Computing 2019 7 3 799-813
[40]
Sun W, Liu X, Lou W, Hou Y T, Li H. Catch you if you lie to me: efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data. In: Proceedings of 2015 IEEE Conference on Computer Communications (INFOCOM). 2015, 2110–2118
[41]
Benaloh J, de Mare M. One-way accumulators: a decentralized alternative to digital signatures. In: Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques on Advances in Cryptology. 1993, 274–285
[42]
Camacho P, Hevia A, Kiwi M, and Opazo R Strong accumulators from collision-resistant hashing International Journal of Information Security 2012 11 5 349-363
[43]
Broder A and Mitzenmacher M Network applications of bloom filters: a survey Internet Mathematics 2004 1 4 485-509

Cited By

View all
  • (2024)Post-Quantum Searchable Encryption Supporting User-Authorization for Outsourced Data ManagementProceedings of the 33rd ACM International Conference on Information and Knowledge Management10.1145/3627673.3679522(2702-2711)Online publication date: 21-Oct-2024
  • (2023)HCVSecurity and Communication Networks10.1155/2023/83513532023Online publication date: 1-Jan-2023
  • (2023)A dynamic conjunctive keywords searchable symmetric encryption scheme for multiple users in cloud computingComputer Communications10.1016/j.comcom.2023.07.008209:C(239-248)Online publication date: 1-Sep-2023

Index Terms

  1. Verifiable searchable symmetric encryption for conjunctive keyword queries in cloud storage
            Index terms have been assigned to the content through auto-classification.

            Recommendations

            Comments

            Please enable JavaScript to view thecomments powered by Disqus.

            Information & Contributors

            Information

            Published In

            cover image Frontiers of Computer Science: Selected Publications from Chinese Universities
            Frontiers of Computer Science: Selected Publications from Chinese Universities  Volume 16, Issue 6
            Dec 2022
            189 pages
            ISSN:2095-2228
            EISSN:2095-2236
            Issue’s Table of Contents

            Publisher

            Springer-Verlag

            Berlin, Heidelberg

            Publication History

            Published: 01 December 2022
            Accepted: 20 July 2021
            Received: 18 December 2020

            Author Tags

            1. searchable symmetric encryption
            2. verifiability
            3. conjunctive keyword queries
            4. hash-based accumulator
            5. cloud storage

            Qualifiers

            • Research-article

            Contributors

            Other Metrics

            Bibliometrics & Citations

            Bibliometrics

            Article Metrics

            • Downloads (Last 12 months)0
            • Downloads (Last 6 weeks)0
            Reflects downloads up to 09 Jan 2025

            Other Metrics

            Citations

            Cited By

            View all
            • (2024)Post-Quantum Searchable Encryption Supporting User-Authorization for Outsourced Data ManagementProceedings of the 33rd ACM International Conference on Information and Knowledge Management10.1145/3627673.3679522(2702-2711)Online publication date: 21-Oct-2024
            • (2023)HCVSecurity and Communication Networks10.1155/2023/83513532023Online publication date: 1-Jan-2023
            • (2023)A dynamic conjunctive keywords searchable symmetric encryption scheme for multiple users in cloud computingComputer Communications10.1016/j.comcom.2023.07.008209:C(239-248)Online publication date: 1-Sep-2023

            View Options

            View options

            Media

            Figures

            Other

            Tables

            Share

            Share

            Share this Publication link

            Share on social media