Skip to main content
Top
Published in: Peer-to-Peer Networking and Applications 6/2021

01-07-2021

A blockchain-based dynamic searchable symmetric encryption scheme under multiple clouds

Authors: Chang Xu, Lan Yu, Liehuang Zhu, Can Zhang

Published in: Peer-to-Peer Networking and Applications | Issue 6/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In data outsourcing services, to ensure data security and user privacy, data is usually stored in cloud servers in ciphertext form. This method makes users face the problem of how to search the keywords in the ciphertexts. Although the Dynamic Searchable Symmetric Encryption (DSSE) schemes can solve this problem, most DSSE schemes assume that all the data is stored in a single cloud server. The assumption is not realistic since data may be stored in multiple servers. Furthermore, the cloud servers are usually considered “honest-but-curious”, though malicious servers can actively attack and return incomplete or incorrect results. In this paper, we propose a Blockchain-based DSSE under the Multiple Clouds (BDSSE-MC) scheme. The scheme enables the data owner to generate encrypted local file indexes and merges the local indexes into a global index through a smart contract. The search operation is also performed by the smart contract based on the global index. In this scheme, the attacker cannot obtain the original files and search results, only knows the number of clouds and the number of files. We provide security and privacy analysis. We also compare the experiments results with those of traditional solutions.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Chamani JG, Papadopoulos D, Papamanthou C, Rasool J (2018) New constructions for forward and backward private symmetric searchable encryption. In: Lie D, Mannan M, Backes M, Wang XF (eds) Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS Toronto, ON, Canada, October 15-19, 2018. ACM, p 2018 Chamani JG, Papadopoulos D, Papamanthou C, Rasool J (2018) New constructions for forward and backward private symmetric searchable encryption. In: Lie D, Mannan M, Backes M, Wang XF (eds) Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS Toronto, ON, Canada, October 15-19, 2018. ACM, p 2018
2.
go back to reference He K, Chen J, Zhou Q, Du R, Xiang Y (2021) Secure dynamic searchable symmetric encryption with constant client storage cost. IEEE Trans Inf Forensics Secur 16:1538–1549CrossRef He K, Chen J, Zhou Q, Du R, Xiang Y (2021) Secure dynamic searchable symmetric encryption with constant client storage cost. IEEE Trans Inf Forensics Secur 16:1538–1549CrossRef
3.
go back to reference Wang J, Chow SSM (2019) Forward and backward-secure range-searchable symmetric encryption. IACR Cryptol ePrint Arch 2019:497 Wang J, Chow SSM (2019) Forward and backward-secure range-searchable symmetric encryption. IACR Cryptol ePrint Arch 2019:497
4.
go back to reference Du L., Li K, Liu Q, Wu Z, Zhang S (2020) Dynamic multi-client searchable symmetric encryption with support for boolean queries. Inf Sci 506:234–257CrossRef Du L., Li K, Liu Q, Wu Z, Zhang S (2020) Dynamic multi-client searchable symmetric encryption with support for boolean queries. Inf Sci 506:234–257CrossRef
5.
go back to reference Demertzis I, Chamani JG, Papadopoulos D, Papamanthou C (2020) Dynamic searchable encryption with small client storage. In: 27th Annual network and distributed system security symposium, NDSS 2020, San Diego, California, USA, February 23-26, 2020. The Internet Society Demertzis I, Chamani JG, Papadopoulos D, Papamanthou C (2020) Dynamic searchable encryption with small client storage. In: 27th Annual network and distributed system security symposium, NDSS 2020, San Diego, California, USA, February 23-26, 2020. The Internet Society
6.
go back to reference Amjad G, Kamara S, Moataz T (2019) Forward and backward private searchable encryption with SGX. In: Proceedings of the 12th European workshop on systems security, EuroSec@EuroSys 2019, Dresden, Germany, March 25, 2019. ACM, pp 4:1– 4:6 Amjad G, Kamara S, Moataz T (2019) Forward and backward private searchable encryption with SGX. In: Proceedings of the 12th European workshop on systems security, EuroSec@EuroSys 2019, Dresden, Germany, March 25, 2019. ACM, pp 4:1– 4:6
7.
go back to reference Li J, Wen M, Wu K, Lu K, Li F, Li H (2019) Secure, flexible and high-efficient similarity search over encrypted data in multiple clouds. Peer Peer Netw Appl 12(4):893–911CrossRef Li J, Wen M, Wu K, Lu K, Li F, Li H (2019) Secure, flexible and high-efficient similarity search over encrypted data in multiple clouds. Peer Peer Netw Appl 12(4):893–911CrossRef
8.
go back to reference Liu C, Zhu L, Chen J (2017) Efficient searchable symmetric encryption for storing multiple source dynamic social data on cloud. J Netw Comput Appl 86:3–14CrossRef Liu C, Zhu L, Chen J (2017) Efficient searchable symmetric encryption for storing multiple source dynamic social data on cloud. J Netw Comput Appl 86:3–14CrossRef
9.
go back to reference Zhang C, Fu S, Ao W (2019) A blockchain based searchable encryption scheme for multiple cloud storage. In: Vaidya J, Zhang X, Li J (eds) Cyberspace safety and security - 11th international symposium, CSS 2019, Guangzhou, China, December 1-3, 2019. Cyberspace Safety and Security - 11th International Symposium, CSS 2019, Guangzhou, China, December 1-3, 2019, Proceedings, Part I, volume 11982 of Lecture Notes in Computer Science. Springer Zhang C, Fu S, Ao W (2019) A blockchain based searchable encryption scheme for multiple cloud storage. In: Vaidya J, Zhang X, Li J (eds) Cyberspace safety and security - 11th international symposium, CSS 2019, Guangzhou, China, December 1-3, 2019. Cyberspace Safety and Security - 11th International Symposium, CSS 2019, Guangzhou, China, December 1-3, 2019, Proceedings, Part I, volume 11982 of Lecture Notes in Computer Science. Springer
10.
go back to reference Zarezadeh M, Mala H, Ashouri-Talouki M (2020) Multi-keyword ranked searchable encryption scheme with access control for cloud storage. Peer Peer Netw Appl 13(1):207–218CrossRef Zarezadeh M, Mala H, Ashouri-Talouki M (2020) Multi-keyword ranked searchable encryption scheme with access control for cloud storage. Peer Peer Netw Appl 13(1):207–218CrossRef
11.
go back to reference Wang H, Dong X, Cao Z (2019) Secure and efficient encrypted keyword search for multi-user setting in cloud computing. Peer Peer Netw Appl 12(1):32–42CrossRef Wang H, Dong X, Cao Z (2019) Secure and efficient encrypted keyword search for multi-user setting in cloud computing. Peer Peer Netw Appl 12(1):32–42CrossRef
12.
go back to reference Zhang C, Zhu L, Xu C, Zhang C, Sharif K, Wu H, Westermann H (2020) BSFP: blockchain-enabled smart parking with fairness, reliability and privacy protection. IEEE Trans Veh Technol 69(6):6578–6591CrossRef Zhang C, Zhu L, Xu C, Zhang C, Sharif K, Wu H, Westermann H (2020) BSFP: blockchain-enabled smart parking with fairness, reliability and privacy protection. IEEE Trans Veh Technol 69(6):6578–6591CrossRef
13.
go back to reference Shengshan H u, Cai C, Wang Q, Wang C, Luo X, Ren K (2018) Searching an encrypted cloud meets blockchain: A decentralized, reliable and fair realization. In: 2018 IEEE conference on computer communications, INFOCOM 2018, Honolulu, HI, USA, April 16-19, 2018. IEEE, pp 792–800 Shengshan H u, Cai C, Wang Q, Wang C, Luo X, Ren K (2018) Searching an encrypted cloud meets blockchain: A decentralized, reliable and fair realization. In: 2018 IEEE conference on computer communications, INFOCOM 2018, Honolulu, HI, USA, April 16-19, 2018. IEEE, pp 792–800
14.
go back to reference Li M, Zhu L, Lin X (2019) Efficient and privacy-preserving carpooling using blockchain-assisted vehicular fog computing. IEEE Internet Things J 6(3):4573–4584CrossRef Li M, Zhu L, Lin X (2019) Efficient and privacy-preserving carpooling using blockchain-assisted vehicular fog computing. IEEE Internet Things J 6(3):4573–4584CrossRef
15.
go back to reference Chen B, Wu L, Wang H, Zhou L, He D (2020) A blockchain-based searchable public-key encryption with forward and backward privacy for cloud-assisted vehicular social networks. IEEE Trans Veh Technol 69(6):5813–5825CrossRef Chen B, Wu L, Wang H, Zhou L, He D (2020) A blockchain-based searchable public-key encryption with forward and backward privacy for cloud-assisted vehicular social networks. IEEE Trans Veh Technol 69(6):5813–5825CrossRef
16.
go back to reference Yan X, Yuan X, Ye Q, Tang Y (2020) Blockchain-based searchable encryption scheme with fair payment. IEEE Access 8:109687–109706CrossRef Yan X, Yuan X, Ye Q, Tang Y (2020) Blockchain-based searchable encryption scheme with fair payment. IEEE Access 8:109687–109706CrossRef
17.
go back to reference Yang Y, Lin H, Liu X, Guo W, Zheng X, Liu Z (2019) Blockchain-based verifiable multi-keyword ranked search on encrypted cloud with fair payment. IEEE Access 7:140818–140832CrossRef Yang Y, Lin H, Liu X, Guo W, Zheng X, Liu Z (2019) Blockchain-based verifiable multi-keyword ranked search on encrypted cloud with fair payment. IEEE Access 7:140818–140832CrossRef
18.
go back to reference Jiang S, Liu J, Wang L, Yoo S-M (2019) Verifiable search meets blockchain: A privacy-preserving framework for outsourced encrypted data. In: 2019 IEEE International conference on communications, ICC 2019, Shanghai, China, May 20-24, 2019. IEEE, pp 1–6 Jiang S, Liu J, Wang L, Yoo S-M (2019) Verifiable search meets blockchain: A privacy-preserving framework for outsourced encrypted data. In: 2019 IEEE International conference on communications, ICC 2019, Shanghai, China, May 20-24, 2019. IEEE, pp 1–6
19.
go back to reference Song DX, Wagner DA, Perrig A (2000) Practical techniques for searches on encrypted data. In: 2000 IEEE Symposium on security and privacy, Berkeley, California, USA, May 14-17, 2000. pp 44–55 Song DX, Wagner DA, Perrig A (2000) Practical techniques for searches on encrypted data. In: 2000 IEEE Symposium on security and privacy, Berkeley, California, USA, May 14-17, 2000. pp 44–55
20.
go back to reference Goh E-J (2003) Secure indexes. IACR Cryptol ePrint Arch 2003:216 Goh E-J (2003) Secure indexes. IACR Cryptol ePrint Arch 2003:216
21.
go back to reference Bloom BH (1970) Space/time trade-offs in hash coding with allowable errors. Commun ACM 13 (7):422–426CrossRef Bloom BH (1970) Space/time trade-offs in hash coding with allowable errors. Commun ACM 13 (7):422–426CrossRef
22.
go back to reference Curtmola R, Garay JA, Kamara S, Ostrovsky R (2006) Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of the 13th ACM conference on computer and communications security, CCS 2006, Alexandria, VA, USA, Ioctober 30 - November 3, 2006. pp 79–88 Curtmola R, Garay JA, Kamara S, Ostrovsky R (2006) Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of the 13th ACM conference on computer and communications security, CCS 2006, Alexandria, VA, USA, Ioctober 30 - November 3, 2006. pp 79–88
23.
go back to reference Kamara S, Papamanthou C, Roeder T (2012) Dynamic searchable symmetric encryption. In: the ACM Conference on computer and communications security, CCS’12, Raleigh, NC, USA, October 16-18, 2012, pp 965–976 Kamara S, Papamanthou C, Roeder T (2012) Dynamic searchable symmetric encryption. In: the ACM Conference on computer and communications security, CCS’12, Raleigh, NC, USA, October 16-18, 2012, pp 965–976
24.
go back to reference Stefanov E, Papamanthou C, Shi E (2014) Practical dynamic searchable encryption with small leakage. In: 21st Annual network and distributed system security symposium, NDSS 2014, San Diego, California, USA, February 23-26, 2014. The Internet Society Stefanov E, Papamanthou C, Shi E (2014) Practical dynamic searchable encryption with small leakage. In: 21st Annual network and distributed system security symposium, NDSS 2014, San Diego, California, USA, February 23-26, 2014. The Internet Society
25.
go back to reference Cash D, Jaeger J, Jarecki S, Jutla CS, Krawczyk H, Rosu M-C, Steiner M (2014) Dynamic searchable encryption in very-large databases: Data structures and implementation. In: 21st Annual network and distributed system security symposium, NDSS 2014, San Diego, California, USA, February 23-26, 2014. The Internet Society Cash D, Jaeger J, Jarecki S, Jutla CS, Krawczyk H, Rosu M-C, Steiner M (2014) Dynamic searchable encryption in very-large databases: Data structures and implementation. In: 21st Annual network and distributed system security symposium, NDSS 2014, San Diego, California, USA, February 23-26, 2014. The Internet Society
26.
go back to reference Naveed M, Prabhakaran M, Gunter CA (2014) Dynamic searchable encryption via blind storage. In: 2014 IEEE Symposium on security and privacy, SP 2014, Berkeley, CA, USA, May 18-21, 2014. pp 639–654 Naveed M, Prabhakaran M, Gunter CA (2014) Dynamic searchable encryption via blind storage. In: 2014 IEEE Symposium on security and privacy, SP 2014, Berkeley, CA, USA, May 18-21, 2014. pp 639–654
27.
go back to reference Kamara S, Papamanthou C (2013) Parallel and dynamic searchable symmetric encryption. In: Financial cryptography and data security - 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers. pp 258– 274 Kamara S, Papamanthou C (2013) Parallel and dynamic searchable symmetric encryption. In: Financial cryptography and data security - 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers. pp 258– 274
28.
go back to reference Kurosawa K, Ohtaki Y (2013) How to update documents verifiably in searchable symmetric encryption. In: Abdalla M, Nita-Rotaru C, Dahab R (eds) Cryptology and network security - 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22, 2013. Proceedings, volume 8257 of Lecture Notes in Computer Science. Springer, pp 309– 328 Kurosawa K, Ohtaki Y (2013) How to update documents verifiably in searchable symmetric encryption. In: Abdalla M, Nita-Rotaru C, Dahab R (eds) Cryptology and network security - 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22, 2013. Proceedings, volume 8257 of Lecture Notes in Computer Science. Springer, pp 309– 328
29.
go back to reference Bost R (2016) \(\sum \textit {o}\varphi \textit {o}{\varsigma }\): Forward secure searchable encryption. In: Weippl ER, Katzenbeisser S, Kruegel C, Myers AC, Halevi S (eds) Proceedings of the 2016 ACM SIGSAC Conference on computer and communications security, Vienna, Austria, October 24-28, 2016. ACM, pp 1143–1154 Bost R (2016) \(\sum \textit {o}\varphi \textit {o}{\varsigma }\): Forward secure searchable encryption. In: Weippl ER, Katzenbeisser S, Kruegel C, Myers AC, Halevi S (eds) Proceedings of the 2016 ACM SIGSAC Conference on computer and communications security, Vienna, Austria, October 24-28, 2016. ACM, pp 1143–1154
30.
go back to reference Wang H, Fan K, Li H, Yang Y (2020) A dynamic and verifiable multi-keyword ranked search scheme in the P2P networking environment. Peer Peer Netw Appl 13(6):2342–2355CrossRef Wang H, Fan K, Li H, Yang Y (2020) A dynamic and verifiable multi-keyword ranked search scheme in the P2P networking environment. Peer Peer Netw Appl 13(6):2342–2355CrossRef
31.
go back to reference Sharma D, Jinwala D (2021) Simple index based symmetric searchable encryption with result verifiability. Front Comput Sci 15(2):152805CrossRef Sharma D, Jinwala D (2021) Simple index based symmetric searchable encryption with result verifiability. Front Comput Sci 15(2):152805CrossRef
32.
go back to reference Ge X, Yu J, Zhang H, Hu C, Li Z, Qin Z, Hao R (2021) Towards achieving keyword search over dynamic encrypted cloud data with symmetric-key based verification. IEEE Trans Dependable Secur Comput 18(1):490–504CrossRef Ge X, Yu J, Zhang H, Hu C, Li Z, Qin Z, Hao R (2021) Towards achieving keyword search over dynamic encrypted cloud data with symmetric-key based verification. IEEE Trans Dependable Secur Comput 18(1):490–504CrossRef
33.
go back to reference Sisi Z, Souri A Blockchain technology for energy-aware mobile crowd sensing approaches in internet of things. Trans Emerg Telecommun Technol :e4217. e4217 ETT-20-1277.R1 Sisi Z, Souri A Blockchain technology for energy-aware mobile crowd sensing approaches in internet of things. Trans Emerg Telecommun Technol :e4217. e4217 ETT-20-1277.R1
34.
go back to reference Chen Y, Bai J, Hao Y, Liao S, Yi Z, Zhang H (2020) Blockchain-based dynamic group management for multiple keywords searchable encryption technology. In: International conference on cyber-enabled distributed computing and knowledge discovery, CyberC 2020, Chongqing, China, October 29-30, 2020. IEEE, pp 1–6 Chen Y, Bai J, Hao Y, Liao S, Yi Z, Zhang H (2020) Blockchain-based dynamic group management for multiple keywords searchable encryption technology. In: International conference on cyber-enabled distributed computing and knowledge discovery, CyberC 2020, Chongqing, China, October 29-30, 2020. IEEE, pp 1–6
35.
go back to reference Li D, Deng L, Cai Z, Souri A Blockchain as a service models in the internet of things management: Systematic review. Trans Emerg Telecommun Technol :e4139. e4139 ETT-20-0827.R1 Li D, Deng L, Cai Z, Souri A Blockchain as a service models in the internet of things management: Systematic review. Trans Emerg Telecommun Technol :e4139. e4139 ETT-20-0827.R1
36.
go back to reference Shahidinejad A, Ghobaei-Arani M, Souri A, Shojafar M (2021) Saru Kumari. A technical report for light-edge A lightweight authentication protocol for iot devices in an edge-cloud environment. arXiv:2101.06676 Shahidinejad A, Ghobaei-Arani M, Souri A, Shojafar M (2021) Saru Kumari. A technical report for light-edge A lightweight authentication protocol for iot devices in an edge-cloud environment. arXiv:2101.​06676
37.
go back to reference Lv S, Huang Y, Li B, Wei Y, Liu Z, Liu J, Lee DH (2018) Forward secure searchable encryption using key-based blocks chain technique. In: Vaidya J, Li J (eds) Algorithms and architectures for parallel processing - 18th international conference, ICA3PP 2018, Guangzhou, China, November 15-17, 2018, Proceedings, Part IV, volume 11337 of Lecture Notes in Computer Science. Springer, pp 85–97 Lv S, Huang Y, Li B, Wei Y, Liu Z, Liu J, Lee DH (2018) Forward secure searchable encryption using key-based blocks chain technique. In: Vaidya J, Li J (eds) Algorithms and architectures for parallel processing - 18th international conference, ICA3PP 2018, Guangzhou, China, November 15-17, 2018, Proceedings, Part IV, volume 11337 of Lecture Notes in Computer Science. Springer, pp 85–97
38.
go back to reference Li H, Tian H, Zhang F, He J (2019) Blockchain-based searchable symmetric encryption scheme. Comput Electr Eng 73:32–45CrossRef Li H, Tian H, Zhang F, He J (2019) Blockchain-based searchable symmetric encryption scheme. Comput Electr Eng 73:32–45CrossRef
39.
go back to reference Lashkami SR, Atani RE, Arabnouri A, Salemi G (2020) A blockchain based framework for complete secure data outsourcing with malicious behavior prevention. In: 2020 28th Iranian conference on electrical engineering (ICEE). pp 1–7 Lashkami SR, Atani RE, Arabnouri A, Salemi G (2020) A blockchain based framework for complete secure data outsourcing with malicious behavior prevention. In: 2020 28th Iranian conference on electrical engineering (ICEE). pp 1–7
40.
go back to reference Cai C, Yuan X, Wang C (2017) Hardening distributed and encrypted keyword search via blockchain. In: IEEE Symposium on Privacy-Aware Computing, PAC 2017, Washington, DC, USA, August 1-4, 2017. IEEE, pp 119–128 Cai C, Yuan X, Wang C (2017) Hardening distributed and encrypted keyword search via blockchain. In: IEEE Symposium on Privacy-Aware Computing, PAC 2017, Washington, DC, USA, August 1-4, 2017. IEEE, pp 119–128
41.
go back to reference Chen L, Lee W-K, Chang C-C, Choo K-KR, Zhang N (2019) Blockchain based searchable encryption for electronic health record sharing. Future Gener Comput Syst 95:420– 429CrossRef Chen L, Lee W-K, Chang C-C, Choo K-KR, Zhang N (2019) Blockchain based searchable encryption for electronic health record sharing. Future Gener Comput Syst 95:420– 429CrossRef
42.
go back to reference Zhang C, Zhu L, Xu C, Sharif K, Zhang C, Liu X (2020) PGAS: privacy-preserving graph encryption for accurate constrained shortest distance queries. Inf Sci 506:325–345MathSciNetCrossRef Zhang C, Zhu L, Xu C, Sharif K, Zhang C, Liu X (2020) PGAS: privacy-preserving graph encryption for accurate constrained shortest distance queries. Inf Sci 506:325–345MathSciNetCrossRef
Metadata
Title
A blockchain-based dynamic searchable symmetric encryption scheme under multiple clouds
Authors
Chang Xu
Lan Yu
Liehuang Zhu
Can Zhang
Publication date
01-07-2021
Publisher
Springer US
Published in
Peer-to-Peer Networking and Applications / Issue 6/2021
Print ISSN: 1936-6442
Electronic ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-021-01202-6

Other articles of this Issue 6/2021

Peer-to-Peer Networking and Applications 6/2021 Go to the issue

Premium Partner