Skip to main content
Top
Published in: Soft Computing 23/2018

14-05-2018 | Focus

An efficient and secure searchable public key encryption scheme with privacy protection for cloud storage

Authors: Libing Wu, Biwen Chen, Sherali Zeadally, Debiao He

Published in: Soft Computing | Issue 23/2018

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In the area of searchable encryption, the searchable public key encryption (SPE) is an attractive technique in secure cloud storage. SPE assures the data confidentiality without affecting the usage of the data stored in the cloud. Furthermore, compared with the symmetric searchable encryption, SPE does not require key distribution and management. We investigate the security of the searchable public key encryption based on the traditional Boneh’s framework. Although existing SPE schemes can enable users to search over encrypted data, most of these schemes are vulnerable to the file-injection attack and the insider keyword guessing attack. To mitigate these attacks, we propose an efficient and secure searchable public key encryption with privacy protection (SPE-PP). We then provide a concrete construction of SPE-PP that uses the Diffie–Hellman shared secret key, and we prove it can resist these attacks. Both the theoretical analysis and the experimental results show that our scheme achieves strong security along with high efficiency.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
go back to reference Abdalla M, Bellare M, Catalano D, Kiltz E, Kohno T, Lange T, Malone-Lee J, Neven G, Paillier P, Shi H (2005) Searchable encryption revisited: consistency properties, relation to anonymous ibe, and extensions. Crypto, Springer 3621:205–222MathSciNetMATH Abdalla M, Bellare M, Catalano D, Kiltz E, Kohno T, Lange T, Malone-Lee J, Neven G, Paillier P, Shi H (2005) Searchable encryption revisited: consistency properties, relation to anonymous ibe, and extensions. Crypto, Springer 3621:205–222MathSciNetMATH
go back to reference AlZain MA, Li AS, Soh B, Pardede E (2015) Multi-cloud data management using shamir’s secret sharing and quantum byzantine agreement schemes. Int J Cloud Appl Comput (IJCAC) 5(3):35–52 AlZain MA, Li AS, Soh B, Pardede E (2015) Multi-cloud data management using shamir’s secret sharing and quantum byzantine agreement schemes. Int J Cloud Appl Comput (IJCAC) 5(3):35–52
go back to reference Arriaga A, Tang Q, Ryan P (2014) Trapdoor privacy in asymmetric searchable encryption schemes. In: International conference on cryptology in Africa, Springer, pp 31–50 Arriaga A, Tang Q, Ryan P (2014) Trapdoor privacy in asymmetric searchable encryption schemes. In: International conference on cryptology in Africa, Springer, pp 31–50
go back to reference Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. Eurocrypt, Springer 3027:506–522MathSciNetMATH Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. Eurocrypt, Springer 3027:506–522MathSciNetMATH
go back to reference Bost R (2016) o\(\varphi \)o\(\varsigma \): forward secure searchable encryption. In: Proceedings of the 2016 ACM SIGSAC conference on computer and communications security. ACM, pp 1143–1154 Bost R (2016) o\(\varphi \)o\(\varsigma \): forward secure searchable encryption. In: Proceedings of the 2016 ACM SIGSAC conference on computer and communications security. ACM, pp 1143–1154
go back to reference Byun J, Rhee H, Park HA, Lee D (2006) Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. In: Secure data management, pp 75–83 Byun J, Rhee H, Park HA, Lee D (2006) Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. In: Secure data management, pp 75–83
go back to reference Chen R, Mu Y, Yang G, Guo F, Wang X (2016) Dual-server public-key encryption with keyword search for secure cloud storage. IEEE Trans Inf Forensics Secur 11(4):789–798 Chen R, Mu Y, Yang G, Guo F, Wang X (2016) Dual-server public-key encryption with keyword search for secure cloud storage. IEEE Trans Inf Forensics Secur 11(4):789–798
go back to reference Chen R, Mu Y, Yang G, Guo F, Wang X (2015) A new general framework for secure public key encryption with keyword search. In: Australasian conference on information security and privacy, Springer, pp 59–76 Chen R, Mu Y, Yang G, Guo F, Wang X (2015) A new general framework for secure public key encryption with keyword search. In: Australasian conference on information security and privacy, Springer, pp 59–76
go back to reference Gupta B, Badve OP (2017) Taxonomy of dos and ddos attacks and desirable defense mechanism in a cloud computing environment. Neural Comput Appl 28(12):3655–3682CrossRef Gupta B, Badve OP (2017) Taxonomy of dos and ddos attacks and desirable defense mechanism in a cloud computing environment. Neural Comput Appl 28(12):3655–3682CrossRef
go back to reference Gupta B, Agrawal DP, Yamaguchi S (2016) Handbook of research on modern cryptographic solutions for computer and cyber security. In: IGI Global Gupta B, Agrawal DP, Yamaguchi S (2016) Handbook of research on modern cryptographic solutions for computer and cyber security. In: IGI Global
go back to reference Hossain MS, Muhammad G, Abdul W, Song B, Gupta B (2017) Cloud-assisted secure video transmission and sharing framework for smart cities. Future Gener Comput Syst 83:569–606 Hossain MS, Muhammad G, Abdul W, Song B, Gupta B (2017) Cloud-assisted secure video transmission and sharing framework for smart cities. Future Gener Comput Syst 83:569–606
go back to reference Huang Q, Li H (2017) An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks. Inf Sci 403:1–14CrossRef Huang Q, Li H (2017) An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks. Inf Sci 403:1–14CrossRef
go back to reference Ibtihal M, Hassan N et al (2017) Homomorphic encryption as a service for outsourced images in mobile cloud computing environment. Int J Cloud Appl Comput (IJCAC) 7(2):27–40 Ibtihal M, Hassan N et al (2017) Homomorphic encryption as a service for outsourced images in mobile cloud computing environment. Int J Cloud Appl Comput (IJCAC) 7(2):27–40
go back to reference Jeong IR, Kwon JO, Hong D, Lee DH (2009) Constructing peks schemes secure against keyword guessing attacks is possible? Comput Commun 32(2):394–396CrossRef Jeong IR, Kwon JO, Hong D, Lee DH (2009) Constructing peks schemes secure against keyword guessing attacks is possible? Comput Commun 32(2):394–396CrossRef
go back to reference Li J, Chen X, Li M, Li J, Lee PP, Lou W (2014a) Secure deduplication with efficient and reliable convergent key management. IEEE Trans Parallel Distrib Syst 25(6):1615–1625CrossRef Li J, Chen X, Li M, Li J, Lee PP, Lou W (2014a) Secure deduplication with efficient and reliable convergent key management. IEEE Trans Parallel Distrib Syst 25(6):1615–1625CrossRef
go back to reference Li J, Huang X, Li J, Chen X, Xiang Y (2014b) Securely outsourcing attribute-based encryption with checkability. IEEE Trans Parallel Distrib Syst 25(8):2201–2210CrossRef Li J, Huang X, Li J, Chen X, Xiang Y (2014b) Securely outsourcing attribute-based encryption with checkability. IEEE Trans Parallel Distrib Syst 25(8):2201–2210CrossRef
go back to reference Li H, Liu D, Dai Y, Luan TH, Shen XS (2015a) Enabling efficient multi-keyword ranked search over encrypted mobile cloud data through blind storage. IEEE Trans Emerg Top Comput 3(1):127–138CrossRef Li H, Liu D, Dai Y, Luan TH, Shen XS (2015a) Enabling efficient multi-keyword ranked search over encrypted mobile cloud data through blind storage. IEEE Trans Emerg Top Comput 3(1):127–138CrossRef
go back to reference Li J, Chen X, Xhafa F, Barolli L (2015b) Secure deduplication storage systems supporting keyword search. J Comput Syst Sci 81(8):1532–1541MathSciNetCrossRef Li J, Chen X, Xhafa F, Barolli L (2015b) Secure deduplication storage systems supporting keyword search. J Comput Syst Sci 81(8):1532–1541MathSciNetCrossRef
go back to reference Li J, Li J, Chen X, Jia C, Lou W (2015c) Identity-based encryption with outsourced revocation in cloud computing. IEEE Trans Comput 64(2):425–437MathSciNetCrossRef Li J, Li J, Chen X, Jia C, Lou W (2015c) Identity-based encryption with outsourced revocation in cloud computing. IEEE Trans Comput 64(2):425–437MathSciNetCrossRef
go back to reference Li J, Liu Z, Chen X, Xhafa F, Tan X, Wong DS (2015d) L-encdb: a lightweight framework for privacy-preserving data queries in cloud computing. Knowl Based Syst 79:18–26CrossRef Li J, Liu Z, Chen X, Xhafa F, Tan X, Wong DS (2015d) L-encdb: a lightweight framework for privacy-preserving data queries in cloud computing. Knowl Based Syst 79:18–26CrossRef
go back to reference Li H, Liu D, Dai Y, Luan T, Yu S (2015e) Personalized search over encrypted data with efficient and secure update in mobile clouds. IEEE Trans Emerg Topics Comput 6(1):97–109CrossRef Li H, Liu D, Dai Y, Luan T, Yu S (2015e) Personalized search over encrypted data with efficient and secure update in mobile clouds. IEEE Trans Emerg Topics Comput 6(1):97–109CrossRef
go back to reference Li T, Gupta BB, Metere R (2017a) Socially-conforming cooperative computation in cloud networks. J Parallel Distrib Comput 117:274–280CrossRef Li T, Gupta BB, Metere R (2017a) Socially-conforming cooperative computation in cloud networks. J Parallel Distrib Comput 117:274–280CrossRef
go back to reference Li J, Lin X, Zhang Y, Han J (2017b) Ksf-oabe: outsourced attribute-based encryption with keyword search function for cloud storage. IEEE Trans Serv Comput 10(5):715–725CrossRef Li J, Lin X, Zhang Y, Han J (2017b) Ksf-oabe: outsourced attribute-based encryption with keyword search function for cloud storage. IEEE Trans Serv Comput 10(5):715–725CrossRef
go back to reference Li J, Zhang Y, Chen X, Xiang Y (2018) Secure attribute-based data sharing for resource-limited users in cloud computing. Computers & Security 72(1–1):2 Li J, Zhang Y, Chen X, Xiang Y (2018) Secure attribute-based data sharing for resource-limited users in cloud computing. Computers & Security 72(1–1):2
go back to reference Liu Z, Weng J, Li J, Yang J, Fu C, Jia C (2016) Cloud-based electronic health record system supporting fuzzy keyword search. Soft Comput 20(8):3243–3255CrossRef Liu Z, Weng J, Li J, Yang J, Fu C, Jia C (2016) Cloud-based electronic health record system supporting fuzzy keyword search. Soft Comput 20(8):3243–3255CrossRef
go back to reference Liu Z, Huang Y, Li J, Cheng X, Shen C (2018) Divoram: towards a practical oblivious ram with variable block size. Inf Sci. Doi: 10.1016/j.ins.2018.02.071CrossRef Liu Z, Huang Y, Li J, Cheng X, Shen C (2018) Divoram: towards a practical oblivious ram with variable block size. Inf Sci. Doi: 10.1016/j.ins.2018.02.071CrossRef
go back to reference Ma M, He D, Kumar N, Choo KKR, Chen J (2017) Certificateless searchable public key encryption scheme for industrial internet of things. IEEE Trans Ind Inf 14(2):759–767CrossRef Ma M, He D, Kumar N, Choo KKR, Chen J (2017) Certificateless searchable public key encryption scheme for industrial internet of things. IEEE Trans Ind Inf 14(2):759–767CrossRef
go back to reference Rhee HS, Park JH, Susilo W, Lee DH (2010) Trapdoor security in a searchable public-key encryption scheme with a designated tester. J Syst Softw 83(5):763–771CrossRef Rhee HS, Park JH, Susilo W, Lee DH (2010) Trapdoor security in a searchable public-key encryption scheme with a designated tester. J Syst Softw 83(5):763–771CrossRef
go back to reference Shao ZY, Yang B (2015) On security against the server in designated tester public key encryption with keyword search. Inf Process Lett 115(12):957–961MathSciNetCrossRef Shao ZY, Yang B (2015) On security against the server in designated tester public key encryption with keyword search. Inf Process Lett 115(12):957–961MathSciNetCrossRef
go back to reference Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: Proceedings 2000 IEEE symposium on security and privacy, 2000. S&P 2000. IEEE, pp 44–55 Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: Proceedings 2000 IEEE symposium on security and privacy, 2000. S&P 2000. IEEE, pp 44–55
go back to reference Sun W, Yu S, Lou W, Hou YT, Li H (2016) Protecting your right: verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. IEEE Trans Parallel Distrib Syst 27(4):1187–1198CrossRef Sun W, Yu S, Lou W, Hou YT, Li H (2016) Protecting your right: verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. IEEE Trans Parallel Distrib Syst 27(4):1187–1198CrossRef
go back to reference Tomida K, Doi H, Mohri M, Shiraishi Y (2015) Ciphertext divided anonymous hibe and its transformation to identity-based encryption with keyword search. J Inf Process 23(5):562–569 Tomida K, Doi H, Mohri M, Shiraishi Y (2015) Ciphertext divided anonymous hibe and its transformation to identity-based encryption with keyword search. J Inf Process 23(5):562–569
go back to reference Wang Ch, Ty Tu (2014) Keyword search encryption scheme resistant against keyword-guessing attack by the untrusted server. J Shanghai Jiaotong Univ (Sci) 19(4):440–442CrossRef Wang Ch, Ty Tu (2014) Keyword search encryption scheme resistant against keyword-guessing attack by the untrusted server. J Shanghai Jiaotong Univ (Sci) 19(4):440–442CrossRef
go back to reference Wang XF, Mu Y, Chen R, Zhang XS (2016) Secure channel free id-based searchable encryption for peer-to-peer group. J Comput Sci Technol 31(5):1012–1027MathSciNetCrossRef Wang XF, Mu Y, Chen R, Zhang XS (2016) Secure channel free id-based searchable encryption for peer-to-peer group. J Comput Sci Technol 31(5):1012–1027MathSciNetCrossRef
go back to reference Xhafa F, Wang J, Chen X, Liu JK, Li J, Krause P (2014) An efficient phr service system supporting fuzzy keyword search and fine-grained access control. Soft Comput 18(9):1795–1802CrossRef Xhafa F, Wang J, Chen X, Liu JK, Li J, Krause P (2014) An efficient phr service system supporting fuzzy keyword search and fine-grained access control. Soft Comput 18(9):1795–1802CrossRef
go back to reference Xu P, Jin H, Wu Q, Wang W (2013) Public-key encryption with fuzzy keyword search: a provably secure scheme under keyword guessing attack. IEEE Trans Comput 62(11):2266–2277MathSciNetCrossRef Xu P, Jin H, Wu Q, Wang W (2013) Public-key encryption with fuzzy keyword search: a provably secure scheme under keyword guessing attack. IEEE Trans Comput 62(11):2266–2277MathSciNetCrossRef
go back to reference Yau WC, Heng SH, Goi BM (2008) Off-line keyword guessing attacks on recent public key encryption with keyword search schemes. In: Autonomic and trusted computing, pp 100–105 Yau WC, Heng SH, Goi BM (2008) Off-line keyword guessing attacks on recent public key encryption with keyword search schemes. In: Autonomic and trusted computing, pp 100–105
go back to reference Ye J, Wang J, Zhao J, Shen J, Li KC (2017) Fine-grained searchable encryption in multi-user setting. Soft Comput 21(20):6201–6212CrossRef Ye J, Wang J, Zhao J, Shen J, Li KC (2017) Fine-grained searchable encryption in multi-user setting. Soft Comput 21(20):6201–6212CrossRef
go back to reference Zhang Y, Chen X, Li J, Wong DS, Li H, You I (2017) Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing. Inf Sci 379:42–61CrossRef Zhang Y, Chen X, Li J, Wong DS, Li H, You I (2017) Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing. Inf Sci 379:42–61CrossRef
go back to reference Zhang Y, Katz J, Papamanthou C (2016) All your queries are belong to us: the power of file-injection attacks on searchable encryption. In: IACR cryptology ePrint archive 2016, pp 172 Zhang Y, Katz J, Papamanthou C (2016) All your queries are belong to us: the power of file-injection attacks on searchable encryption. In: IACR cryptology ePrint archive 2016, pp 172
go back to reference Zhang R, Xue R, Yu T, Liu L (2016a) Pvsae: a public verifiable searchable encryption service framework for outsourced encrypted data. In: 2016 IEEE international conference on web services (ICWS). IEEE, pp 428–435 Zhang R, Xue R, Yu T, Liu L (2016a) Pvsae: a public verifiable searchable encryption service framework for outsourced encrypted data. In: 2016 IEEE international conference on web services (ICWS). IEEE, pp 428–435
Metadata
Title
An efficient and secure searchable public key encryption scheme with privacy protection for cloud storage
Authors
Libing Wu
Biwen Chen
Sherali Zeadally
Debiao He
Publication date
14-05-2018
Publisher
Springer Berlin Heidelberg
Published in
Soft Computing / Issue 23/2018
Print ISSN: 1432-7643
Electronic ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-018-3224-8

Other articles of this Issue 23/2018

Soft Computing 23/2018 Go to the issue

Premium Partner