Skip to main content
Top
Published in: Peer-to-Peer Networking and Applications 1/2020

30-04-2019

Multi-keyword ranked searchable encryption scheme with access control for cloud storage

Authors: Maryam Zarezadeh, Hamid Mala, Maede Ashouri-Talouki

Published in: Peer-to-Peer Networking and Applications | Issue 1/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

With the advent of cloud computing, data owners are motivated to outsource their data to public clouds for decreasing the cost of management systems. For protecting data privacy, sensitive data must be encrypted before outsourcing. So, equipping cloud server with search service over encrypted data is an important issue. Considering the large number of data users and documents in the cloud, users may be interested to perform multi-keyword search and receive the most related data. In this paper, we investigate the Pasupuleti et al.’s scheme which is a multi-keyword ranked search over encrypted cloud data. Their scheme has problems in index construction, trapdoor generation and search procedures. We address these problems and suggest a multi-keyword ranked search over encrypted data on cloud storage. The proposed ranked searchable encryption scheme enhances system usability by ranking results instead of just sending undifferentiated results and ensures file retrieval accuracy. We also use the relevance score from information retrieval to build a secure searchable index, and apply an additive order-preserving encryption to protect the sensitive scores of files. Our scheme also guarantees access control of users during the data retrieval by attribute-based encryption. Analysis shows that our scheme is secure and efficient for cloud storage.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Rittinghouse JW, Ransome JF (2016) Cloud computing: implementation, management and security. CRC Press Rittinghouse JW, Ransome JF (2016) Cloud computing: implementation, management and security. CRC Press
2.
go back to reference Agrawal R, Kiernan J, Srikant R, Xu Y (2004) Order preserving encryption for numeric data. In: Proceedings of the 2004 ACM SIGMOD international conference on Management of data, pp 563–574 Agrawal R, Kiernan J, Srikant R, Xu Y (2004) Order preserving encryption for numeric data. In: Proceedings of the 2004 ACM SIGMOD international conference on Management of data, pp 563–574
3.
go back to reference Pasupuleti SK, Ramalingam S, Buyya R (2016) An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing. J Netw Comput Appl 64:12–22CrossRef Pasupuleti SK, Ramalingam S, Buyya R (2016) An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing. J Netw Comput Appl 64:12–22CrossRef
4.
go back to reference Menezes AJ, van Oorschot PC, Vanstone SA (1996) Handbook of applied cryptography. CRC Press Menezes AJ, van Oorschot PC, Vanstone SA (1996) Handbook of applied cryptography. CRC Press
5.
go back to reference Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: Proceedings IEEE symposium on security and privacy, S&P 2000. IEEE, pp 44–5 Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: Proceedings IEEE symposium on security and privacy, S&P 2000. IEEE, pp 44–5
6.
go back to reference Kamara S, Papamanthou C, Roeder T (2012) Dynamic searchable symmetric encryption. In: Proceedings of the 2012 ACM conference on computer and communications security. ACM, pp 965–976 Kamara S, Papamanthou C, Roeder T (2012) Dynamic searchable symmetric encryption. In: Proceedings of the 2012 ACM conference on computer and communications security. ACM, pp 965–976
7.
go back to reference Poh GS, Mohamad MS, Chin JJ (2018) Searchable symmetric encryption over multiple servers. Cryptogr Commun 10(1):139–158MathSciNetCrossRef Poh GS, Mohamad MS, Chin JJ (2018) Searchable symmetric encryption over multiple servers. Cryptogr Commun 10(1):139–158MathSciNetCrossRef
8.
go back to reference Goh EJ (2003) Secure indexes, IACR Cryptology ePrint Archive, 216 Goh EJ (2003) Secure indexes, IACR Cryptology ePrint Archive, 216
9.
go back to reference Curtmola R, Garay JA, Kamara S, Ostrovsky R (2006) Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of the 13th ACM conference on computer and communications security, pp 79–88 Curtmola R, Garay JA, Kamara S, Ostrovsky R (2006) Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of the 13th ACM conference on computer and communications security, pp 79–88
10.
go back to reference Curtmola R, Garay JA, Kamara S, Ostrovsky R (2011) Searchable symmetric encryption: improved definitions and efficient constructions. J Comput Secur 19(5):895–934CrossRef Curtmola R, Garay JA, Kamara S, Ostrovsky R (2011) Searchable symmetric encryption: improved definitions and efficient constructions. J Comput Secur 19(5):895–934CrossRef
11.
go back to reference Cheng R, Yan J, Guan C, Zhang F, Ren K (2015) Verifiable searchable symmetric encryption from indistinguishability obfuscation. In: Proceedings of the 10th ACM symposium on information computer and communications security. ACM, pp 621–626 Cheng R, Yan J, Guan C, Zhang F, Ren K (2015) Verifiable searchable symmetric encryption from indistinguishability obfuscation. In: Proceedings of the 10th ACM symposium on information computer and communications security. ACM, pp 621–626
12.
go back to reference Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. In: International conference on the theory and applications of cryptographic techniques. Springer, Berlin, pp 506–522CrossRef Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. In: International conference on the theory and applications of cryptographic techniques. Springer, Berlin, pp 506–522CrossRef
13.
go back to reference Li J, Wang Q, Wang C, Cao N, Ren K, Lou W (2010) Fuzzy keyword search over encrypted data in cloud computing. In Infocom, proceedings ieee. IEEE, pp 1–5 Li J, Wang Q, Wang C, Cao N, Ren K, Lou W (2010) Fuzzy keyword search over encrypted data in cloud computing. In Infocom, proceedings ieee. IEEE, pp 1–5
14.
go back to reference Raghavendra S, Geeta CM, Shaila K, Buyya R, Venugopal KR, Iyengar SS, Patnaik LM (2015) MSSS: most significant single-keyword search over encrypted cloud data. In: Proceedings of the 6th annual intrernational conference on ICT: BigData, Cloud and Securit Raghavendra S, Geeta CM, Shaila K, Buyya R, Venugopal KR, Iyengar SS, Patnaik LM (2015) MSSS: most significant single-keyword search over encrypted cloud data. In: Proceedings of the 6th annual intrernational conference on ICT: BigData, Cloud and Securit
15.
go back to reference Pitchai R, Jayashri S, Raja J (2016) Searchable encrypted data file sharing method using public cloud service for secure storage in cloud computing. Wirel Pers Commun 90(2):947–960CrossRef Pitchai R, Jayashri S, Raja J (2016) Searchable encrypted data file sharing method using public cloud service for secure storage in cloud computing. Wirel Pers Commun 90(2):947–960CrossRef
16.
go back to reference Wang H, Dong X, Cao Z (2017) Secure and efficient encrypted keyword search for multi-user setting in cloud computing. Peer-to-Peer Network Appl, 1–11 Wang H, Dong X, Cao Z (2017) Secure and efficient encrypted keyword search for multi-user setting in cloud computing. Peer-to-Peer Network Appl, 1–11
17.
go back to reference Buyrukbilen S, Bakiras S (2013) Privacy-preserving ranked search on public-key encrypted data, in high performance computing and communications. In: IEEE 10th International conference on ieee international conference on embedded and ubiquitous computing (HPCC_EUC), pp 165–174 Buyrukbilen S, Bakiras S (2013) Privacy-preserving ranked search on public-key encrypted data, in high performance computing and communications. In: IEEE 10th International conference on ieee international conference on embedded and ubiquitous computing (HPCC_EUC), pp 165–174
18.
go back to reference Yu J, Lu P, Zhu Y, Xue G, Li M (2013) Toward secure multikeyword top-k retrieval over encrypted cloud data. IEEE Trans Depend Sec Comput 10(4):239–250CrossRef Yu J, Lu P, Zhu Y, Xue G, Li M (2013) Toward secure multikeyword top-k retrieval over encrypted cloud data. IEEE Trans Depend Sec Comput 10(4):239–250CrossRef
19.
go back to reference Cao N, Wang C, Li M, Ren K, Lou W (2014) Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans Parallel Distrib Syst 25:222–233CrossRef Cao N, Wang C, Li M, Ren K, Lou W (2014) Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans Parallel Distrib Syst 25:222–233CrossRef
20.
go back to reference Sun W, Wang B, Cao N, Li M, Lou W, Hou YT, et al. (2014) Verifiable privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. IEEE Trans Parallel Distrib Syst 25:3025–3035CrossRef Sun W, Wang B, Cao N, Li M, Lou W, Hou YT, et al. (2014) Verifiable privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. IEEE Trans Parallel Distrib Syst 25:3025–3035CrossRef
21.
go back to reference Zhang W, Xiao S, Lin Y, Zhou T, Zhou S (2014) Secure ranked multi-keyword search for multiple data owners in cloud computing. In: 44th Annual IEEE/IFIP International conference on dependable systems and networks (DSN), pp 276–286 Zhang W, Xiao S, Lin Y, Zhou T, Zhou S (2014) Secure ranked multi-keyword search for multiple data owners in cloud computing. In: 44th Annual IEEE/IFIP International conference on dependable systems and networks (DSN), pp 276–286
22.
go back to reference Li H, Liu D, Jia K, Lin X (2015) Achieving authorized and ranked multi-keyword search over encrypted cloud data. In: IEEE International conference on in communications (ICC), pp 7450–7455 Li H, Liu D, Jia K, Lin X (2015) Achieving authorized and ranked multi-keyword search over encrypted cloud data. In: IEEE International conference on in communications (ICC), pp 7450–7455
23.
go back to reference Sun W, Liu X, Lou W, Hou YT, Li H (2015) Catch you if you lie to me: efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data. In: IEEE Conference on computer communications (INFOCOM), pp 2110–2118 Sun W, Liu X, Lou W, Hou YT, Li H (2015) Catch you if you lie to me: efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data. In: IEEE Conference on computer communications (INFOCOM), pp 2110–2118
24.
go back to reference Li H, Liu D, Dai Y, Luan TH, Shen XS (2015) Enabling efficient multi-keyword ranked search over encrypted mobile cloud data through blind storage. IEEE Trans Emerg Topics Comput 3:127–138CrossRef Li H, Liu D, Dai Y, Luan TH, Shen XS (2015) Enabling efficient multi-keyword ranked search over encrypted mobile cloud data through blind storage. IEEE Trans Emerg Topics Comput 3:127–138CrossRef
25.
go back to reference Xia Z, Wang X, Sun X, Wang Q (2016) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 27:340–352CrossRef Xia Z, Wang X, Sun X, Wang Q (2016) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 27:340–352CrossRef
26.
go back to reference Jiang X, Yu J, Yan J, Hao R (2017) Enabling efficient and verifiable multi-keyword ranked search over encrypted cloud data. Inform Sci 403:22–41CrossRef Jiang X, Yu J, Yan J, Hao R (2017) Enabling efficient and verifiable multi-keyword ranked search over encrypted cloud data. Inform Sci 403:22–41CrossRef
27.
go back to reference Sun W, Yu S, Lou W, Hou YT, Li H (2016) Protecting your right: verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. IEEE Trans Parallel Distrib Syst 27:1187–1198CrossRef Sun W, Yu S, Lou W, Hou YT, Li H (2016) Protecting your right: verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. IEEE Trans Parallel Distrib Syst 27:1187–1198CrossRef
28.
go back to reference Miao Y, Ma J, Liu X, Liu Z, Shen L, Wei F (2016) VMKDO: verifiable multi-keyword search over encrypted cloud data for dynamic data-owner. Peer-to-Peer Netw Appl, 1–11 Miao Y, Ma J, Liu X, Liu Z, Shen L, Wei F (2016) VMKDO: verifiable multi-keyword search over encrypted cloud data for dynamic data-owner. Peer-to-Peer Netw Appl, 1–11
29.
go back to reference Fan Y, Liu Z (2017) Verifiable attribute-based multi-keyword search over encrypted cloud data in multi-owner setting. In: IEEE Second International conference on data science in cyberspace (DSC), pp 441–449 Fan Y, Liu Z (2017) Verifiable attribute-based multi-keyword search over encrypted cloud data in multi-owner setting. In: IEEE Second International conference on data science in cyberspace (DSC), pp 441–449
30.
go back to reference Wu DN, Gan QQ, Wang X (2018) Verifiable public key encryption with keyword search based on homomorphic encryption in multi-user setting. IEEE Access 6:42445–42453CrossRef Wu DN, Gan QQ, Wang X (2018) Verifiable public key encryption with keyword search based on homomorphic encryption in multi-user setting. IEEE Access 6:42445–42453CrossRef
31.
go back to reference Liu Z, Wang Z, Cheng X, Jia C, Yuan K (2013) Multi-user searchable encryption with coarser-grained access control in hybrid cloud. In: Fourth International conference on emerging intelligent data and web technologies (EIDWT). IEEE, pp 249–255 Liu Z, Wang Z, Cheng X, Jia C, Yuan K (2013) Multi-user searchable encryption with coarser-grained access control in hybrid cloud. In: Fourth International conference on emerging intelligent data and web technologies (EIDWT). IEEE, pp 249–255
32.
go back to reference Kaci A, Bouabana-Tebibel T (2014) Access control reinforcement over searchable encryption. In: 2014 IEEE 15th International conference on information reuse and integration (IRI). IEEE, pp 130–137 Kaci A, Bouabana-Tebibel T (2014) Access control reinforcement over searchable encryption. In: 2014 IEEE 15th International conference on information reuse and integration (IRI). IEEE, pp 130–137
33.
go back to reference Li J, Zhang L (2014) Attribute-based keyword search and data access control in cloud. In: 2014 Tenth International conference on computational intelligence and security (CIS). IEEE, pp 382–386 Li J, Zhang L (2014) Attribute-based keyword search and data access control in cloud. In: 2014 Tenth International conference on computational intelligence and security (CIS). IEEE, pp 382–386
34.
go back to reference Zhou P, Liu Z, Duan S (2016) Flexible attribute-based keyword search via two access policies. In: International conference on broadband and wireless computing, communication and applications. Springer, Cham, pp 815–822 Zhou P, Liu Z, Duan S (2016) Flexible attribute-based keyword search via two access policies. In: International conference on broadband and wireless computing, communication and applications. Springer, Cham, pp 815–822
35.
go back to reference Li H, Yang Y, Dai Y, Bai J, Yu S, Xiang Y (2017) Achieving secure and efficient dynamic searchable symmetric encryption over medical cloud data. IEEE Transactions on Cloud Computing Li H, Yang Y, Dai Y, Bai J, Yu S, Xiang Y (2017) Achieving secure and efficient dynamic searchable symmetric encryption over medical cloud data. IEEE Transactions on Cloud Computing
36.
go back to reference Cao L, Wang Y, Dong X, Liu Y, Zhang Y, Guo X, Feng T (2018) Multiuser access control searchable privacy-preserving scheme in cloud storage. Int J Commun Syst 31(9):e3548CrossRef Cao L, Wang Y, Dong X, Liu Y, Zhang Y, Guo X, Feng T (2018) Multiuser access control searchable privacy-preserving scheme in cloud storage. Int J Commun Syst 31(9):e3548CrossRef
37.
go back to reference Ren H, Li H, Dai Y, Yang K, Lin X (2018) Querying in internet of things with privacy preserving: challenges, solutions and opportunities. IEEE Netw 99:1–8 Ren H, Li H, Dai Y, Yang K, Lin X (2018) Querying in internet of things with privacy preserving: challenges, solutions and opportunities. IEEE Netw 99:1–8
38.
go back to reference He K, Guo J, Weng J, Weng J, Liu JK, Yi X (2018) Attribute-based hybrid Boolean keyword search over outsourced encrypted data/ IEEE Transactions on Dependable and Secure Computing He K, Guo J, Weng J, Weng J, Liu JK, Yi X (2018) Attribute-based hybrid Boolean keyword search over outsourced encrypted data/ IEEE Transactions on Dependable and Secure Computing
39.
go back to reference Xu G, Li H, Dai Y, Yang K, Lin X (2019) Enabling efficient and geometric range query with access control over encrypted spatial data. IEEE Trans Inf Forens Secur 14(4):870–885CrossRef Xu G, Li H, Dai Y, Yang K, Lin X (2019) Enabling efficient and geometric range query with access control over encrypted spatial data. IEEE Trans Inf Forens Secur 14(4):870–885CrossRef
40.
go back to reference Koo D, Hur J, Yoon H (2013) Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage. Comput Electr Eng 39:34–46CrossRef Koo D, Hur J, Yoon H (2013) Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage. Comput Electr Eng 39:34–46CrossRef
41.
go back to reference Wang X, Zhang Y (2018) E-SC: collusion-resistant secure outsourcing of sequence comparison algorithm. IEEE Access 6:3358–3375CrossRef Wang X, Zhang Y (2018) E-SC: collusion-resistant secure outsourcing of sequence comparison algorithm. IEEE Access 6:3358–3375CrossRef
42.
go back to reference Jiang X, Ge X, Yu J, Kong F, Cheng X, Hao R (2017) An efficient symmetric searchable encryption scheme for cloud storage. J Internet Serv Inf Secur (JISIS) 7(2):1–18 Jiang X, Ge X, Yu J, Kong F, Cheng X, Hao R (2017) An efficient symmetric searchable encryption scheme for cloud storage. J Internet Serv Inf Secur (JISIS) 7(2):1–18
43.
go back to reference Witten IH, Moffat A, Bell TC (1999) Managing gigabytes: compressing and indexing documents and images. Morgan Kaufmann Witten IH, Moffat A, Bell TC (1999) Managing gigabytes: compressing and indexing documents and images. Morgan Kaufmann
44.
go back to reference Peng Y, Li H, Cui J, Zhang J, Ma J, Peng C (2017) hOPE: improved order preserving encryption with the power to homomorphic operations of ciphertexts. Sci Chin Inf Sci 60(6):062101CrossRef Peng Y, Li H, Cui J, Zhang J, Ma J, Peng C (2017) hOPE: improved order preserving encryption with the power to homomorphic operations of ciphertexts. Sci Chin Inf Sci 60(6):062101CrossRef
Metadata
Title
Multi-keyword ranked searchable encryption scheme with access control for cloud storage
Authors
Maryam Zarezadeh
Hamid Mala
Maede Ashouri-Talouki
Publication date
30-04-2019
Publisher
Springer US
Published in
Peer-to-Peer Networking and Applications / Issue 1/2020
Print ISSN: 1936-6442
Electronic ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-019-00736-0

Other articles of this Issue 1/2020

Peer-to-Peer Networking and Applications 1/2020 Go to the issue

Premium Partner