Skip to main content
Top
Published in: Peer-to-Peer Networking and Applications 5/2021

30-04-2021

Verifiable dynamic ranked search with forward privacy over encrypted cloud data

Authors: Chien-Ming Chen, Zhuoyu Tie, Eric Ke Wang, Muhammad Khurram Khan, Sachin Kumar, Saru Kumari

Published in: Peer-to-Peer Networking and Applications | Issue 5/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Searchable encryption performs satisfactorily in protecting the privacy of outsourced data in cloud storage scenarios because it encrypts data and provides a secure way of searching on the ciphertext. Dynamic searchable encryption is designed to support the insertion and deletion of outsourced data. However, insertion may cause information leakage of updated keywords. Thus, forward privacy is proposed to limit the leakage of insertion, and it has become a vital security attribute for dynamic schemes. A verifiable dynamic encryption with ranked search (VDERS) scheme helps users to update outsourced data and verify the search result’s accuracy. However, as demonstrated in this study, a VDERS scheme proposed recently fails to satisfy forward privacy because there are two links between the previous search token and the added document. Thus, we designed an improved scheme VDERSc to achieve forward privacy. In our work, we cut off the two links by adding counters and an update buffer. Finally, experiment results showed that our improved scheme supports verification at a finer granularity, leading to a significant proof generation reduction.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Al-Qerem A, Alauthman M, Almomani A, Gupta B (2020) Iot transaction processing through cooperative concurrency control on fog–cloud computing environment. Soft Comput 24(8):5695–5711CrossRef Al-Qerem A, Alauthman M, Almomani A, Gupta B (2020) Iot transaction processing through cooperative concurrency control on fog–cloud computing environment. Soft Comput 24(8):5695–5711CrossRef
2.
go back to reference Bhushan K, Gupta B (2019) Distributed denial of service (ddos) attack mitigation in software defined network (sdn)-based cloud computing environment. J Ambient Intell Human Comput 10(5):1985–1997CrossRef Bhushan K, Gupta B (2019) Distributed denial of service (ddos) attack mitigation in software defined network (sdn)-based cloud computing environment. J Ambient Intell Human Comput 10(5):1985–1997CrossRef
3.
go back to reference Bost R (2016) oφoς: Forward secure searchable encryption. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp 1143–1154 Bost R (2016) oφoς: Forward secure searchable encryption. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp 1143–1154
4.
go back to reference Camenisch J, Lysyanskaya A (2002) Dynamic accumulators and application to efficient revocation of anonymous credentials. In: Annual international cryptology conference, pp 61–76. Springer Camenisch J, Lysyanskaya A (2002) Dynamic accumulators and application to efficient revocation of anonymous credentials. In: Annual international cryptology conference, pp 61–76. Springer
5.
go back to reference Cao N, Wang C, Li M, Ren K, Lou W (2013) Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans Parallel Distrib Syst 25(1):222–233CrossRef Cao N, Wang C, Li M, Ren K, Lou W (2013) Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans Parallel Distrib Syst 25(1):222–233CrossRef
6.
go back to reference Cash D, Jaeger J, Jarecki S, Jutla C, Krawczyk H, Rosu MC, Steiner M (2014) Dynamic searchable encryption in very-large databases: data structures and implementation. In: NDSS, vol 14. Citeseer, pp 23–26 Cash D, Jaeger J, Jarecki S, Jutla C, Krawczyk H, Rosu MC, Steiner M (2014) Dynamic searchable encryption in very-large databases: data structures and implementation. In: NDSS, vol 14. Citeseer, pp 23–26
7.
go back to reference Cash D, Jarecki S, Jutla C, Krawczyk H, Roṡu MC, Steiner M (2013) Highly-scalable searchable symmetric encryption with support for boolean queries. In: Annual cryptology conference. Springer, pp 353–373 Cash D, Jarecki S, Jutla C, Krawczyk H, Roṡu MC, Steiner M (2013) Highly-scalable searchable symmetric encryption with support for boolean queries. In: Annual cryptology conference. Springer, pp 353–373
8.
go back to reference Chai Q, Gong G (2012) Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers. In: 2012 IEEE International conference on communications (ICC). IEEE, pp 917–922 Chai Q, Gong G (2012) Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers. In: 2012 IEEE International conference on communications (ICC). IEEE, pp 917–922
9.
go back to reference Chen C, Zhu X, Shen P, Hu J, Guo S, Tari Z, Zomaya AY (2015) An efficient privacy-preserving ranked keyword search method. IEEE Trans Parallel Distrib Syst 27(4):951–963CrossRef Chen C, Zhu X, Shen P, Hu J, Guo S, Tari Z, Zomaya AY (2015) An efficient privacy-preserving ranked keyword search method. IEEE Trans Parallel Distrib Syst 27(4):951–963CrossRef
10.
go back to reference Chen CM, Zhang W, Wu TY, Wang KH, Wu JMT, Pan JS (2018) Hierarchical semantic approximate multi-keyword ranked search over encrypted data. In: International conference on smart vehicular technology, transportation, communication and applications. Springer, pp 131–138 Chen CM, Zhang W, Wu TY, Wang KH, Wu JMT, Pan JS (2018) Hierarchical semantic approximate multi-keyword ranked search over encrypted data. In: International conference on smart vehicular technology, transportation, communication and applications. Springer, pp 131–138
11.
go back to reference Curtmola R, Garay J, Kamara S, Ostrovsky R (2011) Searchable symmetric encryption: improved definitions and efficient constructions. J Comput Secur 19(5):895–934CrossRef Curtmola R, Garay J, Kamara S, Ostrovsky R (2011) Searchable symmetric encryption: improved definitions and efficient constructions. J Comput Secur 19(5):895–934CrossRef
12.
go back to reference Ghareh Chamani J, Papadopoulos D, Papamanthou C, Jalili R (2018) New constructions for forward and backward private symmetric searchable encryption. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp 1038–1055 Ghareh Chamani J, Papadopoulos D, Papamanthou C, Jalili R (2018) New constructions for forward and backward private symmetric searchable encryption. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp 1038–1055
13.
go back to reference He BZ, Chen CM, Wu TY, Sun HM (2014) An efficient solution for hierarchical access control problem in cloud environment. Math Probl Eng He BZ, Chen CM, Wu TY, Sun HM (2014) An efficient solution for hierarchical access control problem in cloud environment. Math Probl Eng
14.
go back to reference Kamara S, Papamanthou C (2013) Parallel and dynamic searchable symmetric encryption. In: International conference on financial cryptography and data security. Springer, pp 258–274 Kamara S, Papamanthou C (2013) Parallel and dynamic searchable symmetric encryption. In: International conference on financial cryptography and data security. Springer, pp 258–274
15.
go back to reference Kamara S, Papamanthou C, Roeder T (2012) Dynamic searchable symmetric encryption. In: Proceedings of the 2012 ACM conference on Computer and communications security, pp 965–976 Kamara S, Papamanthou C, Roeder T (2012) Dynamic searchable symmetric encryption. In: Proceedings of the 2012 ACM conference on Computer and communications security, pp 965–976
16.
go back to reference Kim KS, Kim M, Lee D, Park JH, Kim WH (2017) Forward secure dynamic searchable symmetric encryption with efficient updates. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp 1449–1463 Kim KS, Kim M, Lee D, Park JH, Kim WH (2017) Forward secure dynamic searchable symmetric encryption with efficient updates. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp 1449–1463
17.
go back to reference Kumari A, Kumar V, Abbasi MY, Kumari S, Chaudhary P, Chen CM (2020) Csef: cloud-based secure and efficient framework for smart medical system using ecc. IEEE Access 8, 107,838–107,852 Kumari A, Kumar V, Abbasi MY, Kumari S, Chaudhary P, Chen CM (2020) Csef: cloud-based secure and efficient framework for smart medical system using ecc. IEEE Access 8, 107,838–107,852
18.
go back to reference Kurosawa K, Ohtaki Y (2013) How to update documents verifiably in searchable symmetric encryption. In: International conference on cryptology and network security. Springer, pp 309–328 Kurosawa K, Ohtaki Y (2013) How to update documents verifiably in searchable symmetric encryption. In: International conference on cryptology and network security. Springer, pp 309–328
19.
go back to reference Liu Q, Tian Y, Wu J, Peng T, Wang G (2019) Enabling verifiable and dynamic ranked search over outsourced data. IEEE Transactions on Services Computing Liu Q, Tian Y, Wu J, Peng T, Wang G (2019) Enabling verifiable and dynamic ranked search over outsourced data. IEEE Transactions on Services Computing
20.
go back to reference Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE symposium on security and privacy. S&P 2000. IEEE, pp 44–55 Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE symposium on security and privacy. S&P 2000. IEEE, pp 44–55
21.
go back to reference Song X, Dong C, Yuan D, Xu Q, Zhao M (2018) Forward private searchable symmetric encryption with optimized i/o efficiency. IEEE Transactions on Dependable and Secure Computing Song X, Dong C, Yuan D, Xu Q, Zhao M (2018) Forward private searchable symmetric encryption with optimized i/o efficiency. IEEE Transactions on Dependable and Secure Computing
22.
go back to reference Stefanov E, Papamanthou C, Shi E (2014) Practical dynamic searchable encryption with small leakage. In: NDSS, vol 71, pp 72–75 Stefanov E, Papamanthou C, Shi E (2014) Practical dynamic searchable encryption with small leakage. In: NDSS, vol 71, pp 72–75
23.
go back to reference Stergiou C, Psannis KE, Kim BG, Gupta B (2018) Secure integration of iot and cloud computing. Futur Gener Comput Syst 78:964–975CrossRef Stergiou C, Psannis KE, Kim BG, Gupta B (2018) Secure integration of iot and cloud computing. Futur Gener Comput Syst 78:964–975CrossRef
24.
go back to reference Sun W, Liu X, Lou W, Hou YT, Li H (2015) Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data. In: 2015 IEEE Conference on computer communications (INFOCOM). IEEE, pp 2110–2118 Sun W, Liu X, Lou W, Hou YT, Li H (2015) Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data. In: 2015 IEEE Conference on computer communications (INFOCOM). IEEE, pp 2110–2118
25.
go back to reference Sun W, Wang B, Cao N, Li M, Lou W, Hou YT, Li H (2013) Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. In: Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, pp 71–82 Sun W, Wang B, Cao N, Li M, Lou W, Hou YT, Li H (2013) Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. In: Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, pp 71–82
26.
go back to reference Tie Z, Wang EK, Yeh JH, Chen CM (2019) Forward privacy analysis of a dynamic searchable encryption scheme. In: International conference on genetic and evolutionary computing. Springer, pp 474–480 Tie Z, Wang EK, Yeh JH, Chen CM (2019) Forward privacy analysis of a dynamic searchable encryption scheme. In: International conference on genetic and evolutionary computing. Springer, pp 474–480
27.
go back to reference Wong WK, Cheung D.W.l, Kao B, Mamoulis N (2009) Secure knn computation on encrypted databases. In: Proceedings of the 2009 ACM SIGMOD International Conference on Management of data, pp 139–152 Wong WK, Cheung D.W.l, Kao B, Mamoulis N (2009) Secure knn computation on encrypted databases. In: Proceedings of the 2009 ACM SIGMOD International Conference on Management of data, pp 139–152
28.
go back to reference Wu TY, Chen CM, Wang KH, Meng C, Wang EK (2019) A provably secure certificateless public key encryption with keyword search. J Chin Inst Eng 42(1):20–28CrossRef Wu TY, Chen CM, Wang KH, Meng C, Wang EK (2019) A provably secure certificateless public key encryption with keyword search. J Chin Inst Eng 42(1):20–28CrossRef
29.
go back to reference Wu TY, Chen CM, Wang KH, Wu JMT (2019) Security analysis and enhancement of a certificateless searchable public key encryption scheme for iiot environments. IEEE Access 7, 49,232–49,239 Wu TY, Chen CM, Wang KH, Wu JMT (2019) Security analysis and enhancement of a certificateless searchable public key encryption scheme for iiot environments. IEEE Access 7, 49,232–49,239
30.
go back to reference Xiong H, Wang Y, Li W, Chen CM (2019) Flexible, efficient, and secure access delegation in cloud computing. ACM Trans Manag Inf Syst (TMIS) 10(1):1–20CrossRef Xiong H, Wang Y, Li W, Chen CM (2019) Flexible, efficient, and secure access delegation in cloud computing. ACM Trans Manag Inf Syst (TMIS) 10(1):1–20CrossRef
31.
go back to reference Yang L, Zheng Q, Fan X (2017) Rspp: a reliable, searchable and privacy-preserving e-healthcare system for cloud-assisted body area networks. In: IEEE INFOCOM 2017-IEEE Conference on computer communications. IEEE, pp 1–9 Yang L, Zheng Q, Fan X (2017) Rspp: a reliable, searchable and privacy-preserving e-healthcare system for cloud-assisted body area networks. In: IEEE INFOCOM 2017-IEEE Conference on computer communications. IEEE, pp 1–9
32.
go back to reference Yu C, Li J, Li X, Ren X, Gupta B (2018) Four-image encryption scheme based on quaternion fresnel transform, chaos and computer generated hologram. Multimed Tools Appl 77(4):4585–4608CrossRef Yu C, Li J, Li X, Ren X, Gupta B (2018) Four-image encryption scheme based on quaternion fresnel transform, chaos and computer generated hologram. Multimed Tools Appl 77(4):4585–4608CrossRef
33.
go back to reference Zhu J, Li Q, Wang C, Yuan X, Wang Q, Ren K (2018) Enabling generic, verifiable, and secure data search in cloud services. IEEE Trans Parallel Distrib Syst 29(8):1721–1735CrossRef Zhu J, Li Q, Wang C, Yuan X, Wang Q, Ren K (2018) Enabling generic, verifiable, and secure data search in cloud services. IEEE Trans Parallel Distrib Syst 29(8):1721–1735CrossRef
Metadata
Title
Verifiable dynamic ranked search with forward privacy over encrypted cloud data
Authors
Chien-Ming Chen
Zhuoyu Tie
Eric Ke Wang
Muhammad Khurram Khan
Sachin Kumar
Saru Kumari
Publication date
30-04-2021
Publisher
Springer US
Published in
Peer-to-Peer Networking and Applications / Issue 5/2021
Print ISSN: 1936-6442
Electronic ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-021-01132-3

Other articles of this Issue 5/2021

Peer-to-Peer Networking and Applications 5/2021 Go to the issue

Premium Partner