Memory Leakage-Resilient Dynamic and Verifiable Multi-Keyword Ranked Search on Encrypted Smart Body Sensor Network Data

Outsourcing of encrypted smart body sensor network data to the edge or the cloud is now an entrenched practice within organizations, for example to reduce cost and enhance productivity (to some extent), while ensuring data is not accessible to misbehaving cloud service providers. Although there are a large number of searchable symmetric encryption schemes designed to support searching operations on encrypted data, a fully functional and memory leakage-resilient scheme for smart body sensor network data is lacking. This security property is highly desirable as the resource-sharing environment may be prone to various kinds of memory leakage. In this paper, a memory leakage-resilient dynamic and verifiable multi-keyword ranked search scheme (MLR-DVMRS) on encrypted smart body sensor network data is proposed. As each sensor device has inherent characteristics to identify itself, this property can be used to authenticate the device. The proposed scheme utilizes physically unclonable functions and fuzzy extractors to achieve memory leakage-resilience. Meanwhile the vector space model, TF-IDF measure method, and order-preserving encryption, are used to achieve dynamic and multi-keyword ranked search functionalities. A formal security analysis is given to prove the security of MLR-DVMRS. Besides the comprehensive functionalities of MLR-DVMRS, experimental results demonstrate that the efficiency of MLR-DVMRS is superior to MRSE (a multi-keyword ranked search over encrypted cloud data scheme) for large data collection.

[1]  Jia Yu,et al.  Enabling efficient and verifiable multi-keyword ranked search over encrypted cloud data , 2017, Inf. Sci..

[2]  Kyriakos Mouratidis,et al.  Authenticating the query results of text search engines , 2008, Proc. VLDB Endow..

[3]  Nathan Chenette,et al.  Order-Preserving Symmetric Encryption , 2009, IACR Cryptol. ePrint Arch..

[4]  Dawn Xiaodong Song,et al.  Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[5]  Fatos Xhafa,et al.  Secure deduplication storage systems supporting keyword search , 2015, J. Comput. Syst. Sci..

[6]  P. Vishvapathi,et al.  Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data , 2022 .

[7]  Jianfeng Ma,et al.  VCKSM: Verifiable conjunctive keyword search over mobile e-health cloud in shared multi-owner settings , 2017, Pervasive Mob. Comput..

[8]  Hassan Ghasemzadeh,et al.  Multi-sensor fusion in body sensor networks: State-of-the-art and research challenges , 2017, Inf. Fusion.

[9]  Shuming Zhou,et al.  A Secure Multi-keyword Ranked Search over Encrypted Cloud Data against Memory Leakage Attack , 2018 .

[10]  Charalampos Papamanthou,et al.  Dynamic searchable symmetric encryption , 2012, IACR Cryptol. ePrint Arch..

[11]  Ruixuan Li,et al.  Efficient multi-keyword ranked query over encrypted data in cloud computing , 2014, Future Gener. Comput. Syst..

[12]  Yiwei Thomas Hou,et al.  Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[13]  Sebastian Gajek Dynamic Symmetric Searchable Encryption from Constrained Functional Encryption , 2016, CT-RSA.

[14]  Geong Sen Poh,et al.  Searchable Symmetric Encryption , 2017, ACM Comput. Surv..

[15]  Stefan Katzenbeisser,et al.  Physically Uncloneable Functions in the Universal Composition Framework , 2011, CRYPTO.

[16]  Fangguo Zhang,et al.  Memory leakage-resilient searchable symmetric encryption , 2016, Future Gener. Comput. Syst..

[17]  Nan Zhang,et al.  DMRS: an efficient dynamic multi-keyword ranked search over encrypted cloud data , 2017, Soft Comput..

[18]  Cong Wang,et al.  Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data , 2012, IEEE Transactions on Parallel and Distributed Systems.

[19]  Stephen A. Benton,et al.  Physical one-way functions , 2001 .

[20]  Cong Wang,et al.  Efficient verifiable fuzzy keyword search over encrypted data in cloud computing , 2013, Comput. Sci. Inf. Syst..

[21]  Giancarlo Fortino,et al.  A framework for collaborative computing and multi-sensor data fusion in body sensor networks , 2015, Inf. Fusion.

[22]  V. Sridhar Reddy,et al.  An Efficient Privacy-Preserving Ranked Keyword Search Method , 2018 .

[23]  Yanbin Lu,et al.  Privacy-preserving Logarithmic-time Search on Encrypted Data in Cloud , 2012, NDSS.

[24]  Fatos Xhafa,et al.  L-EncDB: A lightweight framework for privacy-preserving data queries in cloud computing , 2015, Knowl. Based Syst..

[25]  Zhihua Xia,et al.  A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data , 2016, IEEE Transactions on Parallel and Distributed Systems.

[26]  Kaoru Kurosawa,et al.  UC-Secure Searchable Symmetric Encryption , 2012, Financial Cryptography.

[27]  Cong Wang,et al.  Achieving usable and privacy-assured similarity search over outsourced cloud data , 2012, 2012 Proceedings IEEE INFOCOM.

[28]  Hugo Krawczyk,et al.  Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries , 2013, IACR Cryptol. ePrint Arch..

[29]  Indrajit Ray,et al.  Secure Multi-keyword Similarity Search Over Encrypted Cloud Data Supporting Efficient Multi-user Setup , 2016, Trans. Data Priv..

[30]  Minglu Li,et al.  Toward Secure Multikeyword Top-k Retrieval over Encrypted Cloud Data , 2013, IEEE Transactions on Dependable and Secure Computing.

[31]  Rafail Ostrovsky,et al.  Searchable symmetric encryption: Improved definitions and efficient constructions , 2011, J. Comput. Secur..

[32]  Ramakrishnan Srikant,et al.  Order preserving encryption for numeric data , 2004, SIGMOD '04.

[33]  Rafail Ostrovsky,et al.  Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..

[34]  Xingming Sun,et al.  Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement , 2016, IEEE Transactions on Parallel and Distributed Systems.

[35]  Jian Shen,et al.  Towards achieving flexible and verifiable search for outsourced database in cloud computing , 2017, Future Gener. Comput. Syst..

[36]  Yiwei Thomas Hou,et al.  Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).

[37]  Baisa L. Gunjal,et al.  Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing , 2016 .

[38]  Eu-Jin Goh,et al.  Secure Indexes , 2003, IACR Cryptol. ePrint Arch..

[39]  Cong Wang,et al.  Secure Ranked Keyword Search over Encrypted Cloud Data , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.