Verifiable ranked search over encrypted data with forward and backward privacy

Abstract The more growing discovery of cloud computing capabilities, the more likely researchers are to make progress in this field. The ability to search over the encrypted data is one of the prerequisites for cloud computing. A large number of data owners all over the world are interested in outsourcing data to the cloud, being concerned about protecting the data privacy. The method presented in this paper includes several functionalities which have never been simultaneously available in any other searchable encryption scheme. The proposed scheme is a dynamic scheme in which data update does not leak information from outsourced data or search keywords. In this model, the cloud server is assumed to be malicious and in such circumstances it is possible to verify the search results by data user. In addition to searching with multiple keywords, the user receives the ranked search results as well. The performance analysis of proposed scheme shows that despite the added functionality, its efficiency is reasonable.

[1]  Xingming Sun,et al.  Enabling Semantic Search Based on Conceptual Graphs over Encrypted Outsourced Data , 2019, IEEE Transactions on Services Computing.

[2]  Dawn Xiaodong Song,et al.  Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[3]  Yiwei Thomas Hou,et al.  Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).

[4]  Nikos Mamoulis,et al.  Secure kNN computation on encrypted databases , 2009, SIGMOD Conference.

[5]  S. Sree Vivek,et al.  Dynamic Verifiable Encrypted Keyword Search , 2017, 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud).

[6]  Raphael Bost,et al.  ∑oφoς: Forward Secure Searchable Encryption , 2016, CCS.

[7]  Yi Yang,et al.  Enabling Fine-Grained Multi-Keyword Search Supporting Classified Sub-Dictionaries over Encrypted Cloud Data , 2016, IEEE Transactions on Dependable and Secure Computing.

[8]  Brice Minaud,et al.  Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives , 2017, CCS.

[9]  Stefanos Gritzalis,et al.  ORAM Based Forward Privacy Preserving Dynamic Searchable Symmetric Encryption Schemes , 2015, CCSW '15.

[10]  Rafail Ostrovsky,et al.  Searchable symmetric encryption: Improved definitions and efficient constructions , 2011, J. Comput. Secur..

[11]  Xiao Wei Li,et al.  Dynamic searchable encryption with privacy protection for cloud computing , 2018, Int. J. Commun. Syst..

[12]  Elaine Shi,et al.  Practical Dynamic Searchable Encryption with Small Leakage , 2014, NDSS.

[13]  Chunxiang Xu,et al.  A dynamic and non-interactive boolean searchable symmetric encryption in multi-client setting , 2018, J. Inf. Secur. Appl..

[14]  Nan Zhang,et al.  DMRS: an efficient dynamic multi-keyword ranked search over encrypted cloud data , 2017, Soft Comput..

[15]  Zhangjie Fu,et al.  Enabling Central Keyword-Based Semantic Extension Search Over Encrypted Outsourced Data , 2017, IEEE Transactions on Information Forensics and Security.

[16]  S. Sree Vivek,et al.  Dynamic Verifiable Encrypted Keyword Search Using Bitmap Index and Homomorphic MAC , 2017, CSCloud.

[17]  Xingming Sun,et al.  Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement , 2016, IEEE Transactions on Parallel and Distributed Systems.

[18]  Guang Gong,et al.  Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers , 2012, 2012 IEEE International Conference on Communications (ICC).

[19]  Tal Malkin,et al.  Malicious-Client Security in Blind Seer: A Scalable Private DBMS , 2015, 2015 IEEE Symposium on Security and Privacy.

[20]  Brent Waters,et al.  Secure Conjunctive Keyword Search over Encrypted Data , 2004, ACNS.

[21]  Tarik Moataz,et al.  Boolean symmetric searchable encryption , 2013, ASIA CCS '13.

[22]  Yiwei Thomas Hou,et al.  Privacy-Preserving Keyword Search Over Encrypted Data in Cloud Computing , 2014, Secure Cloud Computing.

[23]  Zhihua Xia,et al.  A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data , 2016, IEEE Transactions on Parallel and Distributed Systems.

[24]  Cong Wang,et al.  Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data , 2014 .

[25]  Peishun Wang,et al.  Keyword Field-Free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic Groups , 2008, CANS.

[26]  Charalampos Papamanthou,et al.  Parallel and Dynamic Searchable Symmetric Encryption , 2013, Financial Cryptography.

[27]  Kaoru Kurosawa,et al.  UC-Secure Searchable Symmetric Encryption , 2012, Financial Cryptography.

[28]  Hugo Krawczyk,et al.  Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries , 2013, IACR Cryptol. ePrint Arch..

[29]  Seny Kamara,et al.  Boolean Searchable Symmetric Encryption with Worst-Case Sub-linear Complexity , 2017, EUROCRYPT.

[30]  Dong Hoon Lee,et al.  Off-Line Keyword Guessing Attacks on Recent Keyword Search Schemes over Encrypted Data , 2006, Secure Data Management.

[31]  David Pointcheval,et al.  Verifiable Dynamic Symmetric Searchable Encryption: Optimality and Forward Security , 2016, IACR Cryptol. ePrint Arch..

[32]  Charalampos Papamanthou,et al.  Dynamic searchable symmetric encryption , 2012, IACR Cryptol. ePrint Arch..

[33]  Rafail Ostrovsky,et al.  Private Large-Scale Databases with Distributed Searchable Symmetric Encryption , 2016, CT-RSA.

[34]  Jonathan Katz,et al.  All Your Queries Are Belong to Us: The Power of File-Injection Attacks on Searchable Encryption , 2016, USENIX Security Symposium.

[35]  Jia Yu,et al.  Enabling efficient and verifiable multi-keyword ranked search over encrypted cloud data , 2017, Inf. Sci..

[36]  Ming Li,et al.  Verifiable Privacy-Preserving Multi-Keyword Text Search in the Cloud Supporting Similarity-Based Ranking , 2013, IEEE Transactions on Parallel and Distributed Systems.

[37]  Changyu Dong,et al.  Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency , 2017, IEEE Transactions on Dependable and Secure Computing.