Enabling verifiable multiple keywords search over encrypted cloud data

Abstract Searchable Encryption (SE) enables a user to search over encrypted data, such as data stored in a remote cloud server. Existing certificate-, identity-, and attribute-based SE schemes suffer from certificate management or key escrow limitations. Furthermore, the semi-honest-but-curious cloud may conduct partial search operations and return a fraction of the search results (i.e., incomplete results) in order to reduce costs. In this paper, we present a secure cryptographic primitive, Verifiable Multiple Keywords Search (VMKS) over ciphertexts, which leverages the Identity-Based Encryption (IBE) and certificateless signature techniques. The VMKS scheme allows the user to verify the correctness of search results and avoids both certificate management or key escrow limitations. We then demonstrate the security of proposed VMKS scheme (i.e., the scheme achieves both ciphertext indistinguishability and signature unforgeability). We also use a real-world dataset to evaluate its feasibility and efficiency.

[1]  Guang Gong,et al.  Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers , 2012, 2012 IEEE International Conference on Communications (ICC).

[2]  Jian Shen,et al.  Secure Authentication in Cloud Big Data with Hierarchical Attribute Authorization Structure , 2017, IEEE Transactions on Big Data.

[3]  Gwoboa Horng,et al.  Certificateless Signatures: Structural Extensions of Security Models and New Provably Secure Schemes , 2013, IACR Cryptol. ePrint Arch..

[4]  Yiwei Thomas Hou,et al.  Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud , 2016, IEEE Transactions on Parallel and Distributed Systems.

[5]  Jianfeng Ma,et al.  VCKSM: Verifiable conjunctive keyword search over mobile e-health cloud in shared multi-owner settings , 2017, Pervasive Mob. Comput..

[6]  Jiguo Li,et al.  Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing , 2017, IEEE Transactions on Services Computing.

[7]  Cong Wang,et al.  Efficient verifiable fuzzy keyword search over encrypted data in cloud computing , 2013, Comput. Sci. Inf. Syst..

[8]  Yi Mu,et al.  Secure Channel Free ID-Based Searchable Encryption for Peer-to-Peer Group , 2016, Journal of Computer Science and Technology.

[9]  Xuemin Shen,et al.  Enabling Efficient Multi-Keyword Ranked Search Over Encrypted Mobile Cloud Data Through Blind Storage , 2015, IEEE Transactions on Emerging Topics in Computing.

[10]  Fuchun Guo,et al.  Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage , 2016, IEEE Transactions on Information Forensics and Security.

[11]  Kaoru Kurosawa,et al.  How to Construct UC-Secure Searchable Symmetric Encryption Scheme , 2015, IACR Cryptol. ePrint Arch..

[12]  Dawn Xiaodong Song,et al.  Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[13]  Cong Wang,et al.  Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.

[14]  Kaoru Kurosawa Garbled Searchable Symmetric Encryption , 2014, Financial Cryptography.

[15]  Jiguo Li,et al.  KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage , 2017, IEEE Transactions on Services Computing.

[16]  Kaoru Kurosawa,et al.  How to Update Documents Verifiably in Searchable Symmetric Encryption , 2013, CANS.

[17]  Jian Shen,et al.  An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data , 2017, IEEE Transactions on Information Forensics and Security.

[18]  Geong Sen Poh,et al.  Searchable Symmetric Encryption , 2017, ACM Comput. Surv..

[19]  Fenghua Li,et al.  Certificateless public auditing for data integrity in the cloud , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).

[20]  Yi Yang,et al.  Enabling Fine-Grained Multi-Keyword Search Supporting Classified Sub-Dictionaries over Encrypted Cloud Data , 2016, IEEE Transactions on Dependable and Secure Computing.

[21]  Jianfeng Ma,et al.  Attribute-Based Keyword Search over Hierarchical Data in Cloud Computing , 2020, IEEE Transactions on Services Computing.

[22]  Kenli Li,et al.  A multi-user searchable encryption scheme with keyword authorization in a cloud storage , 2017, Future Gener. Comput. Syst..

[23]  Baoyuan Kang,et al.  Certificateless Public Auditing with Privacy Preserving for Cloud-Assisted Wireless Body Area Networks , 2017, Mob. Inf. Syst..

[24]  Shaoen Wu,et al.  Dynamic Trust Relationships Aware Data Privacy Protection in Mobile Crowd-Sensing , 2018, IEEE Internet of Things Journal.

[25]  Jianfeng Ma,et al.  Practical Attribute-Based Multi-Keyword Search Scheme in Mobile Crowdsourcing , 2018, IEEE Internet of Things Journal.

[26]  Aytac Azgin,et al.  CLKS: Certificateless Keyword Search on Encrypted Data , 2015, NSS.

[27]  Rafail Ostrovsky,et al.  Public Key Encryption with Keyword Search , 2004, EUROCRYPT.

[28]  Hongwei Li,et al.  Engineering searchable encryption of mobile cloud networks: when QoE meets QoP , 2015, IEEE Wireless Communications.

[29]  Maode Ma,et al.  Conjunctive Keyword Search With Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds , 2016, IEEE Transactions on Information Forensics and Security.

[30]  Yiwei Thomas Hou,et al.  Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).

[31]  Jie Wu,et al.  Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing , 2016, IEEE Transactions on Computers.

[32]  Junjie Yan,et al.  Social Attribute Aware Incentive Mechanism for Device-to-Device Video Distribution , 2017, IEEE Transactions on Multimedia.

[33]  Fuchun Guo,et al.  A New General Framework for Secure Public Key Encryption with Keyword Search , 2015, ACISP.

[34]  Jianfeng Ma,et al.  Revocable and anonymous searchable encryption in multi‐user setting , 2016, Concurr. Comput. Pract. Exp..

[35]  Jian Shen,et al.  User Collusion Avoidance CP-ABE With Efficient Attribute Revocation for Cloud Storage , 2018, IEEE Systems Journal.

[36]  Shouhuai Xu,et al.  VABKS: Verifiable attribute-based keyword search over outsourced encrypted data , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[37]  Jianfeng Ma,et al.  Lightweight Fine-Grained Search Over Encrypted Data in Fog Computing , 2019, IEEE Transactions on Services Computing.

[38]  Fuchun Guo,et al.  Server-Aided Public Key Encryption With Keyword Search , 2016, IEEE Transactions on Information Forensics and Security.

[39]  Yuan-Shun Dai,et al.  Personalized Search Over Encrypted Data With Efficient and Secure Updates in Mobile Clouds , 2018, IEEE Transactions on Emerging Topics in Computing.

[40]  Honggang Wang,et al.  Socially Aware Energy-Efficient Mobile Edge Collaboration for Video Distribution , 2017, IEEE Transactions on Multimedia.

[41]  Jiguo Li,et al.  Searchable ciphertext‐policy attribute‐based encryption with revocation in cloud storage , 2017, Int. J. Commun. Syst..

[42]  Ling Liu,et al.  Oblivious Multi-Keyword Search for Secure Cloud Storage Service , 2017, 2017 IEEE International Conference on Web Services (ICWS).

[43]  Ming Li,et al.  Verifiable Privacy-Preserving Multi-Keyword Text Search in the Cloud Supporting Similarity-Based Ranking , 2014, IEEE Trans. Parallel Distributed Syst..