Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

Dynamic Verifiable Encrypted Keyword Search

Published: 01 September 2018 Publication History

Abstract

Outsourcing data storage to the cloud securely and retrieving the remote data in an efficient way is a very significant research topic, with high relevance to secure cloud deployment. With the ever growing security and privacy concerns, encrypting the data stored remotely is inevitable but using traditional encryption thwarts performing search operation on the encrypted data. Encrypted keyword search is a cryptographic setting, which offers search functionality and at the same time, ensures security and privacy of the remotely stored secured data. Searchable Symmetric Encryption (SSE) is a technique to securely outsource the data, which is encrypted using symmetric key primitives, while maintaining search functionality. In this paper, we consider Searchable Symmetric Encryption (SSE) in the presence of a Semi-Honest-But-Curious Cloud Service Provider (SHBC-CSP) and, defined a new security notion for SSE in presence of SHBC-CSP, contrived two new SSE schemes and proved their security formally in the proposed security notion. The dynamic verifiable encrypted keyword search proposed in this paper is the first SSE scheme to the best of our knowledge, which is both dynamic and verifiable. As an initial step, we have designed a verifiable encrypted keyword search solution and later, we have extended the research to make it both dynamic and verifiable. Also, we compare the performance metrics of our schemes with other existing schemes.

References

[1]
Song, D. X. et al. (2000). Practical techniques for searches on encrypted data. IEEE Symposium on Security and Privacy, 44---55.
[2]
Curtmola, R et al. (2006). Searchable symmetric encryption: improved definitions and efficient constructions. In Proceedings of the 13th ACM conference on computer and communications security, CCS 2006 (pp. 79---88).
[3]
Kamara, S et al. (2012). Dynamic searchable symmetric encryption. ACM Conference on Computer and Communications Security, 965---976.
[4]
Hwang, Y H et al. (2013). Encrypted keyword search with cryptographically constant overheads. Samsung Best Paper Award.
[5]
Hwang, Y H et al. (2014). Encrypted keyword search mechanism based on bitmap index for personal storage services. In 13th IEEE international conference on trust, security and privacy in computing and communications (pp. 140---147).
[6]
Wang, C et al. (2012). Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Transactions on Parallel and Distributed Systems, 1467---1479.
[7]
Zheng, Q et al. (2014). VABKS: verifiable attribute-based keyword search over outsourced encrypted data. IEEE Conference on Computer Communications, 522---530.
[8]
Qiu, M. (2013). Security-aware optimization for ubiquitous computing systems with SEAT graph approach. Journal of Computer and System Sciences, 518---529.
[9]
Qiu, M. (2016). Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry. Future Generation Computer Systems.
[10]
Chai, Q et al. (2012). Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers. In Proceedings of IEEE international conference on communications ICC (pp. 917---922).
[11]
Kamara, S. (2015). Encrypted search. ACM Crossroads, 30---34.
[12]
Kamara, S et al. (2013). Parallel and dynamic searchable symmetric encryption, financial cryptography and data security. In 17th International conference, fc 2013 (pp. 258---274).
[13]
Chang, Y.-C. et al. (2004). Privacy preserving keyword searches on remote encrypted data. IACR Cryptology ePrint Archive, 51.
[14]
Goh, E.-J. (2003). Secure Indexes, IACR Cryptology ePrint Archive 216.
[15]
Bösch, C et al. (2014). A survey of provably secure searchable encryption. ACM Computing Surveys, 18, 1---18:51.
[16]
Paillier, P. (1999). Public-key cryptosystems based on composite degree residuosity classes. Advances in Cryptology - EUROCRYPT, 223---238.

Cited By

View all
  • (2021)Efficient and dynamic verifiable multi-keyword searchable symmetric encryption with full securityMultimedia Tools and Applications10.1007/s11042-021-10844-w80:17(26049-26068)Online publication date: 1-Jul-2021
  1. Dynamic Verifiable Encrypted Keyword Search

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image Journal of Signal Processing Systems
      Journal of Signal Processing Systems  Volume 90, Issue 8-9
      September 2018
      194 pages
      ISSN:1939-8018
      EISSN:1939-8115
      Issue’s Table of Contents

      Publisher

      Kluwer Academic Publishers

      United States

      Publication History

      Published: 01 September 2018

      Author Tags

      1. Dynamic and verifiable encrypted keyword search
      2. Encrypted keyword search
      3. Homomorphic tag
      4. Random oracle model
      5. Search on protected or encrypted data
      6. Searchable encryption
      7. Symmetric searchable encryption

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 03 Mar 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2021)Efficient and dynamic verifiable multi-keyword searchable symmetric encryption with full securityMultimedia Tools and Applications10.1007/s11042-021-10844-w80:17(26049-26068)Online publication date: 1-Jul-2021

      View Options

      View options

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media