Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Expressive query over outsourced encrypted data

Published: 01 May 2018 Publication History
  • Get Citation Alerts
  • Abstract

    This system supports expressive search query patterns: single/conjunctive keyword queries, equality, multi-dimensional range queries, subset queries and Boolean queries.Keyword weight and preference score are set for the keyword index and query trapdoor, respectively. The cloud server computes the relevance scores in an encrypted form and returns the top-k results to data user.The system enables the data owner to define authorization period to control the user authorization and revocation.The system enables a data user to use a single query trapdoor to search over encrypted documents from multiple data owners.The search result in this system is in ciphertext form and only the authorized data user is able to decrypt the result, which prevents the off-line KG attack. Data security and privacy concerns in cloud storage services compel data owners to encrypt their sensitive data before outsourcing. Standard encryption systems, however, hinder users from issuing search queries on encrypted data. Though various systems for search over encrypted data have been proposed in the literature, existing systems use different encrypted index structures to conduct search on different search query patterns and hence are not compatible with each other. In this paper, we propose a query over encrypted data system which supports expressive search query patterns, such as single/conjunctive keyword query, range query, boolean query and mixed boolean query, all using a single encrypted index structure. To the best of our knowledge, the proposed system enables the most expressive query pattern search among all the existing solutions. In addition, the system allows data users to simultaneously query over encrypted documents from multiple data owners using one query trapdoor and supports flexible user authorization and revocation. We show that our system is secure and resists keyword guessing attack. We also conduct extensive experiments and demonstrate that the system is more efficient than other public key searchable encryption systems.

    References

    [1]
    E. Barker, W. Barker, W. Burr, W. Polk, M. Smid, NIST special publication 800-57, NIST Special Publication, 800 (2007) 1-142.
    [2]
    B.H. Bloom, Space/time trade-offs in hash coding with allowable errors, Commun. ACM, 13 (1970) 422-426.
    [3]
    D. Boneh, G. Di Crescenzo, R. Ostrovsky, Public key encryption with keyword search, Springer Berlin Heidelberg, 2004.
    [4]
    D. Boneh, B. Waters, Conjunctive, subset, and range queries on encrypted data, Springer Berlin Heidelberg, 2007.
    [5]
    E. Bresson, D. Catalano, D. Pointcheval, A simple public-key cryptosystem with a double trapdoor decryption mechanism and its applications, Springer Berlin Heidelberg, 2003.
    [6]
    J.W. Byun, H.S. Rhee, H.A. Park, Off-line keyword guessing attacks on recent keyword search schemes over encrypted data, Springer Berlin Heidelberg, 2006.
    [7]
    D. Cash, S. Jarecki, C. Jutla, Highly-scalable searchable symmetric encryption with support for boolean queries, Springer Berlin Heidelberg, 2013.
    [8]
    R. Chen, Y. Mu, G. Yang, F. Guo, X. Wang, Dual-server public-key encryption with keyword search for secure cloud storage, IEEE Trans. Inf. Forensics Secur., 11 (2016) 789-798.
    [9]
    Q. Do, B. Martini, K.K.R. Choo, A forensically sound adversary model for mobile devices, PloS One, 10 (2015) e0138449.
    [10]
    B. Hore, S. Mehrotra, M. Canim, Secure multidimensional range queries over outsourced data, VLDB J. Int. J. Very Larg. Data Bases, 21 (2012) 333-358.
    [11]
    M.S. Hwang, S.T. Hsu, C.C. Lee, A new public key encryption with conjunctive field keyword search scheme, Inf. Technol. Control, 43 (2014) 277-288.
    [12]
    S. Kamara, P. Mohassel, M. Raykova, Outsourcing multi-party computation, IACR Cryptol., 2011 (2011) 272.
    [13]
    D. Catalano, D. Fiore, Boosting linearly-homomorphic encryption to evaluate degree-2 functions on encrypted data, IACR Cryptol., 2014, {Online}. Available: http://eprint.iacr.org/2014/813.
    [14]
    H. Li, Y. Yang, T.H. Luan, Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data, IEEE Trans. Dependable Secur. Comput., 13 (2016) 312-325.
    [15]
    Q. Liu, G. Wang, J. Wu, Secure and privacy preserving keyword searching for cloud storage services, J. Netw. Comput. Appl., 35 (2012) 927-933.
    [16]
    X. Liu, B. Qin, R. Deng, An efficient privacy-preserving outsourced computation over public data, IEEE Trans. Serv. Comput. (2015).
    [17]
    X. Liu, R. Lu, J. Ma, Privacy-preserving patient-centric clinical decision support system on naive Bayesian classification, IEEE J. Biomed. Health Inf., 20 (2016) 655-668.
    [18]
    X. Liu, R.H. Deng, K.K.R. Choo, An efficient privacy-preserving outsourced calculation toolkit with multiple keys, IEEE Trans. Inf. Forensics Secur., 11 (2016) 2401-2414.
    [19]
    X. Liu, R.H. Deng, W. Ding, Privacy-preserving outsourced calculation on floating point numbers, IEEE Trans. Inf. Forensics Secur., 11 (2016) 2513-2527.
    [20]
    X. Liu, R. Choo, R. Deng, Efficient and privacy-preserving outsourced calculation of rational numbers, IEEE Trans. Dependable Secur. Comput. (2016).
    [21]
    T. Moataz, A. Shikfa, Boolean symmetric searchable encryption, ACM, 2013.
    [22]
    Y. Ohtaki, Partial disclosure of searchable encrypted data with support for boolean queries, IEEE, 2008.
    [23]
    A. Peter, E. Tews, S. Katzenbeisser, Efficiently outsourcing multiparty computation under multiple keys, IEEE Trans. Inf. Forensics Secur., 8 (2013) 2046-2058.
    [24]
    P. Paillier, Public-key cryptosystems based on composite degree residuosity classes, Springer Berlin Heidelberg, 1999.
    [25]
    E. Shi, J. Bethencourt, T.H.H. Chan, Multi-dimensional range query over encrypted data, IEEE, 2007.
    [26]
    B. Wang, Y. Hou, M. Li, Maple: scalable multi-dimensional range search over encrypted cloud data with tree-based index, ACM, 2014.
    [27]
    B. Wang, X. Fan, Search ranges efficiently and compatibly as keywords over encrypted data, IEEE Trans. Dependable Secur. Comput. (2016).
    [28]
    M. Wen, R. Lu, K. Zhang, PaRQ: a privacy-preserving range query scheme over encrypted metering data for smart grid, IEEE Trans. Emerg. Top. Comput., 1 (2013) 178-191.
    [29]
    Y. Yang, X. Zheng, C. Tang, Lightweight distributed secure data management system for health internet of things, J. Netw. Comput. Appl. (2016).
    [30]
    Y. Yang, M. Ma, Semantic searchable encryption scheme based on lattice in quantum-era, J. Inf. Sci. Eng., 32 (2016) 425-438.
    [31]
    Y. Yang, M. Ma, Conjunctive keyword search with designated tester and timing enabled proxy re-encryption function for e-health clouds, IEEE Trans. Inf. Forensics Secur., 11 (2016) 746-759.
    [32]
    W.C. Yau, S.H. Heng, B.M. Goi, Off-line keyword guessing attacks on recent public key encryption with keyword search schemes, Springer Berlin Heidelberg, 2008.
    [33]
    Q. Zheng, S. Xu, G. Ateniese, VABKS: verifiable attribute-based keyword search over outsourced encrypted data, IEEE, 2014.

    Cited By

    View all

    Index Terms

    1. Expressive query over outsourced encrypted data
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Information & Contributors

          Information

          Published In

          cover image Information Sciences: an International Journal
          Information Sciences: an International Journal  Volume 442, Issue C
          May 2018
          235 pages

          Publisher

          Elsevier Science Inc.

          United States

          Publication History

          Published: 01 May 2018

          Author Tags

          1. Boolean search
          2. Multiple users
          3. Query over encrypted data
          4. Range search
          5. Subset search

          Qualifiers

          • Research-article

          Contributors

          Other Metrics

          Bibliometrics & Citations

          Bibliometrics

          Article Metrics

          • Downloads (Last 12 months)0
          • Downloads (Last 6 weeks)0
          Reflects downloads up to

          Other Metrics

          Citations

          Cited By

          View all
          • (2023)Privacy-Preserving Multi-User Outsourced Computation for Boolean CircuitsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.330173418(4929-4943)Online publication date: 1-Jan-2023
          • (2021)Tree-Based Public Key Encryption with Conjunctive Keyword SearchSecurity and Communication Networks10.1155/2021/70349442021Online publication date: 5-Nov-2021
          • (2021)OIDPRTransactions on Emerging Telecommunications Technologies10.1002/ett.395332:5Online publication date: 7-May-2021
          • (2020)PGASInformation Sciences: an International Journal10.1016/j.ins.2019.07.082506:C(325-345)Online publication date: 1-Jan-2020

          View Options

          View options

          Get Access

          Login options

          Media

          Figures

          Other

          Tables

          Share

          Share

          Share this Publication link

          Share on social media