Abstract
With the development of big data and cloud computing, more and more data owners store their data with encrypted form in the cloud server. To retrieve some data they are interested in, an important technology called searchable encryption can be adopted. Sometimes, the encrypted data are desired to be shared to some users by the data owners without destroying the user privacy. To address this problem, many works of delegated searchable encryption (DSE) have been studied. However, in the existing DSE schemes, the delegated users can make keyword search over the encrypted data without any restrictions. In some systems such as E-health record system in which the data are sensitive, it is desired that the delegated users can only make search with some specified keywords designated by the data owners. In this work, we present an efficient solution to this problem and give a concrete construction. Then we show that our construction is efficient and practical for real applications by experimental results.



Similar content being viewed by others
References
Riad, K., Hamza, R., & Yan, H. (2019). Sensitive and energetic IoT access control for managing cloud electronic health records. IEEE Access, 7, 86384–86393.
Xu, X., He, C., Xu, Z., Qi, L., Wan, S., & Bhuiyan, M. Z. A. (2020). Joint optimization of offloading utility and privacy for edge computing enabled IoT. IEEE Internet of Things Journal, 7(4), 2622–2629.
Xu, X., Zhang, X., Gao, H., Xue, Y., Qi, L., & Dou, W. (2020). Become: Blockchain-enabled computation offloading for IoT in mobile edge computing. IEEE Transactions on Industrial Informatics, 16(6), 4187–4195.
Xiaolong, X., Liu, Q., Zhang, X., Zhang, J., Qi, L., & Dou, W. (2019). A blockchain-powered crowdsourcing method with privacy preservation in mobile environment. IEEE Transactions on Computational Social Systems, 6(6), 1407–1419.
Hassan, A., Hamza, R., Yan, H., & Li, P. (2019). An efficient outsourced privacy preserving machine learning scheme with public verifiability. IEEE Access, 7, 146322–146330.
Qi, L., Chen, Y., Yuan, Y., Fu, S., Zhang, X., & Xu, X. (2019). A QoS-aware virtual machine scheduling method for energy conservation in cloud-based cyber-physical systems. World Wide Web (pp. 1–23).
Hamza, R., Hassan, A., Huang, T., Ke, L., & Yan, H. (2019). An efficient cryptosystem for video surveillance in the internet of things environment. Complexity, 2019, 1–11. https://doi.org/10.1155/2019/1625678.
Jiang, L., Li, T., Li, X., Atiquzzaman, M., Ahmad, H., & Wang, X. (2018). Anonymous communication via anonymous identity-based encryption and its application in IoT. Wireless Communications and Mobile Computing, 2018, 1–8. https://doi.org/10.1155/2018/6809796.
Song, D. X., Wagner, D., & Perrig, A. (2000). Practical techniques for searches on encrypted data. In Proceeding 2000 IEEE symposium on security and privacy. S&P 2000 (pp. 44–55). IEEE.
Kamara, S., Papamanthou, C., & Roeder, T. (2012). Dynamic searchable symmetric encryption. In Proceedings of the 2012 ACM conference on computer and communications security (pp. 965–976).
Kamara, S., & Papamanthou, C. (2013). Parallel and dynamic searchable symmetric encryption. In International conference on financial cryptography and data security (pp. 258–274). Berlin: Springer.
Stefanov, E., Papamanthou, C., & Shi, E. (2014). Practical dynamic searchable encryption with small leakage. NDSS, 71, 72–75.
Hahn, F., & Kerschbaum, F. (2014). Searchable encryption with secure and efficient updates. In Proceedings of the 2014 ACM SIGSAC conference on computer and communications security (pp. 310–320).
Cash, D., & Tessaro, S. (2014). The locality of searchable symmetric encryption. In Annual international conference on the theory and applications of cryptographic techniques (pp. 351–368). Berlin: Springer.
Qi, L., He, Q., Chen, F., Dou, W., Wan, S., Zhang, X., et al. (2019). Finding all you need: web apis recommendation in web of things through keywords search. IEEE Transactions on Computational Social Systems, 6(5), 1063–1072.
Hwang, M.-S., Hsu, S.-T., & Lee, C.-C. (2014). A new public key encryption with conjunctive field keyword search scheme. Information Technology and Control, 43(3), 277–288.
Ding, M., Gao, F., Jin, Z., & Zhang, H. (2012). An efficient public key encryption with conjunctive keyword search scheme based on pairings. In 2012 3rd IEEE international conference on network infrastructure and digital content (pp. 526–530). IEEE.
Boneh, D., & Waters, B. (2007). Conjunctive, subset, and range queries on encrypted data. In Theory of cryptography conference (pp. 535–554). Berlin: Springer.
Zhang, B., & Zhang, F. (2011). An efficient public key encryption with conjunctive-subset keywords search. Journal of Network and Computer Applications, 34(1), 262–267.
Fang, L., Susilo, W., Ge, C., & Wang, J. (2012). Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search. Theoretical Computer Science, 462, 39–58.
Camenisch, J., Kohlweiss, M., Rial, A., & Sheedy, C. (2009). Blind and anonymous identity-based encryption and authorised private searches on public key encrypted data. In International workshop on public key cryptography (pp. 196–214). Berlin: Springer.
Hamlin, A., Shelat, A., Weiss, M., & Wichs, D. (2018). Multi-key searchable encryption, revisited. In IACR international workshop on public key cryptography (pp. 95–124). Berlin: Springer.
Li, H., Liu, D., Dai, Y., Luan, T. H., & Yu, S. (2015). Personalized search over encrypted data with efficient and secure updates in mobile clouds. IEEE Transactions on Emerging Topics in Computing, 6(1), 97–109.
Liang, K., & Susilo, W. (2015). Searchable attribute-based mechanism with efficient data sharing for secure cloud storage. IEEE Transactions on Information Forensics and Security, 10(9), 1981–1992.
Li, M., Yu, S., Cao, N., & Lou, W. (2011). Authorized private keyword search over encrypted data in cloud computing. In 2011 31st international conference on distributed computing systems (pp. 383–392). IEEE.
Miao, Y., Ma, J., Liu, X., Wei, F., Liu, Z., & Wang, X. A. (2016). m 2-abks: Attribute-based multi-keyword search over encrypted personal health records in multi-owner setting. Journal of Medical Systems, 40(11), 246.
Shao, J., Cao, Z., Liang, X., & Lin, H. (2010). Proxy re-encryption with keyword search. Information Sciences, 180(13), 2576–2587.
Shi, J., Lai, J., Li, Y., Deng, R. H., & Weng, J. (2014). Authorized keyword search on encrypted data. In European symposium on research in computer security (pp. 419–435). Berlin: Springer.
Sun, W., Shucheng, Y., Lou, W., Thomas Hou, Y., & Li, H. (2014). Protecting your right: Verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. IEEE Transactions on Parallel and Distributed Systems, 27(4), 1187–1198.
Tang, Q. (2014). Nothing is for free: Security in searching shared and encrypted data. IEEE Transactions on Information Forensics and Security, 9(11), 1943–1952.
An, W. X., Huang, X., Yang, X., Liu, L., & Xuguang, W. (2012). Further observation on proxy re-encryption with keyword search. Journal of Systems and Software, 85(3), 643–654.
Yang, Y., & Ma, M. (2015). Conjunctive keyword search with designated tester and timing enabled proxy re-encryption function for e-health clouds. IEEE Transactions on Information Forensics and Security, 11(4), 746–759.
Zheng, Q., Xu, S., & Ateniese, G. (2014). VABKS: Verifiable attribute-based keyword search over outsourced encrypted data. In IEEE INFOCOM 2014-IEEE conference on computer communications (pp. 522–530). IEEE.
Lee, C.-C., Li, C.-T., Chen, C.-L., & Chiu, S.-T. (2016). A searchable hierarchical conditional proxy re-encryption scheme for cloud storage services. Information Technology and Control, 45(3), 289–299.
Shi, Y., Liu, J., Han, Z., Zheng, Q., Zhang, R., & Qiu, S. (2014). Attribute-based proxy re-encryption with keyword search. PloS ONE, 9(12), e116325.
Boneh, D., & Franklin, M. (2001). Identity-based encryption from the Weil pairing. In Annual international cryptology conference (pp. 213–229). Berlin: Springer.
Gentry, C. (2006). Practical identity-based encryption without random oracles. In Annual international conference on the theory and applications of cryptographic techniques (pp. 445–464). Berlin: Springer.
Lynn, B. (2006). Pbc library manual 0.5. 11.
Acknowledgements
This work is supported by the Natural Science Foundation of Guangdong Province of China (No. 2018A030313957) and the Science and Technology Innovation Projects of Shenzhen (Nos. JCYJ20190809152003992, JCYJ20170818-140234295, JCYJ20170818144026871).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Xu, L., Sun, Z., Li, W. et al. Delegatable searchable encryption with specified keywords for EHR systems. Wireless Netw 30, 3547–3559 (2024). https://doi.org/10.1007/s11276-020-02410-3
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11276-020-02410-3