Skip to main content

A Blockchain Based Searchable Encryption Scheme for Multiple Cloud Storage

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11982))

Abstract

Searchable encryption is a necessary and important service for cloud storage since it can realize the function of information retrieval on encrypted cloud data while protecting privacy. However, the typical searchable encryption models consisting of only a single cloud service provider can not prevent malicious behavior. In this paper, a new searchable encryption scheme in multi-cloud was proposed based on blockchain. We first define a system model based blockchain in multiple clouds and combine multiple cloud service providers together to store data together through a consortium chain. And then we store the encrypted document and document index in the IPFS, at the same time the hash value of the documents and the IPFS address of the document are stored in blockchains. Our scheme can provide a sorting retrieval scheme based on multi-keywords over the outsourced encrypted data and a validation scheme to detect file integrity. The theoretical analysis and experiments on real-world data show the security and high performance of our scheme.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Benet, J.: IPFS-content addressed, versioned, P2P file system. arXiv preprint arXiv:1407.3561 (2014)

  2. Bessani, A., Correia, M., Quaresma, B., André, F., Sousa, P.: DEPSKY: dependable and secure storage in a cloud-of-clouds. ACM Trans. Storage (TOS) 9(4), 12 (2013)

    Google Scholar 

  3. Chai, Q., Gong, G.: Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers. In: 2012 IEEE International Conference on Communications (ICC), pp. 917–922. IEEE (2012)

    Google Scholar 

  4. Do, H.G., Ng, W.K.: Blockchain-based system for secure data storage with private keyword search. In: 2017 IEEE World Congress on Services (SERVICES), pp. 90–93. IEEE (2017)

    Google Scholar 

  5. Fu, Z., Ren, K., Shu, J., Sun, X., Huang, F.: Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parallel Distrib. Syst. 27(9), 2546–2559 (2016)

    Article  Google Scholar 

  6. Fu, Z., Wu, X., Guan, C., Sun, X., Ren, K.: Towards efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Trans. Inf. Forensics Secur. 11(12), 2706–2716 (2017)

    Article  Google Scholar 

  7. Gunasundari, R.: Cloud computing security from single to multi-clouds. In: Hawaii International Conference on System Sciences (2012)

    Google Scholar 

  8. Guo, R., Shi, H., Zhao, Q., Zheng, D.: Secure attribute-based signature scheme with multiple authorities for blockchain in electronic health records systems. IEEE Access 6, 11676–11686 (2018)

    Article  Google Scholar 

  9. Huang, H., Chen, X., Wu, Q., Huang, X., Shen, J.: Bitcoin-based fair payments for outsourcing computations of fog devices. Future Gener. Comput. Syst. 78, 850–858 (2018)

    Article  Google Scholar 

  10. Li, H., Zhang, F., He, J., Tian, H.: A searchable symmetric encryption scheme using blockchain. arXiv preprint arXiv:1711.01030 (2017)

  11. Li, J., Huang, Y., Wei, Y., Lv, S., Lou, W.: Searchable symmetric encryption with forward search privacy. IEEE Trans. Dependable Secur. Comput. PP(99), 1 (2019)

    Google Scholar 

  12. Lin, W., Wang, K., Zhang, Z., Chen, H.: Revisiting security risks of asymmetric scalar product preserving encryption and its variants. In: IEEE International Conference on Distributed Computing Systems, pp. 1116–1125 (2017)

    Google Scholar 

  13. Luo, Y., Jia, X., Fu, S., Xu, M.: pRide: privacy-preserving ride-matching over road networks for online ride hailing service. IEEE Transactions on Information Forensics and Security, p. 1 (2018). https://doi.org/10.1109/TIFS.2018.2885282

  14. Nakamoto, S., et al.: Bitcoin: a peer-to-peer electronic cash system (2008)

    Google Scholar 

  15. Peng, J., Guo, F., Liang, K., Lai, J., Wen, Q.: Searchain: blockchain-based private keyword search in decentralized storage. Future Gener. Comput. Syst. S0167739X17318630 (2017)

    Google Scholar 

  16. Song, D., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceeding of 2000 IEEE Symposium on Security and Privacy, S P 2000, pp. 44–55 (2000). https://doi.org/10.1109/SECPRI.2000.848445

  17. Sun, W., et al.: Verifiable privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. IEEE Trans. Parallel Distrib. Syst. 25(11), 3025–3035 (2013)

    Article  Google Scholar 

  18. Wan, Z., Deng, R.H.: VPSearch: achieving verifiability for privacy-preserving multi-keyword search over encrypted cloud data. IEEE Trans. Dependable Secur. Comput. 6, 1083–1095 (2018)

    Article  Google Scholar 

  19. Wang, C., Ren, K., Yu, S., Urs, K.M.R.: Achieving usable and privacy-assured similarity search over outsourced cloud data. In: IEEE INFOCOM, pp. 451–459 (2012)

    Google Scholar 

  20. Wang, H.: Identity-based distributed provable data possession in multicloud storage. IEEE Trans. Serv. Comput. 8(2), 328–340 (2015)

    Article  Google Scholar 

  21. Wong, W.K., Cheung, D.W.l., Kao, B., Mamoulis, N.: Secure KNN computation on encrypted databases. In: Proceedings of the 2009 ACM SIGMOD International Conference on Management of Data, pp. 139–152. ACM (2009)

    Google Scholar 

  22. Wood, G., et al.: Ethereum: a secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151, pp. 1–32 (2014)

    Google Scholar 

  23. Xue, K., Li, S., Hong, J., Xue, Y., Yu, N., Hong, P.: Two-cloud secure database for numeric-related SQL range queries with privacy preserving. IEEE Trans. Inf. Forensics Secur. 12(7), 1596–1608 (2017)

    Article  Google Scholar 

  24. Zhang, W., Lin, Y., Xiao, S., Liu, Q., Zhou, T.: Secure distributed keyword search in multiple clouds. In: 2014 IEEE 22nd International Symposium of Quality of Service (IWQoS), pp. 370–379. IEEE (2014)

    Google Scholar 

  25. Zhang, Y., Deng, R.H., Shu, J., Yang, K., Zheng, D.: TKSE: trustworthy keyword search over encrypted data with two-side verifiability via blockchain. IEEE Access 6, 31077–31087 (2018)

    Article  Google Scholar 

Download references

Acknowledgments

This work is supported by the National Nature Science Foundation of China (NSFC) under grant 61572026, 61672195, Open Foundation of State Key Laboratory of Cryptology (No: MMKFKT201617).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shaojing Fu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhang, C., Fu, S., Ao, W. (2019). A Blockchain Based Searchable Encryption Scheme for Multiple Cloud Storage. In: Vaidya, J., Zhang, X., Li, J. (eds) Cyberspace Safety and Security. CSS 2019. Lecture Notes in Computer Science(), vol 11982. Springer, Cham. https://doi.org/10.1007/978-3-030-37337-5_48

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-37337-5_48

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-37336-8

  • Online ISBN: 978-3-030-37337-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics