Skip to main content

Blockchain-Based Verifiable DSSE with Forward Security in Multi-server Environments

  • Conference paper
  • First Online:
Wireless Algorithms, Systems, and Applications (WASA 2021)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 12939))

Abstract

With big data and cloud computing development, data owners begin to outsource their large-volume data to remote servers to reduce local storage costs. Researchers have currently proposed some Dynamic Searchable Symmetric Encryption (DSSE) schemes that support efficient keyword searches on encrypted data with dynamic update operations. Unfortunately, most of them are constructed based on a single server architecture, which means that they cannot be used directly when multiple servers participate in the search process. Some schemes assume that the server is honest-but-curious, which cannot be guaranteed, especially in the multi-server scenario. This paper proposes a Blockchain-based Verifiable DSSE scheme with forwarding security in Multi-server environments. In the scheme, the data owner encrypts the partitioned files and randomly stores them in different servers from which a single server cannot recover any complete file. The use of blockchain and smart contracts to achieve reliable and verifiable search can detect malicious servers’ improper behaviors. Experimental evaluation show that the scheme achieves verifiable search, forward privacy with less leakage, and high search efficiency.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Zhang, C., Zhu, L., Xu, C., Zhang, C., Sharif, K., Wu, H., Westermann, H.: BSFP: blockchain-enabled smart parking with fairness, reliability and privacy protection. IEEE Trans. Veh. Technol. 69(6), 6578–6591 (2020)

    Article  Google Scholar 

  2. Zhang, C., Zhu, L., Xu, C., Liu, X., Sharif, K.: Reliable and privacy-preserving truth discovery for mobile crowdsensing systems. IEEE Trans. Dependable Secure Comput. (2019). https://doi.org/10.1109/TDSC.2019.2919517

    Article  Google Scholar 

  3. Poh, G.S., Mohamad, M.S., Chin, J.-J.: Searchable symmetric encryption over multiple servers. Cryptogr. Commun. 10(1), 139–158 (2017). https://doi.org/10.1007/s12095-017-0232-y

    Article  MathSciNet  MATH  Google Scholar 

  4. Zarezadeh, M., Mala, H., Ashouri-Talouki, M.: Multi-keyword ranked searchable encryption scheme with access control for cloud storage. Peer-to-Peer Networking Appl. 13(1), 207–218 (2019). https://doi.org/10.1007/s12083-019-00736-0

    Article  Google Scholar 

  5. Ti, Y., Wu, C., Yu, C., Kuo, S.: Benchmarking dynamic searchable symmetric encryption scheme for cloud-internet of things applications. IEEE Access 8, 1715–1732 (2020). https://doi.org/10.1109/ACCESS.2019.2961971

    Article  Google Scholar 

  6. Hiemenz, B., Krämer, M.: Dynamic searchable symmetric encryption for storing geospatial data in the cloud. Int. J. Inf. Secur. 18(3), 333–354 (2018). https://doi.org/10.1007/s10207-018-0414-4

    Article  Google Scholar 

  7. Kamara, S., Papamanthou, C., Roeder, T.: Dynamic searchable symmetric encryption. IACR Cryptol. ePrint Arch. 2012, 530 (2012)

    Google Scholar 

  8. Zhang, Y., Katz, J., Papamanthou, C.: All your queries are belong to us: the power of file-injection attacks on searchable encryption. IACR Cryptol. ePrint Arch. 2016, 172 (2016)

    Google Scholar 

  9. Zuo, C., Sun, S., Liu, J.K., Shao, J., Pieprzyk, J., Xu, L.: Forward and backward private DSSE for range queries. IACR Cryptol. ePrint Arch. 2019, 1240 (2019)

    Google Scholar 

  10. Patranabis, S., Mukhopadhyay, D.: Forward and backward private conjunctive searchable symmetric encryption. IACR Cryptol. ePrint Arch. 2020, 1342 (2020)

    Google Scholar 

  11. Stefanov, E., Papamanthou, C., Shi, E.: Practical dynamic searchable encryption with small leakage. In: 21st Annual Network and Distributed System Security Symposium, NDSS. The Internet Society (2014)

    Google Scholar 

  12. Orencik, C., Selcuk, A., Savas, E., Kantarcioglu, M.: Multi-Keyword search over encrypted data with scoring and search pattern obfuscation. Int. J. Inf. Secur. 15(3), 251–269 (2015). https://doi.org/10.1007/s10207-015-0294-9

    Article  Google Scholar 

  13. Zhang, C., Fu, S., Ao, W.: A blockchain based searchable encryption scheme for multiple cloud storage. In: Vaidya, J., Zhang, X., Li, J. (eds.) CSS 2019. LNCS, vol. 11982, pp. 585–600. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-37337-5_48

    Chapter  Google Scholar 

  14. He, K., Chen, J., Zhou, Q., Du, R., Xiang, Y.: Secure dynamic searchable symmetric encryption with constant client storage cost. IEEE Trans. Inf. Forensics Secur. 16, 1538–1549 (2021). https://doi.org/10.1109/TIFS.2020.3033412

    Article  Google Scholar 

  15. Zhang, Z., Wang, J., Wang, Y., Su, Y., Chen, X.: Towards efficient verifiable forward secure searchable symmetric encryption. In: Sako, K., Schneider, S., Ryan, P.Y.A. (eds.) ESORICS 2019. LNCS, vol. 11736, pp. 304–321. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-29962-0_15

    Chapter  Google Scholar 

  16. Wang, K., Dong, X., Shen, J., Cao, Z.: An effective verifiable symmetric searchable encryption scheme in cloud computing, pp. 98–102. ACM (2019). https://doi.org/10.1145/3377170.3377251

  17. Chen, B., Wu, L., Wang, H., Zhou, L., He, D.: A blockchain-based searchable public-key encryption with forward and backward privacy for cloud-assisted vehicular social networks. IEEE Trans. Veh. Technol. 69(6), 5813–5825 (2020). https://doi.org/10.1109/TVT.2019.2959383

    Article  Google Scholar 

  18. Yan, X., Yuan, X., Ye, Q., Tang, Y.: Blockchain-based searchable encryption scheme with fair payment. IEEE Access 8, 109687–109706 (2020). https://doi.org/10.1109/ACCESS.2020.3002264

    Article  Google Scholar 

  19. Hu, S., Cai, C., Wang, Q., Wang, C., Luo, X., Ren, K.: Searching an encrypted cloud meets blockchain: a decentralized, reliable and fair realization, pp. 792–800. IEEE (2018). https://doi.org/10.1109/INFOCOM.2018.8485890

  20. Li, H., Tian, H., Zhang, F.: Block chain based searchable symmetric encryption. IACR Cryptol. ePrint Arch. 2017, 447 (2017)

    Google Scholar 

Download references

Acknowledgments

This research is supported by the National Key Research and Development Program of China (Grant No. 2020YFB1006101) and the National Natural Science Foundation of China (Grant Nos. 61972037, 61872041, U1836212).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Liehuang Zhu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Xu, C., Yu, L., Zhu, L., Zhang, C. (2021). Blockchain-Based Verifiable DSSE with Forward Security in Multi-server Environments. In: Liu, Z., Wu, F., Das, S.K. (eds) Wireless Algorithms, Systems, and Applications. WASA 2021. Lecture Notes in Computer Science(), vol 12939. Springer, Cham. https://doi.org/10.1007/978-3-030-86137-7_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-86137-7_18

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-86136-0

  • Online ISBN: 978-3-030-86137-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics