Skip to main content

Privacy-Preserving Multi-keyword Search over Outsourced Data for Resource-Constrained Devices

  • Conference paper
  • First Online:
Blockchain and Trustworthy Systems (BlockSys 2020)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1267))

Included in the following conference series:

Abstract

With the rapid development of cloud computing, a variety of cloud-based applications have been developed. Since cloud computing has the features of high capacity and flexible computing, more and more users are motivated to outsource their data to the cloud server for economic savings. Users are able to search over outsourced data according to some keywords with the help of the cloud server. During data searching, the confidentiality of the relevant data could be compromised since the keywords may contain some sensitive information. However, existing privacy-preserving keyword search proposals have high computation complexity, which are not applicable to IoT-related scenarios. That is, the data processing and search trapdoor generation procedures require the users to take resource-intensive computations, e.g., high-dimensional matrix operations, which are unaffordable by resource-constrained devices. To address this issue, we propose a light-weight privacy-preserving multi-keyword search scheme. The security and performance analyses demonstrate that our scheme outperforms existing solutions and is practical in applications.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Anand, V., Satapathy, S.C.: Homomorphic encryption for secure information retrieval from the cloud. In: 2016 International Conference on Emerging Trends in Engineering, Technology and Science (ICETETS), pp. 1–5, February 2016. https://doi.org/10.1109/ICETETS.2016.7602988

  2. Bellare, M., Boldyreva, A., O’Neill, A.: Deterministic and efficiently searchable encryption. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 535–552. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-74143-5_30

    Chapter  Google Scholar 

  3. Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506–522. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24676-3_30

    Chapter  Google Scholar 

  4. Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 25(1), 222–233 (2014). https://doi.org/10.1109/TPDS.2013.45

    Article  Google Scholar 

  5. Cash, D., Jarecki, S., Jutla, C., Krawczyk, H., Roşu, M.-C., Steiner, M.: Highly-scalable searchable symmetric encryption with support for boolean queries. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013. LNCS, vol. 8042, pp. 353–373. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-40041-4_20

    Chapter  Google Scholar 

  6. Chang, Y.-C., Mitzenmacher, M.: Privacy preserving keyword searches on remote encrypted data. In: Ioannidis, J., Keromytis, A., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 442–455. Springer, Heidelberg (2005). https://doi.org/10.1007/11496137_30

    Chapter  Google Scholar 

  7. Ding, S., Li, Y., Zhang, J., Chen, L., Wang, Z., Xu, Q.: An efficient and privacy-preserving ranked fuzzy keywords search over encrypted cloud data. In: 2016 International Conference on Behavioral, Economic and Socio-cultural Computing (BESC), pp. 1–6, November 2016. https://doi.org/10.1109/BESC.2016.7804500

  8. Ding, X., Liu, P., Jin, H.: Privacy-preserving multi-keyword top-\(k\) k similarity search over encrypted data. IEEE Trans. Dependable Secure Comput. 16(2), 344–357 (2019). https://doi.org/10.1109/TDSC.2017.2693969

    Article  Google Scholar 

  9. Fu, Z., Wu, X., Guan, C., Sun, X., Ren, K.: Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Trans. Inf. Forensics Secur. 11(12), 2706–2716 (2016). https://doi.org/10.1109/TIFS.2016.2596138

    Article  Google Scholar 

  10. Fu, Z., Xia, L., Sun, X., Liu, A.X., Xie, G.: Semantic-aware searching over encrypted data for cloud computing. IEEE Trans. Inf. Forensics Secur. 13(9), 2359–2371 (2018). https://doi.org/10.1109/TIFS.2018.2819121

    Article  Google Scholar 

  11. Golle, P., Staddon, J., Waters, B.: Secure conjunctive keyword search over encrypted data. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol. 3089, pp. 31–45. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24852-1_3

    Chapter  Google Scholar 

  12. He, T., Ma, W.: An effective fuzzy keyword search scheme in cloud computing. In: 2013 5th International Conference on Intelligent Networking and Collaborative Systems, pp. 786–789, September 2013. https://doi.org/10.1109/INCoS.2013.150

  13. Hu, C., Liu, P., Yang, R., Xu, Y.: Public-key encryption with keyword search via obfuscation. IEEE Access 7, 37394–37405 (2019). https://doi.org/10.1109/ACCESS.2019.2905250

    Article  Google Scholar 

  14. Hwang, Y.H., Lee, P.J.: Public key encryption with conjunctive keyword search and its extension to a multi-user system. In: Takagi, T., Okamoto, E., Okamoto, T., Okamoto, T. (eds.) Pairing 2007. LNCS, vol. 4575, pp. 2–22. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-73489-5_2

    Chapter  Google Scholar 

  15. Li, J., Wang, Q., Wang, C., Cao, N., Ren, K., Lou, W.: Fuzzy keyword search over encrypted data in cloud computing. In: 2010 Proceedings IEEE INFOCOM, pp. 1–5, March 2010. https://doi.org/10.1109/INFCOM.2010.5462196

  16. Liu, J., Han, J., Wang, Z.: Searchable encryption scheme on the cloud via fully homomorphic encryption. In: 2016 Sixth International Conference on Instrumentation Measurement, Computer, Communication and Control (IMCCC), pp. 108–111, July 2016. https://doi.org/10.1109/IMCCC.2016.201

  17. Liu, Q., Nie, X., Liu, X., Peng, T., Wu, J.: Verifiable ranked search over dynamic encrypted data in cloud computing. In: 2017 IEEE/ACM 25th International Symposium on Quality of Service (IWQoS), pp. 1–6, June 2017. https://doi.org/10.1109/IWQoS.2017.7969156

  18. Lu, R., Zhu, H., Liu, X., Liu, J.K., Shao, J.: Toward efficient and privacy-preserving computing in big data era. IEEE Network 28(4), 46–50 (2014). https://doi.org/10.1109/MNET.2014.6863131

    Article  Google Scholar 

  19. Raghavendra, S., et al.: IGSK: index generation on split keyword for search over cloud data. In: 2015 International Conference on Computing and Network Communications (CoCoNet), pp. 374–380, December 2015. https://doi.org/10.1109/CoCoNet.2015.7411213

  20. Ren, Y., Chen, Y., Yang, J., Xie, B.: Privacy-preserving ranked multi-keyword search leveraging polynomial function in cloud computing. In: 2014 IEEE Global Communications Conference, pp. 594–600, December 2014. https://doi.org/10.1109/GLOCOM.2014.7036872

  21. Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE Symposium on Security and Privacy, SP 2000, pp. 44–55, May 2000. https://doi.org/10.1109/SECPRI.2000.848445

  22. Wang, B., Hou, Y., Li, M., Wang, H., Li, H.: Maple: scalable multi-dimensional range search over encrypted cloud data with tree-based index. In: Proceedings of ACM ASIACCS (2014). https://doi.org/10.1145/2590296.2590305

  23. Wang, C., Cao, N., Li, J., Ren, K., Lou, W.: Secure ranked keyword search over encrypted cloud data. In: 2010 IEEE 30th International Conference on Distributed Computing Systems, pp. 253–262, June 2010. https://doi.org/10.1109/ICDCS.2010.34

  24. Xu, P., Tang, S., Xu, P., Wu, Q., Hu, H., Susilo, W.: Practical multi-keyword and boolean search over encrypted e-mail in cloud server. IEEE Trans. Serv. Comput. (2019). https://doi.org/10.1109/TSC.2019.2903502

  25. Xu, P., Wu, Q., Wang, W., Susilo, W., Domingo-Ferrer, J., Jin, H.: Generating searchable public-key ciphertexts with hidden structures for fast keyword search. IEEE Trans. Inf. Forensics Secur. 10(9), 1993–2006 (2015). https://doi.org/10.1109/TIFS.2015.2442220

    Article  Google Scholar 

  26. Zhang, L., Zhang, Y., Ma, H.: Privacy-preserving and dynamic multi-attribute conjunctive keyword search over encrypted cloud data. IEEE Access 6, 34214–34225 (2018). https://doi.org/10.1109/ACCESS.2018.2823718

    Article  Google Scholar 

  27. Zhang, Q., Fu, S., Jia, N., Tang, J., Xu, M.: Secure multi-keyword fuzzy search supporting logic query over encrypted cloud data. In: Li, J., Liu, Z., Peng, H. (eds.) SPNCE 2019. LNICST, vol. 284, pp. 210–225. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-21373-2_17

    Chapter  Google Scholar 

Download references

Acknowledgements

This article is supported in part by the National Natural Science Foundation of China under projects 61862012, 61772150, 61862011, 61962012 and 61902123, the Guangxi Key R&D Program under project AB17195025, the Guangxi Natural Science Foundation under grants 2018GXNSFDA281054, 2018GXNSFAA281232, 2019GXNSFFA245015, 2019GXNSFGA245004 and AD19245048, the Peng Cheng Laboratory Project of Guangdong Province PCL2018KP004, the China Postdoctoral Science Foundation under Project 2019M662769, and the Natural Science Foundation of Hunan Province under Project 2020JJ5085.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yong Ding .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Liu, LG., Zhao, M., Ding, Y., Wang, Y., Deng, H., Wang, H. (2020). Privacy-Preserving Multi-keyword Search over Outsourced Data for Resource-Constrained Devices. In: Zheng, Z., Dai, HN., Fu, X., Chen, B. (eds) Blockchain and Trustworthy Systems. BlockSys 2020. Communications in Computer and Information Science, vol 1267. Springer, Singapore. https://doi.org/10.1007/978-981-15-9213-3_22

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-9213-3_22

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-9212-6

  • Online ISBN: 978-981-15-9213-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics