Abstract
Big data cloud platforms provide users with on-demand configurable computing, storage resources to users, thus involving a large amount of user data. However, most of the data is processed and stored in plaintext, resulting in data leakage. At the same time, simple encrypted storage ensures the confidentiality of the cloud data, but has the following problems: if the encrypted data is downloaded to the client and then decrypted, the search efficiency will be low. If the encrypted data is decrypted and searched on the server side, the security will be reduced. Data availability is finally reduced, and indiscriminate protection measures make the risk of data leakage uncontrollable. To solve the problems, based on searchable encryption and key derivation, a cipher search system is designed in this paper considering both data security and availability, and the use of a search encryption algorithm that supports dynamic update is listed. Moreover, the system structure has the advantage of adapting different searchable encryption algorithm. In particular, a user-centered key derivation mechanism is designed to realize file-level fine-grained encryption. Finally, extensive experiment and analysis show that the scheme greatly improves the data security of big data platform.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Li, H., Yang, Y., Dai, Y., Yu, S., Xiang, Y.: Achieving secure and efficient dynamic searchable symmetric encryption over medical cloud data. IEEE Trans. Cloud Comput. 8(2), 484–494 (2020). https://doi.org/10.1109/TCC.2017.2769645
He, K., Chen, J., Zhou, Q., Du, R., Xiang, Y.: Secure dynamic searchable symmetric encryption with constant client storage cost. IEEE Trans. Inf. Forensics Secur. 16, 1538–1549 (2021). https://doi.org/10.1109/TIFS.2020.3033412
Shen, J., Wang, C., Wang, A., Ji, S., Zhang, Y.: A searchable and verifiable data protection scheme for scholarly big data. IEEE Trans. Emerg. Topics Comput. 9(1), 216–225 (2021). https://doi.org/10.1109/TETC.2018.2830368
Chen, G., et al.: Differentially private access patterns for searchable symmetric encryption. In: IEEE Conference on Computer Communications, Honolulu, USA, pp. 810–818 (2018)
Song, Q., et al.: SAP-SSE: protecting search patterns and access patterns in searchable symmetric encryption. IEEE Trans. Inf. Forensics Secur. 16, 1795–1809 (2021). https://doi.org/10.1109/TIFS.2020.3042058
Mishra, P., et al.: Oblix: an efficient oblivious search index. In: IEEE Symposium on Security and Privacy San Francisco, USA, pp. 279–296 (2018)
Liu, X., Yang, G., Mu, Y., Deng, R.H.: Multi-user verifiable searchable symmetric encryption for cloud storage. IEEE Trans. Dependable Secure Comput. 17(6), 1322–1332 (2020). https://doi.org/10.1109/TDSC.2018.2876831
Wang, Y., et al.: Towards multi-user searchable encryption supporting Boolean query and fast decryption. J. Univ. Comput. Sci. 25(3), 222–244 (2019)
Pang, H., Zhang, J., Mouratidis, K.: Scalable verification for outsourced dynamic databases. VLDB Endowment 2(1), 802–813 (2019)
Belguith, S., et al.: Phoabe: securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IOT. Comput. Netw. 133, 141–156 (2018)
Liu, X., et al.: Privacy-preserving multi-keyword searchable encryption for distributed systems. IEEE Trans. Parallel Distrib. Syst. 32(3), 561–574 (2021). https://doi.org/10.1109/TPDS.2020.3027003
Zhang, K., et al.: Lightweight searchable encryption protocol for industrial Internet of Things. IEEE Trans. Industr. Inf. 17(6), 4248–4259 (2021). https://doi.org/10.1109/TII.2020.3014168
Ge, X., et al.: Towards achieving keyword search over dynamic encrypted cloud data with symmetric-key based verification. IEEE Trans. Dependable Secure Comput. 18(1), 490–504 (2021). https://doi.org/10.1109/TDSC.2019.2896258
Wang, H., et al.: Encrypted data retrieval and sharing scheme in space-air-ground integrated vehicular networks. IEEE Internet of Things J. https://doi.org/10.1109/JIOT.2021.3062626
Sultan, N.H., Laurent, M., Varadharajan, V.: Securing organization’s data: a role-based authorized keyword search scheme with efficient decryption. IEEE Trans. Cloud Comput. https://doi.org/10.1109/TCC.2021.3071304
Mante, R.V., Bajad, N.R.: A study of searchable and auditable attribute based encryption in cloud. In: 2020 5th International Conference on Communication and Electronics Systems (ICCES), pp. 1411–1415 (2020). https://doi.org/10.1109/ICCES48766.2020.9137860
Acknowledgements
This work is supported by the Sichuan Science and Technology Program (2021JDRC0077), the Sichuan Province’s Key Research and Development Plan.
“Distributed Secure Storage Technology for Massive Sensitive Data” Project (2020YFG0298), and Applied Basic Research Project of Sichuan Province (No. 2018JY0370).
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Chen, Y., Hao, Y., Yi, Z., Wu, K., Zhao, Q., Wang, X. (2021). Searchable Encryption System for Big Data Storage. In: Zeng, J., Qin, P., Jing, W., Song, X., Lu, Z. (eds) Data Science. ICPCSEE 2021. Communications in Computer and Information Science, vol 1452. Springer, Singapore. https://doi.org/10.1007/978-981-16-5943-0_12
Download citation
DOI: https://doi.org/10.1007/978-981-16-5943-0_12
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-5942-3
Online ISBN: 978-981-16-5943-0
eBook Packages: Computer ScienceComputer Science (R0)