Skip to main content

Enabling Hidden Frequency Keyword-Based Auditing on Distributed Architectures for a Smart Government

  • Conference paper
  • First Online:
Frontiers in Cyber Security (FCS 2022)

Abstract

Public auditing checks the integrity of outsourced data via random sampling and verifying sample data blocks. In practice, however, users do not pay attention to the entire data set but focus on the integrity of only the part of the data containing keywords of interest. Therefore, the keyword-based auditing paradigm is proposed; it depends entirely on the subjective choice or access habits, which makes it possible for malicious storage servers to analyze the auditing frequency, or reduce redundant backups. For government data, auditing frequency privacy leakage or corruption of any file could be catastrophic. In this paper, we propose a hidden frequency keyword-based auditing scheme for a smart government named HFKA, which is compatible with distributed storage architecture. HFKA leverages a Bloom filter, which adjusts the false positive rate to consider auditing files corresponding to specified keywords and auditing random files obtained via fuzzy matching. To obtain privacy-preserving fuzzy matching, HFKA constructs an index table embedded with update times to retrieve a wide range of files to be audited. This approach is secure against the replay attack and supports the index table update through structure iteration instead of recalculation. HFKA provides storage robustness, privacy protection of hidden frequencies, and data security. Additionally, HFKA can reduce audit computation overhead by 32.6% compared to the probabilistic public auditing.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    Hyperledger Fabric architecture is a scalable architectural design, an open interface style, and pluggable components. It first introduced authority management into the blockchain field, and its authority management function was completed by its independent Fabric certificate authority module. Hyperledger Fabric provides an important architectural reference for the design and implementation of distributed platforms.

  2. 2.

    The Reed Solomon erase-code technique is chosen to redundantly segment F, and its security and efficiency have been widely proven.

  3. 3.

    Time frequency inverse document frequency is a keyword extraction technology that sorts all words according to the frequency of each word in the document, which is used to extract the top-\(\mathcal {K}\) words as the keywords of a file in HFKA.

References

  1. Mellouli, S., Luna, R., Luis, F.: Smart government, citizen participation and open data. Inf. Polity 19(1–2), 1–4 (2014)

    Google Scholar 

  2. Wu, J., Ping, L., Ge, X., Wang, Y., Fu, J.: Cloud storage as the infrastructure of cloud computing. In: International Conference on Intelligent Computing and Cognitive Informatics, pp. 380–383 (2010)

    Google Scholar 

  3. Yang, K., Jia, X.: Data storage auditing service in cloud computing: Challenges, methods and opportunities. World Wide Web 15(4), 409–428 (2012)

    Article  Google Scholar 

  4. Gao, X., Yu, J., Chang Y., Wang, H., Fan, J.: Checking only when it is necessary: Enabling integrity auditing based on the keyword with sensitive information privacy for encrypted cloud data. IEEE Trans. Dependable Secure Comput., 1 (2021). https://doi.org/10.1109/TDSC.2021.3106780

  5. Ateniese, G., et al.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 598–609. ACM, Alexandria, VI (2007)

    Google Scholar 

  6. Juels, A., Kaliski, B.: Proofs of retrievability for large files. Proc. Comput. Commun. Secur. Alexandria: AcMPress 584, 597 (2007)

    Google Scholar 

  7. Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: Enabling public verifiability and data dynamics for storage security in cloud computing. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 355–370. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-04444-1_22

    Chapter  Google Scholar 

  8. Merkle, R.C.: Secrecy, Authentication, and Public Key Systems, 2nd edn. Stanford University, Stanford (1979)

    MATH  Google Scholar 

  9. Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for data storage security in cloud computing. In: 2010 IEEE INFOCOM, pp. 1–9. IEEE, San Diego, CA (2010)

    Google Scholar 

  10. Wang, C., Chow, S.S.M., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(6), 362–375 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  11. Zhou, L., Fu, A., Yang, G., Wang, H., Zhang, Y.: Efficient certificateless multi-copy integrity auditing scheme supporting data dynamics. IEEE Trans. Dependable Secur. Comput. 19(2), 1118–1132 (2022)

    Google Scholar 

  12. Zhang, X., Zhao, J., Xu, C., Li, H., Wang, H., Zhang, Y.: CIPPPA: Conditional identity privacy-preserving public auditing for cloud-Based WBANs against malicious auditors. IEEE Trans. Cloud Comput. 9(4), 1362–1375 (2021)

    Article  Google Scholar 

  13. Rashmi, K V., Shah, N B., Kumar, P V.: Enabling node repair in any erasure code for distributed storage. In: 2011 IEEE International Symposium on Information Theory, pp. 1235–1239. IEEE, St. Petersburg (2011)

    Google Scholar 

  14. Perard, D., Lacan, J., Bachy, Y., Detchart, J.: Erasure code-based low storage blockchain node. In: Proceedings of 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pp. 1622–1627. IEEE, Halifax, Canada (2018)

    Google Scholar 

  15. Jin, H., Luo, R., He, Q., Wu, S., Zeng, Z., Xia, X.: Cost-effective data placement in edge storage systems with erasure code. IEEE Trans. Serv. Comput., 1 (2022). https://doi.org/10.1109/TSC.2022.3152849

  16. Sun, Y., Liu, Q., Chen, X., Du, X.: An adaptive authenticated data structure with privacy-preserving for big data stream in cloud. IEEE Trans. Inf. Forensics Secur. 15(2020), 3295–3310 (2020)

    Article  Google Scholar 

  17. Li, S., Zhang, Y., Xu, C., Chen, K.: Cryptoanalysis of an authenticated data structure scheme with public privacy-preserving auditing. IEEE Trans. Inf. Forensics Secur. 16, 2564–2565 (2021)

    Article  Google Scholar 

  18. Xu, S., Cai, X., Zhao, Y., Ren, Z., Du, L., Wang, Q., Zhou, J.: zkrpChain: Towards multi-party privacy-preserving data auditing for consortium blockchains based on zero-knowledge range proofs. Futur. Gener. Comput. Syst. 128, 490–504 (2022)

    Article  Google Scholar 

  19. Shen, W., Qin, J., Yu, J., Hao, R., Hu, J., Ma, J.: Data integrity auditing without private key storage for secure cloud storage. IEEE Trans. Cloud Comput. 9(4), 1408–1421 (2019)

    Article  Google Scholar 

  20. Zheng, W., Lai, C.F., He, D., Kumar, N., Chen, B.: Secure storage auditing with efficient key updates for cognitive industrial IoT environment. IEEE Trans. Industr. Inf. 17(6), 4238–4247 (2020)

    Article  Google Scholar 

  21. Ge, X., Yu, J., Hu, C.: Enabling effificient verififiable fuzzy keyword search over encrypted data in cloud computing. IEEE Access 6, 45725–45739 (2018)

    Article  Google Scholar 

  22. Miao, Y., Tong, Q., Deng, R., Choo, K.K.R., Liu, X., Li, H.: Verifiable searchable encryption framework against insider keyword-guessing attack in cloud storage. IEEE Trans. Cloud Comput. 10, 835–848 (2020)

    Article  Google Scholar 

  23. Bringer, J., Chabanne, H., Kindarji, B.: Error-tolerant searchable encryption. In: IEEE International Conference on Communications, pp. 1–6 (2009)

    Google Scholar 

  24. Li, J., Wang, Q., Wang, C., Cao, N., Ren, K., Lou, W.: Fuzzy keyword search over encrypted data in cloud computing. In: 2010 Proceedings IEEE INFOCOM, pp. 1–5. IEEE, Cape Town (2010)

    Google Scholar 

  25. Wang, Q., et al.: Searchable encryption over feature-rich data. IEEE Trans. Dependable Secure Comput. 15(3), 496–510 (2016)

    Article  Google Scholar 

  26. Zhong, H., Li, Z., Cui, J., Sun, Y., Liu, L.: Efficient dynamic multi-keyword fuzzy search over encrypted cloud data. J. Netw. Comput. Appl. 149, 102469 (2020)

    Article  Google Scholar 

  27. Liu, Q., Peng, Y., Pei, S., Wu, J., Peng, T., Wang, G.: Prime inner product encoding for effective wildcard-based multi-keyword fuzzy search. IEEE Trans. Serv. Comput. 15, 1799 (2020)

    Article  Google Scholar 

  28. Li, X., et al.: VRFMS: verifiable ranked fuzzy multi-keyword search over encrypted data. IEEE Trans. Serv. Comput., 1 (2022). https://doi.org/10.1109/TSC.2021.3140092

  29. Sahu, I.K., Nene, M.J.: Identity-based integrity verification (IBIV) protocol for cloud data storage. In: 2021 International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies (ICAECT), pp. 1–6. IEEE, Bhilai (2021)

    Google Scholar 

  30. Yoosuf, M.S., Anitha, R.: LDuAP: Lightweight dual auditing protocol to verify data integrity in cloud storage servers. J. Ambient. Intell. Humaniz. Comput. 13(8), 3787–3805 (2022)

    Article  Google Scholar 

  31. Tong, Q., Miao, Y., Weng, J., Liu, X., Choo, K.K.R., Deng, R.: Verifiable fuzzy multi-keyword search over encrypted data with adaptive security. IEEE Trans. Knowl. Data Eng., 1 (2022). https://doi.org/10.1109/TKDE.2022.3152033

  32. Gervais, A., Capkun, S., Karame, G.O., Gruber, D.: On the privacy provisions of bloom filters in lightweight bitcoin clients. In: Proceedings of the 30th Annual Computer Security Applications Conference, pp. 326–335. ACM, New Orleans, Louisiana (2014)

    Google Scholar 

  33. Pagh, A., Pagh, R., Rao, S.: An optimal bloom filter replacement. In: Proceedings of the Sixteenth Annual ACM-SIAM Symposium on Discrete Algorithms, pp. 823–829. SODA, Vancouver, BC (2005)

    Google Scholar 

  34. Kiss, S.Z., Hosszu, E., Tapolcai, J., Ronyai, L., Rottenstreich, O.: Bloom filter with a false positive free zone. IEEE Trans. Netw. Serv. Manage. 18(2), 2334–2349 (2021)

    Article  Google Scholar 

  35. Kamara, S., Papamanthou, C., Roeder, T.: Dynamic searchable symmetric encryption. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 965–976. ACM, Raleigh, NC (2012)

    Google Scholar 

  36. Bellare, M., Impagliazzo, R.: A tool for obtaining tighter security analyses of pseudorandom function based constructions, with applications to PRP to PRF conversion. IACR Cryptol. ePrint Arch. 1999, 24 (1999)

    Google Scholar 

  37. McCurley, K S.: The discrete logarithm problem. In: Proceedings of Symposium in Applied Mathematics, pp. 49–74 (1990)

    Google Scholar 

  38. Daemen, J., Rijmen, V.: AES proposal: Rijndael (1999)

    Google Scholar 

  39. Cachin, C.: Architecture of the hyperledger blockchain fabric. In: Workshop on Distributed Cryptocurrencies and Consensus Ledgers, pp. 1–4. Chicago (2016)

    Google Scholar 

  40. Qu, Y., Nosouhi, M.R., Cui, L., Yu, S.: Existing privacy protection solutions. In: Personalized Privacy Protection in Big Data. DA, pp. 5–13. Springer, Singapore (2021). https://doi.org/10.1007/978-981-16-3750-6_2

    Chapter  Google Scholar 

Download references

Acknowledgements

This work was supported in part by the Southwest Petroleum University “Set Sail” Project (Grant No.0202667680-2021QHZ017); in part by the National Natural Science Foundation of China (Grant No.61902327); in part by the China Postdoctoral Science Foundation (Grant No.2020M681316); in part by the Chengdu Key R & D project (Grant No.2021-YF05-00965-SN); and in part by the Southwest Petroleum University Graduate Teaching and Research Reform Project (Grant No.JY20ZD06).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Jingting Xue or Shuqin Luo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Xue, J., Luo, S., Shi, L., Zhang, X., Xu, C. (2022). Enabling Hidden Frequency Keyword-Based Auditing on Distributed Architectures for a Smart Government. In: Ahene, E., Li, F. (eds) Frontiers in Cyber Security. FCS 2022. Communications in Computer and Information Science, vol 1726. Springer, Singapore. https://doi.org/10.1007/978-981-19-8445-7_4

Download citation

  • DOI: https://doi.org/10.1007/978-981-19-8445-7_4

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-8444-0

  • Online ISBN: 978-981-19-8445-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics