Abstract
Dynamic symmetric searchable encryption (DSSE) allows clients to perform keyword searches and updates on encrypted databases outsourced to cloud servers. Ensuring forward privacy is a crucial security property for DSSE schemes to protect data privacy. However, existing forward-private DSSE schemes face significant limitations: they either rely on an honest-but-curious server, assuming it always returns correct search results without providing verification functionality, or they lack support for fine-grained attribute-based searches and access control. As a result, these schemes cannot be directly applied to attribute-based databases. In this paper, we propose the first verifiable forward-private DSSE scheme suitable for attribute-based databases. Specifically, we construct a secure index based on attribute elements to realize fine-grained searches on attribute-value type databases while ensuring the forward privacy of the scheme. We also design a novel verification tag using symmetric homomorphic encryption to verify the correctness of search results. In addition, our scheme achieves access control functionality to ensure that different users can only access authorized files. Experimental evaluations show that our scheme has advantage in the update, search and verification processes. And the security analysis proves our scheme is secure.











Similar content being viewed by others
Explore related subjects
Discover the latest articles and news from researchers in related subjects, suggested using machine learning.Data availability
No datasets were generated or analysed during the current study.
References
Zheng Y, Lu R, Shao J, Yin F, Zhu H (2022) Achieving practical symmetric searchable encryption with search pattern privacy over cloud. IEEE Trans Serv Comput 15(3):1358–1370
Gan Q, Wang X, Huang D, Li J, Zhou D, Wang C (2022) Towards multi-client forward private searchable symmetric encryption in cloud computing. IEEE Trans Serv Comput 15(6):3566–3576
Song DX, Wagner D, Perrig A (2000) Practical Techniques for Searches on Encrypted Data,” In: Proceeding 2000 IEEE Symposium Security and Privacy, pp. 44–55, (Berkeley, CA, USA)
Goh E (2003) Secure indexes. IACR Cryptology Eprint Arch 2003:216–234
Curtmola R, Garay J, Kamara S, Ostrovsky R (2011) Searchable symmetric encryption: Improved definitions and efficient constructions. J Comput Secur 19(5):895–934
Chase M, Kamara S (2010) Structured Encryption and Controlled Disclosure,” In: Proceeding ASIACRYPT 2010, pp. 577-594, (Singapore)
Cash D, Grubbs P, Perry J, Ristenpart T (2015) Leakage-abuse Attacks Against Searchable Encryption,” In: Proceeding CCS 2015, pp. 668-679
Cash D et al (2013) Highly-scalable Searchable Symmetric Encryption with Support for Boolean Queries,” In: Proceeding CRYPTO 2013, pp. 353–373, (Santa Barbara, CA, USA)
Kamara S, Papamanthou C, Roeder T (2012) Dynamic Searchable Symmetric Encryption,” In: Proceeding CCS 2012, pp. 965–976, (Raleigh, NC, USA)
Zhang Y, Katz J, Papamanthou C (2016) All your queries are belong to us: The power of file-injection attacks on searchable encryption,” In: Proceeding 25th USENIX Conf. Security Symposium, pp. 707–720 (Austin, TX, USA)
Chang Y-C, Mitzenmacher M Privacy preserving keyword searches on remote encrypted data,” In: ACNS 2005, pp. 442-455
Stefanov E, Papamanthou C, Shi E (2014) Practical Dynamic Searchable Encryption with Small Leakage,” In: Proceeding NDSS 2014, pp. 1–15, (San Diego, CA, USA)
Bost R (2016) “\(\sum o\phi o\xi \): Forward Secure Searchable Encryption,” In: Proceeding CCS 2016, pp. 1143–1154, (Vienna, Austria)
Bost R, Minaud B, Ohrimenko O (2017) Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives,” In: Proceeding CCS 2017, pp. 1465–1482, (Dallas, TX, USA)
Song XF et al (2020) Forward private searchable symmetric encryption with optimized I/O efficiency. IEEE Trans Dependable and Secure Comput 17(5):912–927
Demertzis I, Chamani JG, Papadopoulos D, Papamanthou C (2020) Dynamic searchable encryption with small client storage,” In: Proceeding NDSS 2020, pp. 1–17, (San Diego, CA, USA)
Sun S-F et al (2021) Practical non-interactive searchable encryption with forward and backward privacy. Proc NDSS 21–25(2012):1–18
Zuo Cet al (2019) Dynamic Searchable Symmetric Encryption with Forward and Stronger Backward Privacy,” In: Proceeding ESORICS 2019, pp. 283–303, (Luxembourg)
Li S et al (2022) Efficient data retrieval over encrypted attribute-value type databases in cloud-assisted ehealth systems. IEEE Syst J 16(2):3096–3107
Liu Y et al (2022) Achieving privacy-preserving DSSE for intelligent IoT healthcare system. IEEE Trans Ind Inf 18(3):2010–2020
Wang K et al (2022) Forward privacy preservation in IoT-enabled healthcare systems. IEEE Trans Ind Inf 18(3):1991–1999
Dou Haochen et al (2024) Dynamic searchable symmetric encryption with strong security and robustness. IEEE Trans Inf Forens Secur 19:2370–2384. https://doi.org/10.1109/TIFS.2024.3350330
Chen L, Li J, Li J (2023) Towards forward and backward private dynamic searchable symmetric encryption supporting data deduplication and conjunctive queries. IEEE Internet of Things J 10(19):17408–17423
Wei Y et al (2019) FSSE: Forward secure searchable encryption with keyed-block chains. Inf Sci 500:113–126
Li H et al (2020) Achieving secure and efficient dynamic searchable symmetric encryption over medical cloud data. IEEE Trans Cloud Comput 8(2):484–494
Patranabis S, Mukhopadhyay D (2021) Forward and Backward Private Conjunctive Searchable Symmetric Encryption,” In: Proceeding NDSS 2021, pp. 1–18
Gao H, Huang H, Xue L, Xiao F, Li Q (2023) Blockchain-enabled fine-grained searchable encryption with cloud-edge computing for electronic health records sharing. IEEE Internet Things J 10(20):18414–18425
Yu J, Liu S, Xu M, Guo H, Zhong F, Cheng W (2023) An efficient revocable and searchable MA-ABE scheme with blockchain assistance for C-IoT. IEEE Internet Things J 10(3):2754–2766
Yin H, Zhang W, Deng H, Qin Z, Li K (2023) An attribute-based searchable encryption scheme for cloud-assisted IIoT. IEEE Internet Things J 10(12):11014–11023
Jiang C, Xu C, Yang G (2024) Device-Enhanced Secure Cloud Storage with Keyword Searchable Encryption and Deduplication” In: European Symposium on Research in Computer Security, pp. 396-413, Cham, Springer
Chen L, Xu S, Zhang H, Weng J (2024) Fair and exculpable attribute-based searchable encryption with revocation and verifiable outsourced decryption using smart contract. IEEE Internet Things J. https://doi.org/10.1109/JIOT.2024.3484227
Chai Q, Gong G (2012) “Verifiable symmetric searchable encryption for semi-honest-but-curiouscloud servers,” In: Proceeding IEEE International Conference on Communications, pp. 917-922
Ge X, Yu J, Zhang H, Hu C, Li Z, Qin Z, Hao R (2021) Towards achieving keyword search over dynamic encrypted cloud data with symmetric-key based verification. IEEE Trans Dependable Secur Comput 18(1):490–504
Zhang Z, Wang J, Wang Y, Su Y, Chen X (2019) Towards Efficient Verifiable Forward Secure Searchable Symmetric Encryption, In: Proceeding 24th European Symposium on Research in Computer Security, pp. 304-321
Yanget Y et al (2024) OpenSE: efficient verifiable searchable encryption with access and search pattern hidden for cloud-IoT. IEEE Internet Things J 11(8):13793–13809
Li J, Ji L, Zhang Y, Lu Y, Ning J (2024) Response-hiding and volume-hiding verifiable searchable encryption with conjunctive keyword search. IEEE Trans Comput. https://doi.org/10.1109/TC.2024.3485172
Chen B, Xiang T, He D, Li H, Choo K-KR (2023) BPVSE: publicly verifiable searchable encryption for cloud-assisted electronic health records. IEEE Trans Inf Forens Secur 18:3171–3184
Guo C, Li W, Tang X, Choo K-KR, Liu Y (2024) Forward private verifiable dynamic searchable symmetric encryption with efficient conjunctive query. IEEE Trans Dependable Secure Comput 21(2):746–763
Chen T, Xu P, Picek S, Luo B, Susilo W, Jin H, Liang K (2023) The Power of Bamboo: On the Post-compromise Security for Searchable Symmetric Encryption," In: Proceeding NDSS 2023, (San Diego, California, USA)
Acknowledgements
This work was supported in part by the Major Science and Technology Projects in Yunnan Province (202202AD080013).
Author information
Authors and Affiliations
Contributions
Writing—original draft, T.P.; Writing—review & editing, B,G. P,S; Funding acquisition, B.G. All authors have read and agreed to the published version of the manuscript.
Corresponding author
Ethics declarations
Competing interests
The authors declare no competing interests.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Peng, T., Gong, B. & Sun, P. Toward privacy-preserving verifiable DSSE for attribute-based cloud computing system. J Supercomput 81, 421 (2025). https://doi.org/10.1007/s11227-024-06912-1
Accepted:
Published:
DOI: https://doi.org/10.1007/s11227-024-06912-1