Skip to main content

Advertisement

Log in

Toward privacy-preserving verifiable DSSE for attribute-based cloud computing system

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

Dynamic symmetric searchable encryption (DSSE) allows clients to perform keyword searches and updates on encrypted databases outsourced to cloud servers. Ensuring forward privacy is a crucial security property for DSSE schemes to protect data privacy. However, existing forward-private DSSE schemes face significant limitations: they either rely on an honest-but-curious server, assuming it always returns correct search results without providing verification functionality, or they lack support for fine-grained attribute-based searches and access control. As a result, these schemes cannot be directly applied to attribute-based databases. In this paper, we propose the first verifiable forward-private DSSE scheme suitable for attribute-based databases. Specifically, we construct a secure index based on attribute elements to realize fine-grained searches on attribute-value type databases while ensuring the forward privacy of the scheme. We also design a novel verification tag using symmetric homomorphic encryption to verify the correctness of search results. In addition, our scheme achieves access control functionality to ensure that different users can only access authorized files. Experimental evaluations show that our scheme has advantage in the update, search and verification processes. And the security analysis proves our scheme is secure.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Algorithm 1
Algorithm 2
Algorithm 3
Algorithm 4
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Explore related subjects

Discover the latest articles and news from researchers in related subjects, suggested using machine learning.

Data availability

No datasets were generated or analysed during the current study.

Notes

  1. http://archive.ics.uci.edw/ml/index.php.

References

  1. Zheng Y, Lu R, Shao J, Yin F, Zhu H (2022) Achieving practical symmetric searchable encryption with search pattern privacy over cloud. IEEE Trans Serv Comput 15(3):1358–1370

    Article  MATH  Google Scholar 

  2. Gan Q, Wang X, Huang D, Li J, Zhou D, Wang C (2022) Towards multi-client forward private searchable symmetric encryption in cloud computing. IEEE Trans Serv Comput 15(6):3566–3576

    Article  MATH  Google Scholar 

  3. Song DX, Wagner D, Perrig A (2000) Practical Techniques for Searches on Encrypted Data,” In: Proceeding 2000 IEEE Symposium Security and Privacy, pp. 44–55, (Berkeley, CA, USA)

  4. Goh E (2003) Secure indexes. IACR Cryptology Eprint Arch 2003:216–234

    MATH  Google Scholar 

  5. Curtmola R, Garay J, Kamara S, Ostrovsky R (2011) Searchable symmetric encryption: Improved definitions and efficient constructions. J Comput Secur 19(5):895–934

    Article  MATH  Google Scholar 

  6. Chase M, Kamara S (2010) Structured Encryption and Controlled Disclosure,” In: Proceeding ASIACRYPT 2010, pp. 577-594, (Singapore)

  7. Cash D, Grubbs P, Perry J, Ristenpart T (2015) Leakage-abuse Attacks Against Searchable Encryption,” In: Proceeding CCS 2015, pp. 668-679

  8. Cash D et al (2013) Highly-scalable Searchable Symmetric Encryption with Support for Boolean Queries,” In: Proceeding CRYPTO 2013, pp. 353–373, (Santa Barbara, CA, USA)

  9. Kamara S, Papamanthou C, Roeder T (2012) Dynamic Searchable Symmetric Encryption,” In: Proceeding CCS 2012, pp. 965–976, (Raleigh, NC, USA)

  10. Zhang Y, Katz J, Papamanthou C (2016) All your queries are belong to us: The power of file-injection attacks on searchable encryption,” In: Proceeding 25th USENIX Conf. Security Symposium, pp. 707–720 (Austin, TX, USA)

  11. Chang Y-C, Mitzenmacher M Privacy preserving keyword searches on remote encrypted data,” In: ACNS 2005, pp. 442-455

  12. Stefanov E, Papamanthou C, Shi E (2014) Practical Dynamic Searchable Encryption with Small Leakage,” In: Proceeding NDSS 2014, pp. 1–15, (San Diego, CA, USA)

  13. Bost R (2016) “\(\sum o\phi o\xi \): Forward Secure Searchable Encryption,” In: Proceeding CCS 2016, pp. 1143–1154, (Vienna, Austria)

  14. Bost R, Minaud B, Ohrimenko O (2017) Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives,” In: Proceeding CCS 2017, pp. 1465–1482, (Dallas, TX, USA)

  15. Song XF et al (2020) Forward private searchable symmetric encryption with optimized I/O efficiency. IEEE Trans Dependable and Secure Comput 17(5):912–927

    Article  MATH  Google Scholar 

  16. Demertzis I, Chamani JG, Papadopoulos D, Papamanthou C (2020) Dynamic searchable encryption with small client storage,” In: Proceeding NDSS 2020, pp. 1–17, (San Diego, CA, USA)

  17. Sun S-F et al (2021) Practical non-interactive searchable encryption with forward and backward privacy. Proc NDSS 21–25(2012):1–18

    MATH  Google Scholar 

  18. Zuo Cet al (2019) Dynamic Searchable Symmetric Encryption with Forward and Stronger Backward Privacy,” In: Proceeding ESORICS 2019, pp. 283–303, (Luxembourg)

  19. Li S et al (2022) Efficient data retrieval over encrypted attribute-value type databases in cloud-assisted ehealth systems. IEEE Syst J 16(2):3096–3107

    Article  MATH  Google Scholar 

  20. Liu Y et al (2022) Achieving privacy-preserving DSSE for intelligent IoT healthcare system. IEEE Trans Ind Inf 18(3):2010–2020

    Article  MATH  Google Scholar 

  21. Wang K et al (2022) Forward privacy preservation in IoT-enabled healthcare systems. IEEE Trans Ind Inf 18(3):1991–1999

    Article  MATH  Google Scholar 

  22. Dou Haochen et al (2024) Dynamic searchable symmetric encryption with strong security and robustness. IEEE Trans Inf Forens Secur 19:2370–2384. https://doi.org/10.1109/TIFS.2024.3350330

    Article  MATH  Google Scholar 

  23. Chen L, Li J, Li J (2023) Towards forward and backward private dynamic searchable symmetric encryption supporting data deduplication and conjunctive queries. IEEE Internet of Things J 10(19):17408–17423

    Article  MATH  Google Scholar 

  24. Wei Y et al (2019) FSSE: Forward secure searchable encryption with keyed-block chains. Inf Sci 500:113–126

    Article  MathSciNet  MATH  Google Scholar 

  25. Li H et al (2020) Achieving secure and efficient dynamic searchable symmetric encryption over medical cloud data. IEEE Trans Cloud Comput 8(2):484–494

    Article  MATH  Google Scholar 

  26. Patranabis S, Mukhopadhyay D (2021) Forward and Backward Private Conjunctive Searchable Symmetric Encryption,” In: Proceeding NDSS 2021, pp. 1–18

  27. Gao H, Huang H, Xue L, Xiao F, Li Q (2023) Blockchain-enabled fine-grained searchable encryption with cloud-edge computing for electronic health records sharing. IEEE Internet Things J 10(20):18414–18425

    Article  Google Scholar 

  28. Yu J, Liu S, Xu M, Guo H, Zhong F, Cheng W (2023) An efficient revocable and searchable MA-ABE scheme with blockchain assistance for C-IoT. IEEE Internet Things J 10(3):2754–2766

    Article  MATH  Google Scholar 

  29. Yin H, Zhang W, Deng H, Qin Z, Li K (2023) An attribute-based searchable encryption scheme for cloud-assisted IIoT. IEEE Internet Things J 10(12):11014–11023

    Article  Google Scholar 

  30. Jiang C, Xu C, Yang G (2024) Device-Enhanced Secure Cloud Storage with Keyword Searchable Encryption and Deduplication” In: European Symposium on Research in Computer Security, pp. 396-413, Cham, Springer

  31. Chen L, Xu S, Zhang H, Weng J (2024) Fair and exculpable attribute-based searchable encryption with revocation and verifiable outsourced decryption using smart contract. IEEE Internet Things J. https://doi.org/10.1109/JIOT.2024.3484227

    Article  MATH  Google Scholar 

  32. Chai Q, Gong G (2012) “Verifiable symmetric searchable encryption for semi-honest-but-curiouscloud servers,” In: Proceeding IEEE International Conference on Communications, pp. 917-922

  33. Ge X, Yu J, Zhang H, Hu C, Li Z, Qin Z, Hao R (2021) Towards achieving keyword search over dynamic encrypted cloud data with symmetric-key based verification. IEEE Trans Dependable Secur Comput 18(1):490–504

    Article  MATH  Google Scholar 

  34. Zhang Z, Wang J, Wang Y, Su Y, Chen X (2019) Towards Efficient Verifiable Forward Secure Searchable Symmetric Encryption, In: Proceeding 24th European Symposium on Research in Computer Security, pp. 304-321

  35. Yanget Y et al (2024) OpenSE: efficient verifiable searchable encryption with access and search pattern hidden for cloud-IoT. IEEE Internet Things J 11(8):13793–13809

    Article  Google Scholar 

  36. Li J, Ji L, Zhang Y, Lu Y, Ning J (2024) Response-hiding and volume-hiding verifiable searchable encryption with conjunctive keyword search. IEEE Trans Comput. https://doi.org/10.1109/TC.2024.3485172

    Article  MATH  Google Scholar 

  37. Chen B, Xiang T, He D, Li H, Choo K-KR (2023) BPVSE: publicly verifiable searchable encryption for cloud-assisted electronic health records. IEEE Trans Inf Forens Secur 18:3171–3184

    Article  Google Scholar 

  38. Guo C, Li W, Tang X, Choo K-KR, Liu Y (2024) Forward private verifiable dynamic searchable symmetric encryption with efficient conjunctive query. IEEE Trans Dependable Secure Comput 21(2):746–763

    Article  MATH  Google Scholar 

  39. Chen T, Xu P, Picek S, Luo B, Susilo W, Jin H, Liang K (2023) The Power of Bamboo: On the Post-compromise Security for Searchable Symmetric Encryption," In: Proceeding NDSS 2023, (San Diego, California, USA)

Download references

Acknowledgements

This work was supported in part by the Major Science and Technology Projects in Yunnan Province (202202AD080013).

Author information

Authors and Affiliations

Authors

Contributions

Writing—original draft, T.P.; Writing—review & editing, B,G. P,S; Funding acquisition, B.G. All authors have read and agreed to the published version of the manuscript.

Corresponding author

Correspondence to Tianqi Peng.

Ethics declarations

Competing interests

The authors declare no competing interests.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Peng, T., Gong, B. & Sun, P. Toward privacy-preserving verifiable DSSE for attribute-based cloud computing system. J Supercomput 81, 421 (2025). https://doi.org/10.1007/s11227-024-06912-1

Download citation

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11227-024-06912-1

Keywords