Abstract
Cloud computing is now being used by more and more enterprises and individuals. To protect the privacy of outsourced data in the cloud, the searchable symmetric encryption is adopted. However, verifying search results to detect whether there is malicious behavior in the cloud server is still a challenge. In order to overcome this problem, we propose an efficient verifiable search scheme (EVSS), which allows users to retrieve ciphertext and verify the search result efficiently. A novel RSA accumulator-based Patricia tree (RAP-tree) is designed as the search index, where the token of a keyword and the proof evidence of documents containing the keyword are taken as the key-value pair to be placed in a node of the tree. By using the RAP-tree index, the efficient verifiable keyword search over encrypted data is realized. The security of the proposed scheme is analyzed by theoretical proofs. Experimental results on real data sets show that the proposed scheme is efficient and effective in terms of search processing and result verification.















Similar content being viewed by others
Data availability
Details of the datasets have been described in Section 7.
References
Jiaxun, H., Yu, L., He, C., Xiuxia, T., Cheqing, J.: An enhanced wildcard-based fuzzy searching scheme in encrypted databases. World Wide Web 23(3), 2185–2214 (2020)
Qiang, C., Yanping, L., Zhenqiang, W., Yinbin, M., Jianqing, L.: Privacy-preserving conjunctive keyword search on encrypted data with enhanced fine-grained access control. World Wide Web 23(2), 959–989 (2020)
Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceedings of the 2000 IEEE Symposium on Security and Privacy, pp 44–55. IEEE Computer Society (2000)
Goh, E.-J.: Secure indexes, IACR Cryptology ePrint Archive. 2003, 1–18 (2004)
Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: Improved definitions and efficient constructions. J. Comput. Secur. 19(5), 895–934 (2011)
Tiwari, M.: Fuzzy keyword search over encrypted data in cloud computing. International Journal of Research in Engineering & Technology 4(6), 15–20 (2016)
Sun, W., Shucheng, Y., Lou, W., Thomas, Y., Li, H.: Protecting your right: Verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. IEEE Transaction on Parallel Distributed System 27(4), 1187–1198 (2016)
Zhang, W., Lin, Y., Xiao, S., Liu, Q., Zhou, T.: Secure distributed keyword search in multiple clouds. IEEE, IWQoS (2014)
Kurosawa, K., Ohtaki, Y.: Uc-secure searchable symmetric encryption. In: Financial Cryptography and Data Security, pp 285–298. Springer, Berlin (2012)
Pang, H., Jain, A., Ramamritham, K., Tan, K.-L.: Verifying completeness of relational query results in data publishing. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, pp 407–418. Association for Computing Machinery (2005)
Narasimha, M., Tsudik, G.: Dsac: integrity for outsourced databases with signature aggregation and chaining. In: Proceedings of the 2005 ACM CIKM International Conference on Information and Knowledge Management, pp 235–236. Association for Computing Machinery (2005)
Chai, Q., Gong, G.: Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers. IEEE (2012)
Kumar, M., Pasupuleti, S.K.: Lightweight verifiable auditing for outsourced database in cloud computing. In: Distributed Computing and Internet Technology - 14th International Conference, pp 280–287. Springer (2018)
Yang, Y., Papadopoulos, S., Papadias, D., Kollios, G.: Authenticated indexing for outsourced spatial databases. VLDB J. 18(3), 631–648 (2009)
Camenisch, J., Lysyanskaya, A.: Dynamic accumulators and application to efficient revocation of anonymous credentials. In: Advances in Cryptology-CRYPTO 2002, pp 61–76. Springer, Berlin (2002)
Chang, Y.-C., Mitzenmacher, M.: Privacy preserving keyword searches on remote encrypted data. In: Applied Cryptography and Network Security, vol. 3531, pp 442–455. Springer, Berlin (2005)
Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Advances in Cryptology-EUROCRYPT 2004, vol. 3027, pp 506–522. Springer, Berlin (2004)
Golle, P., Staddon, J., Waters, B.: Secure conjunctive keyword search over encrypted data. In: Applied Cryptography and Network Security, pp 31–45. Springer, Berlin (2004)
Boneh, D., Waters, B.: Conjunctive, subset, and range queries on encrypted data. In: Theory of Cryptography, pp 535–554. Springer, Berlin (2007)
Hore, B., Chang, E.-C., Diallo, M., Mehrotra, S.: Indexing encrypted documents for supporting efficient keyword search. In: Secure Data Management-9th VLDB Workshop, pp 93–110. Springer (2012)
Chuah, M., Hu, W.: Privacy-aware bedtree based solution for fuzzy multi-keyword search over encrypted data. In: Proceedings of the 2011 31st International Conference on Distributed Computing Systems Workshops, pp 273–281. IEEE Computer Society (2011)
Xu, P., Jin, H.: Public-key encryption with fuzzy keyword search: a provably secure scheme under keyword guessing attack. IEEE Transaction on Computers 62(11), 2266–2277 (2013)
Wang, C., Ren, K., Yu, S.: Achieving usable and privacy-assured similarity search over outsourced cloud data. In: Proceedings of the IEEE INFOCOM 2012, pp 451–459. IEEE (2012)
Pang, H., Mouratidis, K.: Authenticating the query results of text search engines. The Proceedings of the VLDB Endowment (PVLDB) 1(1), 126–137 (2008)
Zhang, Z., Wang, J., Wang, Y., Su, Y., Chen, X.: Towards efficient verifiable forward secure searchable symmetric encryption. In: Computer Security-ESORICS 2019, vol. 11736, pp 304–321. Springer International Publishing (2019)
Gao, X., Yu, J., Chang, Y., Wang, H., Fan, J.: Checking only when it is necessary: Enabling integrity auditing based on the keyword with sensitive information privacy for encrypted cloud data. IEEE Transactions on Dependable and Secure Computing PP 1–17 (2021)
Hu, H., Xu, J., Chen, Q., Yang, Z.: Authenticating location-based services without compromising location privacy. In: Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data, pp 301–312. Association for Computing Machinery (2012)
Deepa, N., Perumal, P.: Hybrid context aware recommendation system for e-health care by merkle hash tree from cloud using evolutionary algorithm. Soft. Comput. 24(10), 7149–7161 (2020)
Zhu, J., Li, Q., Wang, C., Yuan, X., Wang, Q., Ren, K.: Enabling generic, verifiable, and secure data search in cloud services. IEEE Trans. Parallel Distrib. Syst. 29(8), 1721–1735 (2018)
Liu, Q., Nie, X., Liu, X., Peng, T., Wu, J.: Verifiable ranked search over dynamic encrypted data in cloud computing. In: 25th IEEE/ACM International Symposium on Quality of Service, pp 1–6. IEEE (2017)
Liu, Q., Tian, Y., Wu, J., Peng, T., Wang, G.: Enabling verifiable and dynamic ranked search over outsourced data. IEEE Trans. Serv. Comput. 15(1), 69–82 (2022)
Goodrich, M., Tamassia, R., Hasic Telalovic, J.: An efficient dynamic and distributed rsa accumulator. arXiv:0905.1307 (2009)
Wood, G.: Ethereum: A secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151, 1–32 (2014)
Liu, Z., Li, T., Li, P., Jia, C., Li, J.: Verifiable searchable encryption with aggregate keys for data sharing system. Futur. Gener. Comput. Syst. 78, 778–788 (2018)
Kamara, S., Papamanthou, C., Roeder, T.: Cs2: A searchable cryptographic cloud storage system (2011)
New york times database: https://developer,nytimes.com/docs (2020)
Funding
This work is supported by the National Natural Science Foundation of China under the grant Nos.61872197, 61972209, 61902199 and 61771251; the Postdoctoral Science Foundation of China under the Grand No. 2019M651919; the Postgraduate Research and Practice Innovation Program of Jiangsu Province under the Grand No. KYCX22_0984.
Author information
Authors and Affiliations
Contributions
This work thanks the following authors for their contributions: Qian Zhou and Hua Dai contributed to the conception of the study; Qian Zhou and Wenjie Sheng performed the experiment; Qian Zhou and Yuanlong Liu contributed significantly to analysis and manuscript preparation; Hua Dai and Wenjie Sheng performed the data analyses and wrote the manuscript; Geng Yang helped perform the analysis with constructive discussions.
Corresponding author
Ethics declarations
Ethics approval and consent to participate
Our manuscripts were not submitted to multiple journals for simultaneous consideration and original. All authors agree with the content of the article.
Consent for publication
Our manuscript is approved by all authors for publication.
Competing interests
No conflict of interest exits in the submission of this manuscript, and manuscript is approved by all authors for publication.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Zhou, Q., Dai, H., Sheng, W. et al. EVSS: An efficient verifiable search scheme over encrypted cloud data. World Wide Web 26, 1459–1479 (2023). https://doi.org/10.1007/s11280-022-01097-0
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11280-022-01097-0