Skip to main content
Log in

VCSE: Verifiable conjunctive keywords search over encrypted data without secure-channel

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Data outsourcing service has gained remarkable popularity with considerable amount of enterprises and individuals, as it can relief heavy computation and management burden locally. While in most existing models, honest-but-curious cloud service provider (CSP) may return incorrect results and inevitably give rise to serious security breaches, thus the results verification mechanism should be raised to guarantee data accuracy. Furthermore, the construction of secure-channel incurs heavy cryptographic operations and single keyword search returns many irrelevant results. Along these directions, we further design a significantly more effective and secure cryptographic primitive called as verifiable conjunctive keywords search over encrypted data without secure-channel scheme to assure data integrity and availability. Formal security analysis proves that it can effectively stand against outside keyword-guessing attack. As a further contribution, our actual experiments show that it can admit wide applicability in practice.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

Notes

  1. http://www.cs.cmu.edu/enron/

References

  1. Liu Q, Tan CC, Wu J, Wang G (2011) Reliable re-encryption in unreliable clouds. In: Proceedings of 54th IEEE global communications conference (GLOBECOM 2011)

  2. Ren YJ, Shen J, Wang J, Han J, Lee SY (2015) Mutual verifiable provable data auditing in public cloud storage. J Internet Technol 16(2):317–323

    Google Scholar 

  3. Boneh D, Crescenzo GD, Persiano R, Ostrovsky G (2004) Public key encryption with keyword search. In: Proceedings of 23th international conference on the theory and applications of cryptographic techniques (EUROCRYPT 2004)

  4. Curtmola R, Garay JA, Kamara S, Ostrovsky R (2006) Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings 13th ACM conference on computer and communications security (CCS 2006)

  5. Li J, Wang Q, Wang C, Cao N, Ren K, Lou W (2010) Fuzzy keyword search over encrypted data in cloud computing. In: Proceedings of 29th IEEE international conference on computer communications (INFOCOM 2010)

  6. Cai Q, Gong G (2012) Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers. In: Proceedings of 47th IEEE international conference on communications (ICC 2012)

  7. Kamara S, Papamanthou C, Roeder T (2012) Dynamic searchable symmetric encryption. In: Proceedings of 19th ACM conference on computer and communications security (CCS 2012)

  8. Moataz T, Shikfa A (2013) Boolean symmetric searchable encryption. In: Proceedings of 8th ACM symposium on information, computer and communications security (ASIACCS 2013)

  9. Khader D (2014) Introduction to attribute based searchable encryption. In: Proceedings of 15th international conference on communications and multimedia security (CMS 2014)

  10. Emura K, Miyaji A, Rahman MS, Omote K (2015) Generic constructions of secure-channel free searchable encryption with adaptive security. Secur Commun Netw 8(8):1547–1560

    Article  Google Scholar 

  11. Wang JF, Ma H, Tang Q, Li J, Zhu H, Ma SQ, Chen XF (2013) Efficient verifiable fuzzy keyword search over encrypted data in cloud computing. Comput Sci Inf Syst 10(2):667–684

    Article  Google Scholar 

  12. Ateniese G (2014) VABKS: verifiable attribute-based keyword search over outsourced encrypted data. In: Proceedings 33th IEEE international conference on computer communications (INFOCOM 2014)

  13. Sun WH, Wang B, Cao N, Li M, Lou WJ, Hou YT, Li H (2014) Verifiable privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. IEEE Trans Parallel Distrib Syst 25 (11):3025–3035

    Article  Google Scholar 

  14. Fu ZJ, Shu JG, Sun XG, Linge N (2014) Smart cloud search services: verifiable keyword-based semantic search over encrypted cloud data. IEEE Trans Consum Electron 60(4):762–770

    Article  Google Scholar 

  15. Sun WH, Liu XF, Lou WJ, Hou YT, Li H (2015) Catch you if you lie to me: efficient verifiable conjunctive keywords keyword search over large dynamic encrypted cloud data. In: Proc. 34th IEEE international conference on computer communications (INFOCOM 2015)

  16. Hwang YH, Lee PJ (2007) Public key encryption with conjunctive keywords keyword search and its extension to a multi-user system. In: Proc. first international conference on pairing-based cryptography (Pairing 2007)

  17. Wang P, Wang HX, Pieprzyk J (2008) Keyword field-free conjunctive keywords keyword searches on encrypted data and extension for dynamic groups. In: Proc. 7th international conference cryptology and network security (CANS 2008)

  18. Zhang B, Zhang FG (2012) An efficient public key encryption with conjunctive keywords-subset keywords search. J Netw Comput Appl 34(1):262–267 (2011)

    Article  MathSciNet  Google Scholar 

  19. Lee CC, Hsu ST, Hwang MS (2013) A Study of Conjunctive keywords Keyword Searchable Schemes. I J Netw Secur 15(5):321–330 (2013)

    Google Scholar 

  20. Hwang MS, Hsu ST, Lee CC (2014) A new public key encryption with conjunctive keywords field keyword search scheme. ITC 43(3):277–288 (2014)

    Article  Google Scholar 

  21. Fu ZJ, Sun XM, Liu Q, Zhou L, Shu JG (2015) Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans 98-B(1):190–200 (2015)

    Article  Google Scholar 

  22. Fang LM, Susilo W, Ge CP, Wang JD (2009) A secure channel free public key encryption with keyword search scheme without random oracle. In: Proc. 8th international conference cryptology and network security (CANS 2009)

  23. Emura K, Miyaji A, Omote K (2011) Adaptive secure-channel free public-key encryption with keyword search implies timed release encryption. In: Proc. 14th international conference on information security (ISC 2011)

  24. Emura K, Rahman MS (2012) Constructing secure-channel free searchable encryption from anonymous IBE with partitioned ciphertext structure. In: Proc. 9th international conference on security and cryptography (SECRYPT 2012)

  25. Guo LF, Yau WC (2015) Efficient secure-channel free public key encryption with keyword search for EMRs in cloud storage. J Med Syst 39(2):11 (2015)

    Article  Google Scholar 

  26. Fu ZJ, Ren K, Shu JG, Sun XM, Huang FX (2015) Enable personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans Parallel Distrib Syst. doi:10.1109/TPDS.2015.2506573

  27. Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: Proc. 21th IEEE symposium on security and privacy (S& 2000)

  28. Xia ZH, Wang XH, Sun XM, Wang Q (2015) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 27(2):340–352

    Article  Google Scholar 

  29. Golle P, Staddon J, Waters BR (2004) Secure conjunctive keywords keyword search over encrypted data. In: Proc. second international conference applied cryptography and network security (ACNS 2004)

  30. Baek J, Naini RS, Susilo W (2008) Public key encryption with keyword search revisited. In: Proc. 8th international conference on computational science and its applications (ICCSA 2008)

  31. Rhee HS, Park JH, Susilo W, Lee DH (2009) Improved searchable public key encryption with designated tester. In: Proc. 4th ACM symposium on information, computer and communications security (ASIACCS 2009)

  32. Fang LM, Susilo W, Ge C, Wang JD (2013) Public key encryption with keyword search secure against keyword guessing attacks without random oracle. Inf Sci 238:221–241 (2013)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Acknowledgments

This work was supported by the National High Technology Research and Development Program (863 Program) (No. 2015AA016007, No. 2015AA011704), the Key Program of NSFC (No. U1405255, No. U1135002), the Changjiang Scholars and Innovation Research Team in University (No. IRT1078), the Fundamental Research Funds for the Center Universities (No. JY10000903001) and the Major Nature Science Foundation of China (No. 61370078, No. 61309016). The authors would like to thank the editors and the anonymous reviewers for their constructive comments that would help us to improve this paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jianfeng Ma.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Miao, Y., Ma, J., Wei, F. et al. VCSE: Verifiable conjunctive keywords search over encrypted data without secure-channel. Peer-to-Peer Netw. Appl. 10, 995–1007 (2017). https://doi.org/10.1007/s12083-016-0458-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-016-0458-z

Keywords

Navigation