Abstract
With the advent of cloud computing, data owners are motivated to outsource their data to public clouds for decreasing the cost of management systems. For protecting data privacy, sensitive data must be encrypted before outsourcing. So, equipping cloud server with search service over encrypted data is an important issue. Considering the large number of data users and documents in the cloud, users may be interested to perform multi-keyword search and receive the most related data. In this paper, we investigate the Pasupuleti et al.’s scheme which is a multi-keyword ranked search over encrypted cloud data. Their scheme has problems in index construction, trapdoor generation and search procedures. We address these problems and suggest a multi-keyword ranked search over encrypted data on cloud storage. The proposed ranked searchable encryption scheme enhances system usability by ranking results instead of just sending undifferentiated results and ensures file retrieval accuracy. We also use the relevance score from information retrieval to build a secure searchable index, and apply an additive order-preserving encryption to protect the sensitive scores of files. Our scheme also guarantees access control of users during the data retrieval by attribute-based encryption. Analysis shows that our scheme is secure and efficient for cloud storage.
Similar content being viewed by others
References
Rittinghouse JW, Ransome JF (2016) Cloud computing: implementation, management and security. CRC Press
Agrawal R, Kiernan J, Srikant R, Xu Y (2004) Order preserving encryption for numeric data. In: Proceedings of the 2004 ACM SIGMOD international conference on Management of data, pp 563–574
Pasupuleti SK, Ramalingam S, Buyya R (2016) An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing. J Netw Comput Appl 64:12–22
Menezes AJ, van Oorschot PC, Vanstone SA (1996) Handbook of applied cryptography. CRC Press
Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: Proceedings IEEE symposium on security and privacy, S&P 2000. IEEE, pp 44–5
Kamara S, Papamanthou C, Roeder T (2012) Dynamic searchable symmetric encryption. In: Proceedings of the 2012 ACM conference on computer and communications security. ACM, pp 965–976
Poh GS, Mohamad MS, Chin JJ (2018) Searchable symmetric encryption over multiple servers. Cryptogr Commun 10(1):139–158
Goh EJ (2003) Secure indexes, IACR Cryptology ePrint Archive, 216
Curtmola R, Garay JA, Kamara S, Ostrovsky R (2006) Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of the 13th ACM conference on computer and communications security, pp 79–88
Curtmola R, Garay JA, Kamara S, Ostrovsky R (2011) Searchable symmetric encryption: improved definitions and efficient constructions. J Comput Secur 19(5):895–934
Cheng R, Yan J, Guan C, Zhang F, Ren K (2015) Verifiable searchable symmetric encryption from indistinguishability obfuscation. In: Proceedings of the 10th ACM symposium on information computer and communications security. ACM, pp 621–626
Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. In: International conference on the theory and applications of cryptographic techniques. Springer, Berlin, pp 506–522
Li J, Wang Q, Wang C, Cao N, Ren K, Lou W (2010) Fuzzy keyword search over encrypted data in cloud computing. In Infocom, proceedings ieee. IEEE, pp 1–5
Raghavendra S, Geeta CM, Shaila K, Buyya R, Venugopal KR, Iyengar SS, Patnaik LM (2015) MSSS: most significant single-keyword search over encrypted cloud data. In: Proceedings of the 6th annual intrernational conference on ICT: BigData, Cloud and Securit
Pitchai R, Jayashri S, Raja J (2016) Searchable encrypted data file sharing method using public cloud service for secure storage in cloud computing. Wirel Pers Commun 90(2):947–960
Wang H, Dong X, Cao Z (2017) Secure and efficient encrypted keyword search for multi-user setting in cloud computing. Peer-to-Peer Network Appl, 1–11
Buyrukbilen S, Bakiras S (2013) Privacy-preserving ranked search on public-key encrypted data, in high performance computing and communications. In: IEEE 10th International conference on ieee international conference on embedded and ubiquitous computing (HPCC_EUC), pp 165–174
Yu J, Lu P, Zhu Y, Xue G, Li M (2013) Toward secure multikeyword top-k retrieval over encrypted cloud data. IEEE Trans Depend Sec Comput 10(4):239–250
Cao N, Wang C, Li M, Ren K, Lou W (2014) Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans Parallel Distrib Syst 25:222–233
Sun W, Wang B, Cao N, Li M, Lou W, Hou YT, et al. (2014) Verifiable privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. IEEE Trans Parallel Distrib Syst 25:3025–3035
Zhang W, Xiao S, Lin Y, Zhou T, Zhou S (2014) Secure ranked multi-keyword search for multiple data owners in cloud computing. In: 44th Annual IEEE/IFIP International conference on dependable systems and networks (DSN), pp 276–286
Li H, Liu D, Jia K, Lin X (2015) Achieving authorized and ranked multi-keyword search over encrypted cloud data. In: IEEE International conference on in communications (ICC), pp 7450–7455
Sun W, Liu X, Lou W, Hou YT, Li H (2015) Catch you if you lie to me: efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data. In: IEEE Conference on computer communications (INFOCOM), pp 2110–2118
Li H, Liu D, Dai Y, Luan TH, Shen XS (2015) Enabling efficient multi-keyword ranked search over encrypted mobile cloud data through blind storage. IEEE Trans Emerg Topics Comput 3:127–138
Xia Z, Wang X, Sun X, Wang Q (2016) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 27:340–352
Jiang X, Yu J, Yan J, Hao R (2017) Enabling efficient and verifiable multi-keyword ranked search over encrypted cloud data. Inform Sci 403:22–41
Sun W, Yu S, Lou W, Hou YT, Li H (2016) Protecting your right: verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. IEEE Trans Parallel Distrib Syst 27:1187–1198
Miao Y, Ma J, Liu X, Liu Z, Shen L, Wei F (2016) VMKDO: verifiable multi-keyword search over encrypted cloud data for dynamic data-owner. Peer-to-Peer Netw Appl, 1–11
Fan Y, Liu Z (2017) Verifiable attribute-based multi-keyword search over encrypted cloud data in multi-owner setting. In: IEEE Second International conference on data science in cyberspace (DSC), pp 441–449
Wu DN, Gan QQ, Wang X (2018) Verifiable public key encryption with keyword search based on homomorphic encryption in multi-user setting. IEEE Access 6:42445–42453
Liu Z, Wang Z, Cheng X, Jia C, Yuan K (2013) Multi-user searchable encryption with coarser-grained access control in hybrid cloud. In: Fourth International conference on emerging intelligent data and web technologies (EIDWT). IEEE, pp 249–255
Kaci A, Bouabana-Tebibel T (2014) Access control reinforcement over searchable encryption. In: 2014 IEEE 15th International conference on information reuse and integration (IRI). IEEE, pp 130–137
Li J, Zhang L (2014) Attribute-based keyword search and data access control in cloud. In: 2014 Tenth International conference on computational intelligence and security (CIS). IEEE, pp 382–386
Zhou P, Liu Z, Duan S (2016) Flexible attribute-based keyword search via two access policies. In: International conference on broadband and wireless computing, communication and applications. Springer, Cham, pp 815–822
Li H, Yang Y, Dai Y, Bai J, Yu S, Xiang Y (2017) Achieving secure and efficient dynamic searchable symmetric encryption over medical cloud data. IEEE Transactions on Cloud Computing
Cao L, Wang Y, Dong X, Liu Y, Zhang Y, Guo X, Feng T (2018) Multiuser access control searchable privacy-preserving scheme in cloud storage. Int J Commun Syst 31(9):e3548
Ren H, Li H, Dai Y, Yang K, Lin X (2018) Querying in internet of things with privacy preserving: challenges, solutions and opportunities. IEEE Netw 99:1–8
He K, Guo J, Weng J, Weng J, Liu JK, Yi X (2018) Attribute-based hybrid Boolean keyword search over outsourced encrypted data/ IEEE Transactions on Dependable and Secure Computing
Xu G, Li H, Dai Y, Yang K, Lin X (2019) Enabling efficient and geometric range query with access control over encrypted spatial data. IEEE Trans Inf Forens Secur 14(4):870–885
Koo D, Hur J, Yoon H (2013) Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage. Comput Electr Eng 39:34–46
Wang X, Zhang Y (2018) E-SC: collusion-resistant secure outsourcing of sequence comparison algorithm. IEEE Access 6:3358–3375
Jiang X, Ge X, Yu J, Kong F, Cheng X, Hao R (2017) An efficient symmetric searchable encryption scheme for cloud storage. J Internet Serv Inf Secur (JISIS) 7(2):1–18
Witten IH, Moffat A, Bell TC (1999) Managing gigabytes: compressing and indexing documents and images. Morgan Kaufmann
Peng Y, Li H, Cui J, Zhang J, Ma J, Peng C (2017) hOPE: improved order preserving encryption with the power to homomorphic operations of ciphertexts. Sci Chin Inf Sci 60(6):062101
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Zarezadeh, M., Mala, H. & Ashouri-Talouki, M. Multi-keyword ranked searchable encryption scheme with access control for cloud storage. Peer-to-Peer Netw. Appl. 13, 207–218 (2020). https://doi.org/10.1007/s12083-019-00736-0
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-019-00736-0