Skip to main content
Log in

Multi-keyword ranked searchable encryption scheme with access control for cloud storage

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

With the advent of cloud computing, data owners are motivated to outsource their data to public clouds for decreasing the cost of management systems. For protecting data privacy, sensitive data must be encrypted before outsourcing. So, equipping cloud server with search service over encrypted data is an important issue. Considering the large number of data users and documents in the cloud, users may be interested to perform multi-keyword search and receive the most related data. In this paper, we investigate the Pasupuleti et al.’s scheme which is a multi-keyword ranked search over encrypted cloud data. Their scheme has problems in index construction, trapdoor generation and search procedures. We address these problems and suggest a multi-keyword ranked search over encrypted data on cloud storage. The proposed ranked searchable encryption scheme enhances system usability by ranking results instead of just sending undifferentiated results and ensures file retrieval accuracy. We also use the relevance score from information retrieval to build a secure searchable index, and apply an additive order-preserving encryption to protect the sensitive scores of files. Our scheme also guarantees access control of users during the data retrieval by attribute-based encryption. Analysis shows that our scheme is secure and efficient for cloud storage.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Rittinghouse JW, Ransome JF (2016) Cloud computing: implementation, management and security. CRC Press

  2. Agrawal R, Kiernan J, Srikant R, Xu Y (2004) Order preserving encryption for numeric data. In: Proceedings of the 2004 ACM SIGMOD international conference on Management of data, pp 563–574

  3. Pasupuleti SK, Ramalingam S, Buyya R (2016) An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing. J Netw Comput Appl 64:12–22

    Article  Google Scholar 

  4. Menezes AJ, van Oorschot PC, Vanstone SA (1996) Handbook of applied cryptography. CRC Press

  5. Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: Proceedings IEEE symposium on security and privacy, S&P 2000. IEEE, pp 44–5

  6. Kamara S, Papamanthou C, Roeder T (2012) Dynamic searchable symmetric encryption. In: Proceedings of the 2012 ACM conference on computer and communications security. ACM, pp 965–976

  7. Poh GS, Mohamad MS, Chin JJ (2018) Searchable symmetric encryption over multiple servers. Cryptogr Commun 10(1):139–158

    Article  MathSciNet  Google Scholar 

  8. Goh EJ (2003) Secure indexes, IACR Cryptology ePrint Archive, 216

  9. Curtmola R, Garay JA, Kamara S, Ostrovsky R (2006) Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of the 13th ACM conference on computer and communications security, pp 79–88

  10. Curtmola R, Garay JA, Kamara S, Ostrovsky R (2011) Searchable symmetric encryption: improved definitions and efficient constructions. J Comput Secur 19(5):895–934

    Article  Google Scholar 

  11. Cheng R, Yan J, Guan C, Zhang F, Ren K (2015) Verifiable searchable symmetric encryption from indistinguishability obfuscation. In: Proceedings of the 10th ACM symposium on information computer and communications security. ACM, pp 621–626

  12. Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. In: International conference on the theory and applications of cryptographic techniques. Springer, Berlin, pp 506–522

    Chapter  Google Scholar 

  13. Li J, Wang Q, Wang C, Cao N, Ren K, Lou W (2010) Fuzzy keyword search over encrypted data in cloud computing. In Infocom, proceedings ieee. IEEE, pp 1–5

  14. Raghavendra S, Geeta CM, Shaila K, Buyya R, Venugopal KR, Iyengar SS, Patnaik LM (2015) MSSS: most significant single-keyword search over encrypted cloud data. In: Proceedings of the 6th annual intrernational conference on ICT: BigData, Cloud and Securit

  15. Pitchai R, Jayashri S, Raja J (2016) Searchable encrypted data file sharing method using public cloud service for secure storage in cloud computing. Wirel Pers Commun 90(2):947–960

    Article  Google Scholar 

  16. Wang H, Dong X, Cao Z (2017) Secure and efficient encrypted keyword search for multi-user setting in cloud computing. Peer-to-Peer Network Appl, 1–11

  17. Buyrukbilen S, Bakiras S (2013) Privacy-preserving ranked search on public-key encrypted data, in high performance computing and communications. In: IEEE 10th International conference on ieee international conference on embedded and ubiquitous computing (HPCC_EUC), pp 165–174

  18. Yu J, Lu P, Zhu Y, Xue G, Li M (2013) Toward secure multikeyword top-k retrieval over encrypted cloud data. IEEE Trans Depend Sec Comput 10(4):239–250

    Article  Google Scholar 

  19. Cao N, Wang C, Li M, Ren K, Lou W (2014) Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans Parallel Distrib Syst 25:222–233

    Article  Google Scholar 

  20. Sun W, Wang B, Cao N, Li M, Lou W, Hou YT, et al. (2014) Verifiable privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. IEEE Trans Parallel Distrib Syst 25:3025–3035

    Article  Google Scholar 

  21. Zhang W, Xiao S, Lin Y, Zhou T, Zhou S (2014) Secure ranked multi-keyword search for multiple data owners in cloud computing. In: 44th Annual IEEE/IFIP International conference on dependable systems and networks (DSN), pp 276–286

  22. Li H, Liu D, Jia K, Lin X (2015) Achieving authorized and ranked multi-keyword search over encrypted cloud data. In: IEEE International conference on in communications (ICC), pp 7450–7455

  23. Sun W, Liu X, Lou W, Hou YT, Li H (2015) Catch you if you lie to me: efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data. In: IEEE Conference on computer communications (INFOCOM), pp 2110–2118

  24. Li H, Liu D, Dai Y, Luan TH, Shen XS (2015) Enabling efficient multi-keyword ranked search over encrypted mobile cloud data through blind storage. IEEE Trans Emerg Topics Comput 3:127–138

    Article  Google Scholar 

  25. Xia Z, Wang X, Sun X, Wang Q (2016) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 27:340–352

    Article  Google Scholar 

  26. Jiang X, Yu J, Yan J, Hao R (2017) Enabling efficient and verifiable multi-keyword ranked search over encrypted cloud data. Inform Sci 403:22–41

    Article  Google Scholar 

  27. Sun W, Yu S, Lou W, Hou YT, Li H (2016) Protecting your right: verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. IEEE Trans Parallel Distrib Syst 27:1187–1198

    Article  Google Scholar 

  28. Miao Y, Ma J, Liu X, Liu Z, Shen L, Wei F (2016) VMKDO: verifiable multi-keyword search over encrypted cloud data for dynamic data-owner. Peer-to-Peer Netw Appl, 1–11

  29. Fan Y, Liu Z (2017) Verifiable attribute-based multi-keyword search over encrypted cloud data in multi-owner setting. In: IEEE Second International conference on data science in cyberspace (DSC), pp 441–449

  30. Wu DN, Gan QQ, Wang X (2018) Verifiable public key encryption with keyword search based on homomorphic encryption in multi-user setting. IEEE Access 6:42445–42453

    Article  Google Scholar 

  31. Liu Z, Wang Z, Cheng X, Jia C, Yuan K (2013) Multi-user searchable encryption with coarser-grained access control in hybrid cloud. In: Fourth International conference on emerging intelligent data and web technologies (EIDWT). IEEE, pp 249–255

  32. Kaci A, Bouabana-Tebibel T (2014) Access control reinforcement over searchable encryption. In: 2014 IEEE 15th International conference on information reuse and integration (IRI). IEEE, pp 130–137

  33. Li J, Zhang L (2014) Attribute-based keyword search and data access control in cloud. In: 2014 Tenth International conference on computational intelligence and security (CIS). IEEE, pp 382–386

  34. Zhou P, Liu Z, Duan S (2016) Flexible attribute-based keyword search via two access policies. In: International conference on broadband and wireless computing, communication and applications. Springer, Cham, pp 815–822

    Google Scholar 

  35. Li H, Yang Y, Dai Y, Bai J, Yu S, Xiang Y (2017) Achieving secure and efficient dynamic searchable symmetric encryption over medical cloud data. IEEE Transactions on Cloud Computing

  36. Cao L, Wang Y, Dong X, Liu Y, Zhang Y, Guo X, Feng T (2018) Multiuser access control searchable privacy-preserving scheme in cloud storage. Int J Commun Syst 31(9):e3548

    Article  Google Scholar 

  37. Ren H, Li H, Dai Y, Yang K, Lin X (2018) Querying in internet of things with privacy preserving: challenges, solutions and opportunities. IEEE Netw 99:1–8

    Google Scholar 

  38. He K, Guo J, Weng J, Weng J, Liu JK, Yi X (2018) Attribute-based hybrid Boolean keyword search over outsourced encrypted data/ IEEE Transactions on Dependable and Secure Computing

  39. Xu G, Li H, Dai Y, Yang K, Lin X (2019) Enabling efficient and geometric range query with access control over encrypted spatial data. IEEE Trans Inf Forens Secur 14(4):870–885

    Article  Google Scholar 

  40. Koo D, Hur J, Yoon H (2013) Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage. Comput Electr Eng 39:34–46

    Article  Google Scholar 

  41. Wang X, Zhang Y (2018) E-SC: collusion-resistant secure outsourcing of sequence comparison algorithm. IEEE Access 6:3358–3375

    Article  Google Scholar 

  42. Jiang X, Ge X, Yu J, Kong F, Cheng X, Hao R (2017) An efficient symmetric searchable encryption scheme for cloud storage. J Internet Serv Inf Secur (JISIS) 7(2):1–18

    Google Scholar 

  43. Witten IH, Moffat A, Bell TC (1999) Managing gigabytes: compressing and indexing documents and images. Morgan Kaufmann

  44. Peng Y, Li H, Cui J, Zhang J, Ma J, Peng C (2017) hOPE: improved order preserving encryption with the power to homomorphic operations of ciphertexts. Sci Chin Inf Sci 60(6):062101

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hamid Mala.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zarezadeh, M., Mala, H. & Ashouri-Talouki, M. Multi-keyword ranked searchable encryption scheme with access control for cloud storage. Peer-to-Peer Netw. Appl. 13, 207–218 (2020). https://doi.org/10.1007/s12083-019-00736-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-019-00736-0

Keywords

Navigation