Skip to main content
Log in

Verifiable dynamic ranked search with forward privacy over encrypted cloud data

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Searchable encryption performs satisfactorily in protecting the privacy of outsourced data in cloud storage scenarios because it encrypts data and provides a secure way of searching on the ciphertext. Dynamic searchable encryption is designed to support the insertion and deletion of outsourced data. However, insertion may cause information leakage of updated keywords. Thus, forward privacy is proposed to limit the leakage of insertion, and it has become a vital security attribute for dynamic schemes. A verifiable dynamic encryption with ranked search (VDERS) scheme helps users to update outsourced data and verify the search result’s accuracy. However, as demonstrated in this study, a VDERS scheme proposed recently fails to satisfy forward privacy because there are two links between the previous search token and the added document. Thus, we designed an improved scheme VDERSc to achieve forward privacy. In our work, we cut off the two links by adding counters and an update buffer. Finally, experiment results showed that our improved scheme supports verification at a finer granularity, leading to a significant proof generation reduction.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Al-Qerem A, Alauthman M, Almomani A, Gupta B (2020) Iot transaction processing through cooperative concurrency control on fog–cloud computing environment. Soft Comput 24(8):5695–5711

    Article  Google Scholar 

  2. Bhushan K, Gupta B (2019) Distributed denial of service (ddos) attack mitigation in software defined network (sdn)-based cloud computing environment. J Ambient Intell Human Comput 10(5):1985–1997

    Article  Google Scholar 

  3. Bost R (2016) oφoς: Forward secure searchable encryption. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp 1143–1154

  4. Camenisch J, Lysyanskaya A (2002) Dynamic accumulators and application to efficient revocation of anonymous credentials. In: Annual international cryptology conference, pp 61–76. Springer

  5. Cao N, Wang C, Li M, Ren K, Lou W (2013) Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans Parallel Distrib Syst 25(1):222–233

    Article  Google Scholar 

  6. Cash D, Jaeger J, Jarecki S, Jutla C, Krawczyk H, Rosu MC, Steiner M (2014) Dynamic searchable encryption in very-large databases: data structures and implementation. In: NDSS, vol 14. Citeseer, pp 23–26

  7. Cash D, Jarecki S, Jutla C, Krawczyk H, Roṡu MC, Steiner M (2013) Highly-scalable searchable symmetric encryption with support for boolean queries. In: Annual cryptology conference. Springer, pp 353–373

  8. Chai Q, Gong G (2012) Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers. In: 2012 IEEE International conference on communications (ICC). IEEE, pp 917–922

  9. Chen C, Zhu X, Shen P, Hu J, Guo S, Tari Z, Zomaya AY (2015) An efficient privacy-preserving ranked keyword search method. IEEE Trans Parallel Distrib Syst 27(4):951–963

    Article  Google Scholar 

  10. Chen CM, Zhang W, Wu TY, Wang KH, Wu JMT, Pan JS (2018) Hierarchical semantic approximate multi-keyword ranked search over encrypted data. In: International conference on smart vehicular technology, transportation, communication and applications. Springer, pp 131–138

  11. Curtmola R, Garay J, Kamara S, Ostrovsky R (2011) Searchable symmetric encryption: improved definitions and efficient constructions. J Comput Secur 19(5):895–934

    Article  Google Scholar 

  12. Ghareh Chamani J, Papadopoulos D, Papamanthou C, Jalili R (2018) New constructions for forward and backward private symmetric searchable encryption. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp 1038–1055

  13. He BZ, Chen CM, Wu TY, Sun HM (2014) An efficient solution for hierarchical access control problem in cloud environment. Math Probl Eng

  14. Kamara S, Papamanthou C (2013) Parallel and dynamic searchable symmetric encryption. In: International conference on financial cryptography and data security. Springer, pp 258–274

  15. Kamara S, Papamanthou C, Roeder T (2012) Dynamic searchable symmetric encryption. In: Proceedings of the 2012 ACM conference on Computer and communications security, pp 965–976

  16. Kim KS, Kim M, Lee D, Park JH, Kim WH (2017) Forward secure dynamic searchable symmetric encryption with efficient updates. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp 1449–1463

  17. Kumari A, Kumar V, Abbasi MY, Kumari S, Chaudhary P, Chen CM (2020) Csef: cloud-based secure and efficient framework for smart medical system using ecc. IEEE Access 8, 107,838–107,852

  18. Kurosawa K, Ohtaki Y (2013) How to update documents verifiably in searchable symmetric encryption. In: International conference on cryptology and network security. Springer, pp 309–328

  19. Liu Q, Tian Y, Wu J, Peng T, Wang G (2019) Enabling verifiable and dynamic ranked search over outsourced data. IEEE Transactions on Services Computing

  20. Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE symposium on security and privacy. S&P 2000. IEEE, pp 44–55

  21. Song X, Dong C, Yuan D, Xu Q, Zhao M (2018) Forward private searchable symmetric encryption with optimized i/o efficiency. IEEE Transactions on Dependable and Secure Computing

  22. Stefanov E, Papamanthou C, Shi E (2014) Practical dynamic searchable encryption with small leakage. In: NDSS, vol 71, pp 72–75

  23. Stergiou C, Psannis KE, Kim BG, Gupta B (2018) Secure integration of iot and cloud computing. Futur Gener Comput Syst 78:964–975

    Article  Google Scholar 

  24. Sun W, Liu X, Lou W, Hou YT, Li H (2015) Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data. In: 2015 IEEE Conference on computer communications (INFOCOM). IEEE, pp 2110–2118

  25. Sun W, Wang B, Cao N, Li M, Lou W, Hou YT, Li H (2013) Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. In: Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, pp 71–82

  26. Tie Z, Wang EK, Yeh JH, Chen CM (2019) Forward privacy analysis of a dynamic searchable encryption scheme. In: International conference on genetic and evolutionary computing. Springer, pp 474–480

  27. Wong WK, Cheung D.W.l, Kao B, Mamoulis N (2009) Secure knn computation on encrypted databases. In: Proceedings of the 2009 ACM SIGMOD International Conference on Management of data, pp 139–152

  28. Wu TY, Chen CM, Wang KH, Meng C, Wang EK (2019) A provably secure certificateless public key encryption with keyword search. J Chin Inst Eng 42(1):20–28

    Article  Google Scholar 

  29. Wu TY, Chen CM, Wang KH, Wu JMT (2019) Security analysis and enhancement of a certificateless searchable public key encryption scheme for iiot environments. IEEE Access 7, 49,232–49,239

  30. Xiong H, Wang Y, Li W, Chen CM (2019) Flexible, efficient, and secure access delegation in cloud computing. ACM Trans Manag Inf Syst (TMIS) 10(1):1–20

    Article  Google Scholar 

  31. Yang L, Zheng Q, Fan X (2017) Rspp: a reliable, searchable and privacy-preserving e-healthcare system for cloud-assisted body area networks. In: IEEE INFOCOM 2017-IEEE Conference on computer communications. IEEE, pp 1–9

  32. Yu C, Li J, Li X, Ren X, Gupta B (2018) Four-image encryption scheme based on quaternion fresnel transform, chaos and computer generated hologram. Multimed Tools Appl 77(4):4585–4608

    Article  Google Scholar 

  33. Zhu J, Li Q, Wang C, Yuan X, Wang Q, Ren K (2018) Enabling generic, verifiable, and secure data search in cloud services. IEEE Trans Parallel Distrib Syst 29(8):1721–1735

    Article  Google Scholar 

Download references

Acknowledgements

This article is supported by Researchers Supporting Project number (RSP-2020/12), King Saud University, Riyadh, Saudi Arabia.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Saru Kumari.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article belongs to the Topical Collection: Special Issue on Security of Mobile, Peer-to-peer and Pervasive Services in the Cloud Guest Editors: B. B. Gupta, Dharma P. Agrawal, Nadia Nedjah, Gregorio Martinez Perez, and Deepak Gupta

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chen, CM., Tie, Z., Wang, E.K. et al. Verifiable dynamic ranked search with forward privacy over encrypted cloud data. Peer-to-Peer Netw. Appl. 14, 2977–2991 (2021). https://doi.org/10.1007/s12083-021-01132-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-021-01132-3

Keywords

Navigation