Skip to main content
Log in

Secure and efficient encrypted keyword search for multi-user setting in cloud computing

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

A key challenge to design searchable encryption in multi-user setting lies in the efficient management of encryption and search keys. Existing multi-user searchable encryption schemes either extend the single-user searchable encryption framework with broadcast encryption or require search user refers to the data owner and get the search token. However, this implies the necessity that the data owner distributes a single shared secret key among the group of users or requires the data owner stay online to authorize other users to search. In this paper, we address this practical problem, which is neglected in the literature. We also study secret-key-recovery attack where a malicious user can deduce a valid secret when given a search token. We show such attack violates secret key privacy, which is important in the whole system. Inspired by asymmetric group key agreement and multilinear map technology, we provide a secure and efficient encrypted keyword search scheme for multi-user setting, in which a data owner can share data with a group users without knowing which user in the group. In the proposed scheme, (a) each user has his own secret key, (b) each user generates trapdoors without getting any help from data owner or the third party, (c) our scheme features constant communication overhead, and (d) our scheme resist the secret-key-recovery attack. Our scheme preserves the traceability inherited from the asymmetric group key agreement system. We offer rigorous security proof of our scheme, and the performance analysis demonstrates the efficiency of our scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Bao F, Deng R H, Ding X, Yang Y (2008) Private query on encrypted data in multi-user settings. In: International conference on information security practice and experience. Springer, pp 71–85

  2. Blake I F, Seroussi G, Smart NP (2005) Advances in elliptic curve cryptography, volume 317 of london mathematical society lecture note series. Camb Univ Press Camb 19(20):666

    Google Scholar 

  3. Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. In: International conference on the theory and applications of cryptographic techniques. Springer, pp 506–522

  4. Boneh D, Gentry C, Waters B (2005) Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Crypto, vol 3621. Springer, pp 258–275

  5. Boneh D, Silverberg A (2003) Applications of multilinear forms to cryptography. Contemp Math 324 (1):71–90

    Article  MathSciNet  Google Scholar 

  6. Boyen X, Waters B (2006) Compact group signatures without random oracles. In: Annual international conference on the theory and applications of cryptographic techniques. Springer, pp 427–444

  7. Cao N, Wang C, Li M, Ren K, Lou W (2014) Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans Parallel Distrib Syst 25(1):222–233

    Article  Google Scholar 

  8. Cash D, Jaeger J, Jarecki S, Jutla C S, Krawczyk H, Rosu M-C, Steiner M (2014) Dynamic searchable encryption in very-large databases: Data structures and implementation. NDSS 14:23–26

    Google Scholar 

  9. Chang Y-C, Mitzenmacher M (2005) Privacy preserving keyword searches on remote encrypted data. In: Applied cryptography and network security. Springer, pp 442–455

  10. Coron J-S, Lepoint T, Tibouchi M (2013) Practical multilinear maps over the integers. In: Advances in cryptology–CRYPTO 2013. Springer, pp 476–493

  11. Cui B, Liu Z, Wang L (2016) Key-aggregate searchable encryption (kase) for group data sharing via cloud storage. IEEE Trans Comput 65(8):2374–2385

    Article  MathSciNet  Google Scholar 

  12. Curtmola R, Garay J, Kamara S, Ostrovsky R (2006) Searchable symmetric encryption: Improved definitions and efficient constructions. In: Proceedings of the 13th ACM conference on computer and communications security. ACM, pp 79–88

  13. Deng Z, Li K, Li K, Zhou J (2017) A multi-user searchable encryption scheme with keyword authorization in a cloud storage. Futur Gener Comput Syst 72:208–218

    Article  Google Scholar 

  14. Dong C, Russello G, Dulay N (2011) Shared and searchable encrypted data for untrusted servers. J Comput Secur 19(3):367– 397

    Article  Google Scholar 

  15. Garg S, Gentry C, Halevi S (2013) Candidate multilinear maps from ideal lattices. In: Annual international conference on the theory and applications of cryptographic techniques. Springer, pp 1–17

  16. Goh E-J et al. (2003) Secure indexes. IACR Cryptology ePrint Archive 2003:216

  17. Huang H, Du J, Wang H, Wang R (2016) A multi-keyword multi-user searchable encryption scheme based on cloud storage. In: Trustcom/BigDataSE/I? SPA, 2016 IEEE. IEEE, pp 1937–1943

  18. Jarecki S, Jutla C, Krawczyk H, Rosu M, Steiner M (2013) Outsourced symmetric private information retrieval. In: Proceedings of the ACM SIGSAC conference on computer & communications security. ACM, pp 875–888

  19. Kermanshahi S K, Liu J K, Steinfeld R (2017) Multi-user cloud-based secure keyword search. In: Australasian conference on information security and privacy. Springer, pp 227–247

  20. Kiayias A, Oksuz O, Russell A, Tang Q, Wang B (2016) Efficient encrypted keyword search for multi-user data sharing. In: European symposium on research in computer security. Springer, pp 173–195

  21. Li H, Yi Y, Luan T, Liang X, Zhou L, Shen X (2015) Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data

  22. Li J, Lin X, Zhang Y, Han J (2016) Ksf-oabe: Outsourced attribute-based encryption with keyword search function for cloud storage. IEEE Trans Serv Comput 1–1

  23. Li J, Wang Q, Wang C, Cao N, Ren K, Lou W (2010) Fuzzy keyword search over encrypted data in cloud computing. In: INFOCOM 2010 proceedings IEEE. IEEE, pp 1–5

  24. Li M, Yu S, Cao N, Lou W (2011) Authorized private keyword search over encrypted data in cloud computing. In: 2011 31st International conference on distributed computing systems (ICDCS). IEEE, pp 383–392

  25. Li M, Shucheng Y, Ren K, Lou W, Hou T Y (2013) Toward privacy-assured and searchable cloud data storage services. IEEE Netw 27(4):56–62

    Article  Google Scholar 

  26. Lu Y (2012) Privacy-preserving logarithmic-time search on encrypted data in cloud. In: NDSS

  27. Lynn B (2006) Pbc library. Online: http://crypto.stanford.edu/pbc

  28. Song D X, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: Proceedings IEEE symposium on security and privacy, 2000. S&P 2000. IEEE, pp 44–55

  29. Sun W, Wang B, Cao N, Li M, Lou W, Hou T Y, Li H (2013) Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. In: Proceedings of the 8th ACM SIGSAC symposium on information, computer and communications security. ACM, pp 71–82

  30. Wu Q, Mu Y, Susilo W, Qin B, Domingo-Ferrer J (2009) Asymmetric group key agreement. In: Advances in Cryptology-EUROCRYPT 2009. Springer, pp 153–170

  31. Xia Z, Wang X, Sun X, Wang Q (2015) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data

  32. Zhao X, Wei D, Wang H (2010) Asymmetric group key agreement with traitor traceability. In: 2010 International conference on computational intelligence and security (CIS). IEEE, pp 347–351

Download references

Acknowledgements

This work was supported in part by the National Natural Science Foundation of China (Grant No. 61371083, 61373154, 61632012, and 61672239), in part by the Prioritized Development Projects through the Specialized Research Fund for the Doctoral Program of Higher Education of China under (Grant No. 20130073130004), and in part by Shanghai High-tech field project under (Grant No. 16511101400).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Haijiang Wang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, H., Dong, X. & Cao, Z. Secure and efficient encrypted keyword search for multi-user setting in cloud computing. Peer-to-Peer Netw. Appl. 12, 32–42 (2019). https://doi.org/10.1007/s12083-017-0622-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-017-0622-0

Keywords

Navigation