Abstract
A key challenge to design searchable encryption in multi-user setting lies in the efficient management of encryption and search keys. Existing multi-user searchable encryption schemes either extend the single-user searchable encryption framework with broadcast encryption or require search user refers to the data owner and get the search token. However, this implies the necessity that the data owner distributes a single shared secret key among the group of users or requires the data owner stay online to authorize other users to search. In this paper, we address this practical problem, which is neglected in the literature. We also study secret-key-recovery attack where a malicious user can deduce a valid secret when given a search token. We show such attack violates secret key privacy, which is important in the whole system. Inspired by asymmetric group key agreement and multilinear map technology, we provide a secure and efficient encrypted keyword search scheme for multi-user setting, in which a data owner can share data with a group users without knowing which user in the group. In the proposed scheme, (a) each user has his own secret key, (b) each user generates trapdoors without getting any help from data owner or the third party, (c) our scheme features constant communication overhead, and (d) our scheme resist the secret-key-recovery attack. Our scheme preserves the traceability inherited from the asymmetric group key agreement system. We offer rigorous security proof of our scheme, and the performance analysis demonstrates the efficiency of our scheme.
Similar content being viewed by others
References
Bao F, Deng R H, Ding X, Yang Y (2008) Private query on encrypted data in multi-user settings. In: International conference on information security practice and experience. Springer, pp 71–85
Blake I F, Seroussi G, Smart NP (2005) Advances in elliptic curve cryptography, volume 317 of london mathematical society lecture note series. Camb Univ Press Camb 19(20):666
Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. In: International conference on the theory and applications of cryptographic techniques. Springer, pp 506–522
Boneh D, Gentry C, Waters B (2005) Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Crypto, vol 3621. Springer, pp 258–275
Boneh D, Silverberg A (2003) Applications of multilinear forms to cryptography. Contemp Math 324 (1):71–90
Boyen X, Waters B (2006) Compact group signatures without random oracles. In: Annual international conference on the theory and applications of cryptographic techniques. Springer, pp 427–444
Cao N, Wang C, Li M, Ren K, Lou W (2014) Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans Parallel Distrib Syst 25(1):222–233
Cash D, Jaeger J, Jarecki S, Jutla C S, Krawczyk H, Rosu M-C, Steiner M (2014) Dynamic searchable encryption in very-large databases: Data structures and implementation. NDSS 14:23–26
Chang Y-C, Mitzenmacher M (2005) Privacy preserving keyword searches on remote encrypted data. In: Applied cryptography and network security. Springer, pp 442–455
Coron J-S, Lepoint T, Tibouchi M (2013) Practical multilinear maps over the integers. In: Advances in cryptology–CRYPTO 2013. Springer, pp 476–493
Cui B, Liu Z, Wang L (2016) Key-aggregate searchable encryption (kase) for group data sharing via cloud storage. IEEE Trans Comput 65(8):2374–2385
Curtmola R, Garay J, Kamara S, Ostrovsky R (2006) Searchable symmetric encryption: Improved definitions and efficient constructions. In: Proceedings of the 13th ACM conference on computer and communications security. ACM, pp 79–88
Deng Z, Li K, Li K, Zhou J (2017) A multi-user searchable encryption scheme with keyword authorization in a cloud storage. Futur Gener Comput Syst 72:208–218
Dong C, Russello G, Dulay N (2011) Shared and searchable encrypted data for untrusted servers. J Comput Secur 19(3):367– 397
Garg S, Gentry C, Halevi S (2013) Candidate multilinear maps from ideal lattices. In: Annual international conference on the theory and applications of cryptographic techniques. Springer, pp 1–17
Goh E-J et al. (2003) Secure indexes. IACR Cryptology ePrint Archive 2003:216
Huang H, Du J, Wang H, Wang R (2016) A multi-keyword multi-user searchable encryption scheme based on cloud storage. In: Trustcom/BigDataSE/I? SPA, 2016 IEEE. IEEE, pp 1937–1943
Jarecki S, Jutla C, Krawczyk H, Rosu M, Steiner M (2013) Outsourced symmetric private information retrieval. In: Proceedings of the ACM SIGSAC conference on computer & communications security. ACM, pp 875–888
Kermanshahi S K, Liu J K, Steinfeld R (2017) Multi-user cloud-based secure keyword search. In: Australasian conference on information security and privacy. Springer, pp 227–247
Kiayias A, Oksuz O, Russell A, Tang Q, Wang B (2016) Efficient encrypted keyword search for multi-user data sharing. In: European symposium on research in computer security. Springer, pp 173–195
Li H, Yi Y, Luan T, Liang X, Zhou L, Shen X (2015) Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data
Li J, Lin X, Zhang Y, Han J (2016) Ksf-oabe: Outsourced attribute-based encryption with keyword search function for cloud storage. IEEE Trans Serv Comput 1–1
Li J, Wang Q, Wang C, Cao N, Ren K, Lou W (2010) Fuzzy keyword search over encrypted data in cloud computing. In: INFOCOM 2010 proceedings IEEE. IEEE, pp 1–5
Li M, Yu S, Cao N, Lou W (2011) Authorized private keyword search over encrypted data in cloud computing. In: 2011 31st International conference on distributed computing systems (ICDCS). IEEE, pp 383–392
Li M, Shucheng Y, Ren K, Lou W, Hou T Y (2013) Toward privacy-assured and searchable cloud data storage services. IEEE Netw 27(4):56–62
Lu Y (2012) Privacy-preserving logarithmic-time search on encrypted data in cloud. In: NDSS
Lynn B (2006) Pbc library. Online: http://crypto.stanford.edu/pbc
Song D X, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: Proceedings IEEE symposium on security and privacy, 2000. S&P 2000. IEEE, pp 44–55
Sun W, Wang B, Cao N, Li M, Lou W, Hou T Y, Li H (2013) Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. In: Proceedings of the 8th ACM SIGSAC symposium on information, computer and communications security. ACM, pp 71–82
Wu Q, Mu Y, Susilo W, Qin B, Domingo-Ferrer J (2009) Asymmetric group key agreement. In: Advances in Cryptology-EUROCRYPT 2009. Springer, pp 153–170
Xia Z, Wang X, Sun X, Wang Q (2015) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data
Zhao X, Wei D, Wang H (2010) Asymmetric group key agreement with traitor traceability. In: 2010 International conference on computational intelligence and security (CIS). IEEE, pp 347–351
Acknowledgements
This work was supported in part by the National Natural Science Foundation of China (Grant No. 61371083, 61373154, 61632012, and 61672239), in part by the Prioritized Development Projects through the Specialized Research Fund for the Doctoral Program of Higher Education of China under (Grant No. 20130073130004), and in part by Shanghai High-tech field project under (Grant No. 16511101400).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Wang, H., Dong, X. & Cao, Z. Secure and efficient encrypted keyword search for multi-user setting in cloud computing. Peer-to-Peer Netw. Appl. 12, 32–42 (2019). https://doi.org/10.1007/s12083-017-0622-0
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-017-0622-0