skip to main content
10.1145/3490322.3490347acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicbdtConference Proceedingsconference-collections
research-article

Privacy-Preserving Phrase Search over Encrypted Data

Published: 27 December 2021 Publication History

Abstract

Phrase search, as a special multi-keyword search, plays an important role in many application scenarios. It not only requires the searched keywords are consecutive, but also the location relation of searched keywords is fixed. To save local storage, more and more data owners would like to outsource their data to the cloud server. In order to ensure data security and user privacy, data is generally stored on the cloud server in encrypted form. Unfortunately, encrypted data will lose the ability of being directly searched. In order to address the problem, Searchable Symmetric Encryption (SSE) technology came into being. Most of existing phrase search SSE schemes require two rounds of interaction between the user side and the cloud server or a trusted third party or disclose location information to cloud server. In this paper, we present a phrase search SSE scheme that supports dynamic update. Our scheme only needs single round interaction between the user and the cloud server, and the location information cannot be revealed. Our scheme exploits Virtual Binary Tree (VBTree), which is only a logical structure used to store keywords. In actual storage, elements of each leaf node are stored in the hash table and non-leaf node is mapped to the bloom filter. In order to determine the location relation of searched keywords, our scheme utilizes homomorphic encryption and bilinear map. In this way, the location information cannot be revealed.

References

[1]
A. Bisong and S. Rahman. An overview of the security concerns in enterprise cloud computing. International Journal of Network Security and Its Applications, 3(30-45), 2011.
[2]
A. Verma and S. Kaushal. Cloud computing security issues and challenges: A survey. International Journal of Computer Networks, 3:445–454, 2011.
[3]
http://www.dsj365.cn/front/article/6019.html.
[4]
D. Song, D. Wagner, and A. Perrig. Practical techniques for searches on encrypted data. In IEEE Computer Society Symposium on Research in Security and Privacy, pages 44–55, 2002.
[5]
R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky. Searchable symmetric encryption: improved definitions and efficient constructions. Journal of Computer Security, 19(5):895–934, 2011.
[6]
E. Goh. Secure indexes. iacr cryptology eprint archive, 2003.
[7]
C. Cai, J. Weng, X. Yuan, and C. Wang. Enabling reliable keyword search in encrypted decentralized storage with fairness. IEEE Transactions on Dependable and Secure Computing, pages 131–144, 2018.
[8]
H. Li, F. Zhang, and C. Fan. Deniable searchable symmetric encryption. Information Sciences, 402:233–243, 2017.
[9]
N. Cao, C. Wang, M. Li, K. Ren, and W. Lou. Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Transactions on parallel and distributed systems, 25(1):222–233, 2013.
[10]
Z. Fu, X. Wu, Q. Wang, and K. Ren. Enabling central keyword-based semantic extension search over encrypted outsourced data. IEEE Transactions on Information Forensics and Security, 12(12):2986–2997, 2017.
[11]
H. Yin, Z. Qin, J. Zhang, L. Ou, F. Li, and K. Li. Secure conjunctive multi-keyword ranked search over encrypted cloud data for multiple data owners. Future Generation Computer Systems, 100:689–700, 2019.
[12]
Z. Guan, X. Liu, L. Wu, J. Wu, R. Xu, J. Zhang, and Y. Li. Cross-lingual multi-keyword rank search with semantic extension over encrypted data. Information Sciences, 514:523–540, 2020.
[13]
Y. Tang, D. Gu, N. Ding, and H. Lu. Phrase search over encrypted data with symmetric encryption scheme. In 2012 32nd International Conference on Distributed Computing Systems Workshops, pages 471–480, 2012.
[14]
S. Zittrower and C. C. Zou. Encrypted phrase searching in the cloud. In 2012 IEEE Global Communications Conference (GLOBECOM), pages 764–770, 2012.
[15]
H. T. Poon and A. Miri. Fast phrase search for encrypted cloud storage. IEEE Transactions on Cloud Computing, 7(4):1002–1012, 2017.
[16]
I. G. Ray, Y. Rahulamathavan, and M. Rajarajan. A new lightweight symmetric searchable encryption scheme for string identification. IEEE Transactions on Cloud Computing, 8(3):672–684, 2018.
[17]
M. Shen, B. Ma, L. Zhu, X. Du, and K. Xu. Secure phrase search for intelligent processing of encrypted data in cloud-based IoT. IEEE Internet of Things Journal, 6(2):1998–2008, 2018.

Cited By

View all
  • (2023)Leveraging Searchable Encryption through Homomorphic Encryption: A Comprehensive AnalysisMathematics10.3390/math1113294811:13(2948)Online publication date: 1-Jul-2023
  • (2023)Searchable EncryptionAdvances to Homomorphic and Searchable Encryption10.1007/978-3-031-43214-9_4(89-134)Online publication date: 27-Sep-2023

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICBDT '21: Proceedings of the 4th International Conference on Big Data Technologies
September 2021
189 pages
ISBN:9781450385091
DOI:10.1145/3490322
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 27 December 2021

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. big data
  2. cloud storage
  3. phrase search
  4. searchable encryption
  5. symmetric encryption

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ICBDT 2021

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)17
  • Downloads (Last 6 weeks)4
Reflects downloads up to 16 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2023)Leveraging Searchable Encryption through Homomorphic Encryption: A Comprehensive AnalysisMathematics10.3390/math1113294811:13(2948)Online publication date: 1-Jul-2023
  • (2023)Searchable EncryptionAdvances to Homomorphic and Searchable Encryption10.1007/978-3-031-43214-9_4(89-134)Online publication date: 27-Sep-2023

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media