Abstract
Outsourcing data to the cloud has become prevalent, so Searchable Symmetric Encryption (SSE), one of the methods for protecting outsourced data, has arisen widespread interest. Moreover, many novel technologies and theories have emerged, especially for the attacks on SSE and privacy-preserving. But most surveys related to SSE concentrate on one aspect (e.g., single keyword search, fuzzy keyword search) or lack in-depth analysis. Therefore, we revisit the existing work and conduct a comprehensive analysis and summary. We provide an overview of state-of-the-art in SSE and focus on the privacy it can protect. Generally, (1) we study the work of the past few decades and classify SSE based on query expressiveness. Meanwhile, we summarize the existing schemes and analyze their performance on efficiency, storage space, index structures, and so on.; (2) we complement the gap in the privacy of SSE and introduce in detail the attacks and the related defenses; (3) we discuss the open issues and challenges in existing schemes and future research directions. We desire that our work will help novices to grasp and understand SSE comprehensively. We expect it can inspire the SSE community to discover more crucial leakages and design more efficient and secure constructions.
- [1] . 2016. Executing boolean queries on an encrypted bitmap index. In Proceedings of the 2016 ACM on Cloud Computing Security Workshop. ACM, 11–22.Google ScholarDigital Library
- [2] . 2017. An efficient fuzzy keyword matching technique for searching through encrypted cloud data. In Proceedings of the 2017 International Conference on Research and Innovation in Information Systems. IEEE, 1–5.Google Scholar
- [3] . 2007. Provably-secure schemes for basic query support in outsourced databases. In Proceedings of the International Conference on Data and Applications Security. Springer, 14–30.Google ScholarCross Ref
- [4] . 2016. Searchable symmetric encryption: Optimal locality in linear space via two-dimensional balanced allocations. In Proceedings of the 48th Annual ACM SIGACT Symposium on Theory of Computing. ACM, 1101–1114.Google ScholarDigital Library
- [5] . 2005. Achieving efficient conjunctive keyword searches over encrypted data. In Proceedings of the 7th International Conference on Information and Communications Security. Springer, 414–426.Google ScholarDigital Library
- [6] . 2014. Efficient fuzzy search engine with B -tree search mechanism. In Proceedings of the 2014 International Conference on Information Technology. IEEE, 118–122.Google ScholarDigital Library
- [7] . 2014. Efficient fuzzy search on encrypted data. In Proceedings of the 21st International Workshop on Fast Software Encryption. Springer, 613–633.Google Scholar
- [8] . 2004. Public key encryption with keyword search. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 506–522.Google ScholarCross Ref
- [9] . 2013. Constrained pseudorandom functions and their applications. In Proceedings of the 19th International Conference on the Theory and Application of Cryptology and Information Security. Springer, 280–300.Google ScholarCross Ref
- [10] . 1976. Testing for the consecutive ones property, interval graphs, and graph planarity using PQ-tree algorithms. Journal of Computer and System Sciences 13, 3 (1976), 335–379.Google ScholarDigital Library
- [11] . 2014. A survey of provably secure searchable encryption. ACM Computing Surveys 47, 2 (2014), 1–51.Google ScholarDigital Library
- [12] . 2016. \(\sum\)o\(\varphi\)o\(\varsigma\): Forward secure searchable encryption. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, 1143–1154.Google ScholarDigital Library
- [13] . 2017. Forward and backward private searchable encryption from constrained cryptographic primitives. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. ACM, 1465–1482.Google ScholarDigital Library
- [14] . 1994. A block-sorting lossless data compression algorithm. In Proceedings of the Digital SRC Research Report. Citeseer.Google Scholar
- [15] . 2006. Efficient conjunctive keyword search on encrypted data storage system. In Proceedings of the European Public Key Infrastructure Workshop. Springer, 184–196.Google ScholarDigital Library
- [16] . 2013. Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems 25, 1 (2013), 222–233.Google ScholarDigital Library
- [17] . 2015. Leakage-abuse attacks against searchable encryption. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. ACM, 668–679.Google ScholarDigital Library
- [18] . 2014. Dynamic searchable encryption in very-large databases: Data structures and implementation. In Proceedings of the 21st Annual Network and Distributed System Security Symposium. The Internet Society.Google ScholarCross Ref
- [19] . 2013. Highly-scalable searchable symmetric encryption with support for boolean queries. In Proceedings of the 33rd Annual Cryptology Conference. Springer, 353–373.Google ScholarCross Ref
- [20] . 2014. The locality of searchable symmetric encryption. In Proceedings of the 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 351–368.Google ScholarCross Ref
- [21] . 2012. Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers. In Proceedings of the IEEE International Conference on Communications. IEEE, 917–922.Google ScholarCross Ref
- [22] . 2018. New constructions for forward and backward private symmetric searchable encryption. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. ACM, 1038–1055.Google ScholarDigital Library
- [23] . 2005. Privacy preserving keyword searches on remote encrypted data. In Proceedings of the Applied Cryptography and Network Security. Springer, 442–455.Google ScholarDigital Library
- [24] . 2015. Substring-searchable symmetric encryption. Proc. Priv. Enhancing Technol. 2015, 2 (2015), 263–281.Google ScholarCross Ref
- [25] . 2015. An efficient privacy-preserving ranked keyword search method. IEEE Transactions on Parallel and Distributed Systems 27, 4 (2015), 951–963.Google ScholarDigital Library
- [26] . 2019. SgxPectre: Stealing intel secrets from sgx enclaves via speculative execution. In Proceedings of the IEEE European Symposium on Security and Privacy.IEEE, 142–157.Google ScholarCross Ref
- [27] . 2018. Differentially private access patterns for searchable symmetric encryption. In Proceedings of the 2018 IEEE Conference on Computer Communications. IEEE, 810–818.Google ScholarDigital Library
- [28] . 2017. EliMFS: Achieving efficient, leakage-resilient, and multi-keyword fuzzy search on encrypted cloud data. IEEE Transactions on Services Computing 13, 6 (2017), 1072–1085.Google ScholarCross Ref
- [29] . 2021. Bestie: Very practical searchable encryption with forward and backward security. In Proceedings of the 26th European Symposium on Research in Computer Security. Springer, 3–23.Google ScholarDigital Library
- [30] . 2011. Privacy-aware BedTree based solution for fuzzy multi-keyword search over encrypted data. In Proceedings of the 31st IEEE International Conference on Distributed Computing Systems Workshops. IEEE Computer Society, 273–281.Google ScholarDigital Library
- [31] . 2006. Searchable symmetric encryption: Improved definitions and efficient constructions. In Proceedings of the 13th ACM Conference on Computer and Communications Security. ACM, 79–88.Google ScholarDigital Library
- [32] . 2021. A highly accurate query-recovery attack against searchable encryption using non-indexed documents. In Proceedings of the 30th USENIX Security Symposium. USENIX Association, 143–160.Google Scholar
- [33] . 2020. Dynamic searchable encryption with small client storage. In Proceedings of the 27th Annual Network and Distributed System Security Symposium. The Internet Society.Google ScholarCross Ref
- [34] . 2020. SEAL: Attack mitigation for encrypted databases via adjustable leakage. In Proceedings of the 29th USENIX Security Symposium. USENIX Association, 2433–2450.Google Scholar
- [35] . 2016. Practical private range search revisited. In Proceedings of the 2016 International Conference on Management of Data. ACM, 185–198.Google ScholarDigital Library
- [36] . 2017. Fast searchable encryption with tunable locality. In Proceedings of the 2017 ACM International Conference on Management of Data.ACM, 1053–1067.Google ScholarDigital Library
- [37] . 2018. Efficient searchable encryption through compression. Proceedings of the VLDB Endowment 11, 11 (2018), 1729–1741.Google ScholarDigital Library
- [38] . 2017. Privacy-preserving multi-keyword top-k k similarity search over encrypted data. IEEE Transactions on Dependable and Secure Computing 16, 2 (2017), 344–357.Google ScholarDigital Library
- [39] . 2011. Position heaps: A simple and dynamic text indexing data structure. Journal of Discrete Algorithms 9, 1 (2011), 100–121.Google ScholarDigital Library
- [40] . 2015. Rich queries on encrypted data: Beyond exact matches. In Proceedings of the 20th European Symposium on Research in Computer Security. Springer, 123–145.Google ScholarCross Ref
- [41] . 2016. A web traffic analysis attack using only timing information. IEEE Transactions on Information Forensics and Security 11, 8 (2016), 1747–1759.Google ScholarDigital Library
- [42] . 2022. Boolean searchable symmetric encryption with filters on trusted hardware. IEEE Transactions on Dependable and Secure Computing 19, 2 (2022), 1307–1319.Google Scholar
- [43] . 2017. Privacy-preserving smart semantic search based on conceptual graphs over encrypted outsourced data. IEEE Transactions on Information Forensics and Security 12, 8 (2017), 1874–1884.Google ScholarDigital Library
- [44] . 2016. Enabling semantic search based on conceptual graphs over encrypted outsourced data. IEEE Transactions on Services Computing 12, 5 (2016), 813–823.Google ScholarCross Ref
- [45] . 2014. Semantic keyword search based on trie over encrypted cloud data. In Proceedings of the 2nd International Workshop on Security in Cloud Computing. ACM, 59–62.Google ScholarDigital Library
- [46] . 2014. Achieving effective cloud search services: multi-keyword ranked search over encrypted cloud data supporting synonym query. IEEE Transactions on Consumer Electronics 60, 1 (2014), 164–172.Google ScholarCross Ref
- [47] . 2016. Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Transactions on Information Forensics and Security 11, 12 (2016), 2706–2716.Google ScholarCross Ref
- [48] . 2017. Enabling central keyword-based semantic extension search over encrypted outsourced data. IEEE Transactions on Information Forensics and Security 12, 12 (2017), 2986–2997.Google ScholarDigital Library
- [49] . 2018. Semantic-aware searching over encrypted data for cloud computing. IEEE Transactions on Information Forensics and Security 13, 9 (2018), 2359–2371.Google ScholarDigital Library
- [50] . 2016. TWORAM: Efficient oblivious RAM in two rounds with applications to searchable encryption. In Proceedings of the 36th Annual International Cryptology Conference. Springer, 563–592.Google ScholarDigital Library
- [51] . 2019. Towards achieving keyword search over dynamic encrypted cloud data with symmetric-key based verification. IEEE Transactions on Dependable and Secure computing 18, 1 (2019), 490–504.Google ScholarDigital Library
- [52] . 2023. Puncturable ciphertext-policy attribute-based encryption scheme for efficient and flexible user revocation. Science China Information Sciences 66, 7 (2023), 1–17.Google ScholarCross Ref
- [53] . 2003. Secure indexes. IACR Cryptol. ePrint Arch. (2003), 216. Retrieved from http://eprint.iacr.org/2003/216Google Scholar
- [54] . 1987. Towards a theory of software protection and simulation by oblivious RAMs. In Proceedings of the 19th Annual ACM Symposium on Theory of Computing. ACM, 182–194.Google ScholarDigital Library
- [55] . 2004. Secure conjunctive keyword search over encrypted data. In Proceedings of the 2nd International Conference on Applied Cryptography and Network Security. Springer, 31–45.Google ScholarCross Ref
- [56] . 2018. Pump up the volume: Practical database reconstruction from volume leakage on range queries. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. ACM, 315–331.Google ScholarDigital Library
- [57] . 2019. Learning to reconstruct: Statistical learning theory and encrypted database attacks. In Proceedings of the 2019 IEEE Symposium on Security and Privacy. IEEE, 1067–1083.Google ScholarCross Ref
- [58] . 2019. Encrypted databases: New volume attacks against range queries. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. ACM, 361–378.Google ScholarDigital Library
- [59] . 2002. Executing SQL over encrypted data in the database-service-provider model. In Proceedings of the 2002 International Conference on Management of Data. ACM, 216–227.Google Scholar
- [60] . 2018. Practical and secure substring search. In Proceedings of the 2018 International Conference on Management of Data. , , and (Eds.), ACM, 163–176.Google ScholarDigital Library
- [61] . 2017. Oblivious dynamic searchable encryption via distributed PIR and ORAM. IACR Cryptol. ePrint Arch. (2017), 1158. Retrieved 9, August, 2022 from http://eprint.iacr.org/2017/1158Google Scholar
- [62] . 2015. Adaptively secure puncturable pseudorandom functions in the standard model. In Proceedings of the 21st International Conference on the Theory and Application of Cryptology and Information Security. Springer, 79–102.Google ScholarDigital Library
- [63] . 2012. Secure multidimensional range queries over outsourced data. The VLDB Journal 21, 3 (2012), 333–358.Google ScholarDigital Library
- [64] . 2012. Access pattern disclosure on searchable encryption: Ramification, attack and mitigation. In Proceedings of the 19th Annual Network and Distributed System Security Symposium. The Internet Society.Google Scholar
- [65] Xiuxiu Jiang, Jia Yu, Jingbo Yan, and Rong Hao. 2017. Enabling efficient and verifiable multi-keyword ranked search over encrypted cloud data. Inf. Sci. 403 (2017), 22–41.
DOI: Google ScholarDigital Library - [66] . 2017. Boolean searchable symmetric encryption with worst-case sub-linear complexity. In Proceedings of the 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques. 94–124.Google ScholarCross Ref
- [67] . 2018. Structured encryption and leakage suppression. In Proceedings of the 38th Annual International Cryptology Conference. Springer, 339–370.Google ScholarDigital Library
- [68] . 2013. Parallel and dynamic searchable symmetric encryption. In Proceedings of the 17th International Conference on Financial Cryptography and Data Security. Springer, 258–274.Google ScholarCross Ref
- [69] . 2012. Dynamic searchable symmetric encryption. In Proceedings of the ACM Conference on Computer and Communications Security. ACM, 965–976.Google ScholarDigital Library
- [70] . 2016. Generic attacks on secure outsourced databases. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, 1329–1340.Google ScholarDigital Library
- [71] . 2015. Frequency-hiding order-preserving encryption. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. ACM, 656–667.Google ScholarDigital Library
- [72] . 2014. Optimal average-complexity ideal-security order-preserving encryption. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. ACM, 275–286.Google ScholarDigital Library
- [73] . 2013. Delegatable pseudorandom functions and applications. In Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security. ACM, 669–684.Google ScholarDigital Library
- [74] . 2017. Forward secure dynamic searchable symmetric encryption with efficient updates. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. ACM, 1449–1463.Google ScholarDigital Library
- [75] . 2017. Forward secure dynamic searchable symmetric encryption with efficient updates. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. ACM, 1449–1463.Google ScholarDigital Library
- [76] . 2019. Data recovery on encrypted databases with k-nearest neighbor query leakage. In Proceedings of the 2019 IEEE Symposium on Security and Privacy. IEEE, 1033–1050.Google ScholarCross Ref
- [77] . 2020. The state of the uniform: Attacks on encrypted databases beyond the uniform query distribution. In Proceedings of the 2020 IEEE Symposium on Security and Privacy. IEEE, 1223–1240.Google ScholarCross Ref
- [78] . 2013. How to update documents verifiably in searchable symmetric encryption. In Proceedings of the 12th International Conference on Cryptology and Network Security. Springer, 309–328.Google ScholarDigital Library
- [79] . 2012. Efficient similarity search over encrypted data. In Proceedings of the IEEE 28th International Conference on Data Engineering. IEEE Computer Society, 1156–1167.Google ScholarDigital Library
- [80] . 2014. Efficient privacy-aware search over encrypted databases. In Proceedings of the 4th ACM Conference on Data and Application Security and Privacy. ACM, 249–256.Google ScholarDigital Library
- [81] . 2018. Improved reconstruction attacks on encrypted data using range query leakage. In Proceedings of the 2018 IEEE Symposium on Security and Privacy. IEEE Computer Society, 297–314.Google ScholarCross Ref
- [82] . 2018. Result pattern hiding searchable encryption for conjunctive queries. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. ACM, 745–762.Google ScholarDigital Library
- [83] . 2018. Storage efficient substring searchable symmetric encryption. In Proceedings of the 6th International Workshop on Security in Cloud Computing. ACM, 3–13.Google ScholarDigital Library
- [84] . 2023. Verifiable and dynamic multi-keyword search over encrypted cloud data using bitmap. IEEE Transactions on Cloud Computing 11, 1 (2023), 336–348.Google ScholarCross Ref
- [85] . 2023. Towards efficient verifiable boolean search over encrypted cloud data. IEEE Transactions on Cloud Computing 11, 1 (2023), 839–853.Google ScholarCross Ref
- [86] . 2014. Enabling efficient multi-keyword ranked search over encrypted mobile cloud data through blind storage. IEEE Transactions on Emerging Topics in Computing 3, 1 (2014), 127–138.Google ScholarCross Ref
- [87] . 2016. Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data. IEEE Transactions on Dependable and Secure Computing 13, 3 (2016), 312–325.Google ScholarDigital Library
- [88] . 2010. Fuzzy keyword search over encrypted data in cloud computing. In Proceedings of the 29th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies. IEEE, 441–445.Google ScholarCross Ref
- [89] . 2014. Fast range query processing with strong privacy protection for cloud computing. Proceedings of the VLDB Endowment 7, 14 (2014), 1953–1964.Google ScholarDigital Library
- [90] . 2022. VRFMS: Verifiable ranked fuzzy multi-keyword search over encrypted data. IEEE Transactions on Services Computing 16, 1 (2022), 698–710.Google Scholar
- [91] . 2020. Secure and verifiable multikey image search in cloud-assisted edge computing. IEEE Transactions on Industrial Informatics 17, 8 (2020), 5348–5359.Google ScholarCross Ref
- [92] . 2022. Traceable and controllable encrypted cloud image search in multi-user settings. IEEE Transactions on Cloud Computing 10, 4 (2022), 2936–2948.Google ScholarCross Ref
- [93] . 2005. An oblivious transfer protocol with log-squared communication. In Proceedings of the 8th International Conference on Information Security. Springer, 314–328.Google ScholarDigital Library
- [94] . 2008. Collaborative enforcement of firewall policies in virtual private networks. In Proceedings of the 27th Annual ACM Symposium on Principles of Distributed Computing. ACM, 95–104.Google ScholarDigital Library
- [95] . 2011. Fuzzy keyword search on encrypted cloud storage data with small index. In Proceedings of the 2011 IEEE International Conference on Cloud Computing and Intelligence Systems. IEEE, 269–273.Google ScholarCross Ref
- [96] Chang Liu, Liehuang Zhu, Mingzhong Wang, and Yu-an Tan. 2014. Search pattern leakage in searchable encryption: Attacks and new construction. Inf. Sci. 265 (2014), 176–188.
DOI: Google ScholarDigital Library - [97] . 2020. Prime inner product encoding for effective wildcard-based multi-keyword fuzzy search. IEEE Transactions on Services Computing 15, 4 (2020), 1799–1812.Google ScholarCross Ref
- [98] . 2020. Secure multi-keyword fuzzy searches with enhanced service quality in cloud computing. IEEE Transactions on Network and Service Management 18, 2 (2020), 2046–2062.Google ScholarCross Ref
- [99] . 2022. Eurus: Towards an efficient searchable symmetric encryption with size pattern protection. IEEE Transactions on Dependable and Secure Computing 19, 3 (2022), 2023–2037.Google ScholarCross Ref
- [100] . 2019. Privacy preserving substring search protocol with polylogarithmic communication cost. In Proceedings of the 35th Annual Computer Security Applications Conference. ACM, 297–312.Google ScholarDigital Library
- [101] . 2019. Full database reconstruction with access and search pattern leakage. In Proceedings of the 22nd International Conference. Springer, 25–43.Google ScholarDigital Library
- [102] . 2015. Modular order-preserving encryption, revisited. In Proceedings of the 2015 International Conference on Management of Data. ACM, 763–777.Google ScholarDigital Library
- [103] . 2019. Privacy-preserving attribute-based keyword search in shared multi-owner setting. IEEE Transactions on Dependable and Secure Computing 18, 3 (2019), 1080–1094.Google ScholarCross Ref
- [104] . 2018. Lightweight fine-grained search over encrypted data in fog computing. IEEE Transactions on Services Computing 12, 5 (2018), 772–785.Google ScholarCross Ref
- [105] . 2018. Enabling verifiable multiple keywords search over encrypted cloud data. Information Sciences 465 (2018), 21–37.Google ScholarDigital Library
- [106] . 2022. Ranked keyword search over encrypted cloud data through machine learning method. IEEE Transactions on Services Computing 16, 1 (2022), 525–536.Google Scholar
- [107] . 2018. Oblix: An efficient oblivious search index. In Proceedings of the 2018 IEEE Symposium on Security and Privacy. IEEE Computer Society, 279–296.Google ScholarCross Ref
- [108] . 2015. Oblivious substring search with updates. IACR Cryptol. ePrint Arch. (2015), 722. Retrieved 17, August, 2022 from http://eprint.iacr.org/2015/722Google Scholar
- [109] . 2018. Substring search over encrypted data. Journal of Computer Security 26, 1 (2018), 1–30.Google ScholarDigital Library
- [110] . 2013. Boolean symmetric searchable encryption. In Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security. ACM, 265–276.Google ScholarDigital Library
- [111] . 2013. Semantic search over encrypted data. In Proceedings of the 20st International Conference on Telecommunications. IEEE, 1–5.Google ScholarCross Ref
- [112] . 2014. Efficient semantic search over encrypted data in cloud computing. In Proceedings of the International Conference on High Performance Computing & Simulation. IEEE, 382–390.Google ScholarCross Ref
- [113] . 2015. Inference attacks on property-preserving encrypted databases. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. ACM, 644–655.Google ScholarDigital Library
- [114] . 2017. SEMFS: Secure and efficient multi-keyword fuzzy search for cloud storage. In Proceedings of the 13th International Conference on Information Systems Security. Springer, 50–67.Google ScholarCross Ref
- [115] . 2021. LEAP: Leakage-abuse attack on efficiently deployable, efficiently searchable encryption with partially known dataset. In Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2307–2320.Google ScholarDigital Library
- [116] . 2018. Passive attacks against searchable encryption. IEEE Transactions on Information Forensics and Security 14, 3 (2018), 789–802.Google ScholarCross Ref
- [117] . 2013. Toward practical searchable symmetric encryption. In Proceedings of the Advances in Information and Computer Security - 8th International Workshop on Security. Springer, 151–167.Google ScholarCross Ref
- [118] . 2012. Efficient and secure ranked multi-keyword search on encrypted cloud data. In Proceedings of the 2012 Joint EDBT/ICDT Workshops. ACM, 186–195.Google ScholarDigital Library
- [119] . 2021. Hiding the access pattern is not enough: Exploiting search pattern leakage in searchable encryption. In Proceedings of the 30th USENIX Security Symposium. USENIX Association, 127–142.Google Scholar
- [120] . 2014. Blind seer: A scalable private DBMS. In Proceedings of the 2014 IEEE Symposium on Security and Privacy. IEEE Computer Society, 359–374.Google ScholarDigital Library
- [121] . 2021. Efficient boolean search over encrypted data with reduced leakage. In Proceedings of the 27th International Conference on the Theory and Application of Cryptology and Information Security. Springer, 577–607.Google ScholarDigital Library
- [122] . 2019. Mitigating leakage in secure cloud-hosted data structures: Volume-hiding for multi-maps via hashing. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. ACM, 79–93.Google ScholarDigital Library
- [123] . 2021. Forward and backward private conjunctive searchable symmetric encryption. In Proceedings of the 28th Annual Network and Distributed System Security Symposium. The Internet Society.Google ScholarCross Ref
- [124] . 2017. Searchable symmetric encryption: Designs and challenges. ACM Computing Surveys 50, 3 (2017), 1–37.Google ScholarDigital Library
- [125] . 2016. The shadow nemesis: Inference attacks on efficiently deployable, efficiently searchable encryption. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, 1341–1352.Google ScholarDigital Library
- [126] . 2009. Secure anonymous database search. In Proceedings of the 1st ACM Cloud Computing Security Workshop. ACM, 115–126.Google ScholarDigital Library
- [127] . 2007. Efficient conjunctive keyword-searchable encryption. In Proceedings of the 21st International Conference on Advanced Information Networking and Applications. IEEE Computer Society, 409–414.Google ScholarDigital Library
- [128] . 2021. Obfuscated access and search patterns in searchable encryption. In Proceedings of the 28th Annual Network and Distributed System Security Symposium. The Internet Society.Google ScholarCross Ref
- [129] . 2000. Practical techniques for searches on encrypted data. In Proceedings of the 2000 IEEE Symposium on Security and Privacy, Berkeley. IEEE Computer Society, 44–55.Google Scholar
- [130] Qiyang Song, Zhuotao Liu, Jiahao Cao, Kun Sun, Qi Li, and Cong Wang. 2021. SAP-SSE: protecting search patterns and access patterns in searchable symmetric encryption. IEEE Trans. Inf. Forensics Secur. 16, (2021), 1795–1809.
DOI: Google ScholarDigital Library - [131] . 2018. Forward private searchable symmetric encryption with optimized I/O efficiency. IEEE Transactions on Dependable and Secure Computing 17, 5 (2018), 912–927.Google ScholarCross Ref
- [132] . 2014. Practical dynamic searchable encryption with small leakage. In Proceedings of the 21st Annual Network and Distributed System Security Symposium. The Internet Society, 72–75.Google ScholarCross Ref
- [133] . 2013. Path ORAM: An extremely simple oblivious RAM protocol. In Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security. ACM, 299–310.Google ScholarDigital Library
- [134] . 2015. Substring position search over encrypted cloud data using tree-based index. In Proceedings of the 2015 IEEE International Conference on Cloud Engineering. IEEE, 165–174.Google ScholarDigital Library
- [135] . 2021. Practical non-interactive searchable encryption with forward and backward privacy. In Proceedings of the 28th Annual Network and Distributed System Security Symposium. The Internet Society.Google ScholarCross Ref
- [136] . 2018. Practical backward-secure searchable encryption from symmetric puncturable encryption. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. ACM, 763–780.Google ScholarDigital Library
- [137] . 2015. Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data. In Proceedings of the 2015 IEEE Conference on Computer Communications. IEEE, 2110–2118.Google ScholarCross Ref
- [138] . 2013. Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. In Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security. ACM, 71–82.Google ScholarDigital Library
- [139] . 2007. Confidentiality-preserving rank-ordered search. In Proceedings of the 2007 ACM Workshop On Storage Security And Survivability. ACM, 7–12.Google ScholarDigital Library
- [140] . 2022. Verifiable fuzzy multi-keyword search over encrypted data with adaptive security. IEEE Transactions on Knowledge and Data Engineering 35, 5 (2022), 5386–5399.Google Scholar
- [141] . 2015. Inverted index based multi-keyword public-key searchable encryption with strong privacy guarantee. In Proceedings of the 2015 IEEE Conference on Computer Communications. IEEE, 2092–2100.Google ScholarCross Ref
- [142] . 2014. Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud. In Proceedings of the 2014 IEEE Conference on Computer Communications. IEEE, 2112–2120.Google ScholarCross Ref
- [143] . 2021. DP-Sync: Hiding update patterns in secure outsourced databases with differential privacy. In Proceedings of the International Conference on Management of Data. ACM, 1892–1905.Google ScholarDigital Library
- [144] . 2010. Secure ranked keyword search over encrypted cloud data. In Proceedings of the 2010 International Conference on Distributed Computing Systems. IEEE Computer Society, 253–262.Google ScholarDigital Library
- [145] . 2011. Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Transactions on Parallel and Distributed Systems 23, 8 (2011), 1467–1479.Google ScholarDigital Library
- [146] . 2012. Achieving usable and privacy-assured similarity search over outsourced cloud data. In Proceedings of the 31st IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies. IEEE, 451–459.Google ScholarCross Ref
- [147] . 2013. A privacy-preserving fuzzy keyword search scheme over encrypted cloud data. In Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science. IEEE Computer Society, 663–670.Google ScholarDigital Library
- [148] . 2021. Improved file-injection attacks on searchable encryption using finite set theory. The Computer Journal 64, 8 (2021), 1264–1276.Google ScholarCross Ref
- [149] . 2018. Towards efficient verifiable conjunctive keyword search for large encrypted database. In Proceedings of the 23rd European Symposium on Research in Computer Security. Springer, 83–100.Google ScholarDigital Library
- [150] . 2022. Forward and backward-secure range-searchable symmetric encryption. Proc. Priv. Enhancing Technol. 2022, 1 (2022), 28–48.
DOI: Google ScholarCross Ref - [151] . 2013. Efficient verifiable fuzzy keyword search over encrypted data in cloud computing. Computer Science and Information Systems 10, 2 (2013), 667–684.Google ScholarCross Ref
- [152] . 2008. An efficient scheme of common secure indices for conjunctive keyword-based retrieval on encrypted data. In Proceedings of the 9th International Workshop on Information Security Applications. Springer, 145–159.Google Scholar
- [153] . 2008. Keyword field-free conjunctive keyword searches on encrypted data and extension for dynamic groups. In Proceedings of the 7th International Conference on Cryptology and Network Security. Springer, 178–195.Google ScholarDigital Library
- [154] . 2020. Search me in the dark: Privacy-preserving boolean range query over encrypted spatial data. In Proceedings of the 2020 IEEE Conference on Computer Communications. IEEE, 2253–2262.Google ScholarDigital Library
- [155] . 2023. Forward/backward and content private DSSE for spatial keyword queries. IEEE Transactions on Dependable and Secure Computing 20, 4 (2023), 3358–3370.Google ScholarDigital Library
- [156] . 2018. Order-revealing encryption: File-injection attack and forward security. In Proceedings of the 23rd European Symposium on Research in Computer Security. Springer, 101–121.Google ScholarDigital Library
- [157] . 2014. SCORAM: Oblivious RAM for secure computation. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. ACM, 191–202.Google ScholarDigital Library
- [158] . 2014. Oblivious data structures. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. ACM, 215–226.Google ScholarDigital Library
- [159] . 2022. Achieving searchable encryption scheme with search pattern hidden. IEEE Transactions on Services Computing 15, 2 (2022), 1012–1025.Google ScholarCross Ref
- [160] . 2023. OBI: A multi-path oblivious RAM for forward-and-backward-secure searchable encryption. In Proceedings of the 30th Annual Network and Distributed System Security Symposium. The Internet Society.Google ScholarCross Ref
- [161] . 2015. A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems 27, 2 (2015), 340–352.Google ScholarDigital Library
- [162] . 2019. Hardening database padding for searchable encryption. In Proceedings of the 2019 IEEE Conference on Computer Communications. IEEE, 2503–2511.Google ScholarDigital Library
- [163] Peng Xu, Willy Susilo, Wei Wang, Tianyang Chen, Qianhong Wu, Kaitai Liang, and Hai Jin. 2022. ROSE: robust searchable encryption with forward and backward security. IEEE Trans. Inf. Forensics Secur. 17 (2022), 1115–1130.
DOI: Google ScholarCross Ref - [164] . 2016. Secure automata-based substring search scheme on encrypted data. In Proceedings of the Advances in Information and Computer Security - 11th International Workshop on Security. Springer, 111–131.Google ScholarCross Ref
- [165] . 2019. Space-efficient and secure substring searchable symmetric encryption using an improved DAWG. In Proceedings of the 13th International Conference on Provable Security. Springer, 130–148.Google ScholarDigital Library
- [166] Wenyuan Yang and Yuesheng Zhu. 2021. A verifiable semantic searching scheme by optimal matching over encrypted data in public cloud. IEEE Trans. Inf. Forensics Secur. 16 (2021), 100–115.
DOI: Google ScholarCross Ref - [167] . 2006. Privacy-preserving queries on encrypted data. In Proceedings of the 11th European Symposium on Research in Computer Security. Springer, 479–495.Google ScholarDigital Library
- [168] Fan Yin, Rongxing Lu, Yandong Zheng, Jun Shao, Xue Yang, and Xiaohu Tang. 2021. Achieve efficient position-heap-based privacy-preserving substring-of-keyword query over cloud. Comput. Secur. 110 (2021), 102432.
DOI: Google ScholarDigital Library - [169] . 2013. Toward secure multikeyword top-k retrieval over encrypted cloud data. IEEE Transactions on Dependable and Secure Computing 10, 4 (2013), 239–250.Google ScholarDigital Library
- [170] . 2021. Scalable fuzzy keyword ranked search over encrypted data on hybrid clouds. IEEE Transactions on Cloud Computing 11, 1 (2021), 308–323.
DOI: Google ScholarCross Ref - [171] Xianglong Zhang, Wei Wang, Peng Xu, Laurence T. Yang, and Kaitai Liang. 2023. High recovery with fewer injections: practical binary volumetric injection attacks against dynamic searchable encryption. In 32nd USENIX Security Symposium (USENIX Security 23), USENIX Association, Anaheim, CA, 5953–5970. Retrieved from https://www.usenix.org/conference/usenixsecurity23/presentation/zhang-xianglongGoogle Scholar
- [172] . 2016. All your queries are belong to us: The power of file-injection attacks on searchable encryption. In Proceedings of the 25th USENIX Security Symposium. USENIX Association, 707–720.Google Scholar
- [173] . 2010. Bed-tree: An all-purpose index structure for string similarity search based on edit distance. In Proceedings of the ACM SIGMOD International Conference on Management of Data. ACM, 915–926.Google ScholarDigital Library
- [174] . 2019. Towards efficient verifiable forward secure searchable symmetric encryption. In Proceedings of the 24th European Symposium on Research in Computer Security. Springer, 304–321.Google ScholarDigital Library
- [175] Hong Zhong, Zhanfei Li, Jie Cui, Yue Sun, and Lu Liu. 2020. Efficient dynamic multi-keyword fuzzy search over encrypted cloud data. J. Netw. Comput. Appl. 149 (2020).
DOI: Google ScholarDigital Library - [176] W. Zhou, L. Liu, H. Jing, C. Zhang, S. Yao, and S. Wang. 2013. K-Gram based fuzzy keyword search over encrypted cloud computing. Journal of Software Engineering and Applications, 6, 1 (2013), 29–32.
DOI: Google ScholarCross Ref - [177] . 2018. Enabling generic, verifiable, and secure data search in cloud services. IEEE Transactions on Parallel and Distributed Systems 29, 8 (2018), 1721–1735.Google ScholarCross Ref
- [178] . 2016. A novel verifiable and dynamic fuzzy keyword search scheme over encrypted data in cloud computing. In Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA. IEEE, 845–851.Google ScholarCross Ref
- [179] . 2016. Trusted boolean search on cloud using searchable symmetric encryption. In Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA. IEEE, 113–120.Google ScholarCross Ref
- [180] . 2018. Dynamic searchable symmetric encryption schemes supporting range queries with forward (and backward) security. In Proceedings of the 23rd European Symposium on Research in Computer Security. Springer, 228–246.Google ScholarDigital Library
- [181] . 2022. Forward and backward private DSSE for range queries. IEEE Transactions on Dependable and Secure Computing 19, 1 (2022), 328–338.Google ScholarDigital Library
- [182] . 2021. P2HBT: Partially policy hidden e-healthcare system with black-box traceability. Chinese Journal of Electronics 30, 2 (2021), 219–231.Google ScholarCross Ref
Index Terms
- A Survey on Searchable Symmetric Encryption
Recommendations
Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester
Advanced Computer Mathematics based Cryptography and Security TechnologiesThe first searchable public key encryption scheme with designated testers dPEKS known to be secure against keyword guessing attacks was due to Rhee et al. [H.S. Rhee, W. Susilo, and H.J. Kim, Secure searchable public key encryption scheme against ...
Symmetric Searchable Encryption for Database Applications
NBIS '11: Proceedings of the 2011 14th International Conference on Network-Based Information SystemsThis paper proposes an efficient symmetric searchable encryption to achieve indistinguishability of indexes and trapdoors. Previous symmetric searchable encryptions are either insecure because their trapdoor generation algorithms are not probabilistic ...
Improved searchable public key encryption with designated tester
ASIACCS '09: Proceedings of the 4th International Symposium on Information, Computer, and Communications SecurityRecently, Baek et al. proposed an efficient public key encryption scheme with keyword search based on the scheme of Boneh et al., However, the security model of Baek et al. seriously limits the ability of the adversary.
In this paper, we enhance the ...
Comments