Skip to main content
Log in

Enabling efficient and verifiable secure search on cloud-based encrypted big data

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Verifiable symmetric searchable encryption schemes have received a lot of attention as they can guarantee the correctness of query results in case of attack or misconfiguration of cloud servers. However, these schemes either suffer from the problem of using memory space in exchange for search speed, or need to perform a large amount of computation at some stage. To address these problems, we propose an Efficient and Verifiable Secure Search scheme (EVSS). In particular, the scheme designs a new index structure Privacy Protection - Finite State Transducers (PPFST), to verify the correctness of search results by storing path information, node states and their proofs on each PPFST arc. Besides, the structure can reuse common prefixes and suffixes to reduce storage space. In addition, the EVSS scheme uses the Key Derivation Function to act on file identifiers to resist substitution attacks and reduce the computational overhead in the index generation and verification phases. Compared with the state-of-the-art technology, our proposed solution accelerates the result validation time by a thousand times, with an index construction cost of one-tenth and a storage cost of 1%.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

Data availability

The datasets generated or analyzed during this study are available in the wikimedia repository, https://dumps.wikimedia.org/enwiki/.

Notes

  1. Wikimedia (2023). https://dumps.wikimedia.org/enwiki/.

  2. (2023). https://github.com/fxsjy/jieba#.

References

  1. Li A, Chen Y, Yan Z, Zhou X, Shimizu S (2022) A survey on integrity auditing for data storage in the cloud: From single copy to multiple replicas. IEEE Trans Big Data 8:1428–1442

    Article  Google Scholar 

  2. Zhang J, Wang A, Ma X, Carver B, Newman NJ, Anwar A, Rupprecht L, Skourtis D, Tarasov V, Yan F, Cheng Y (2022) Infinistore: Elastic serverless cloud storage. Proc VLDB Endow 16:1629–1642

    Article  Google Scholar 

  3. Sun J, Xu G, Zhang T, Yang X, Alazab M, Deng RH (2023) Verifiable, fair and privacy-preserving broadcast authorization for flexible data sharing in clouds. IEEE Trans Inf Forensics Secur 18:683–698

    Article  Google Scholar 

  4. Cash D, Jaeger J, Jarecki S, Jutla CS, Krawczyk H, Rosu M-C, Steiner M (2014) Dynamic searchable encryption in very-large databases: Data structures and implementation. IACR Cryptol ePrint Arch 2014:853

    Google Scholar 

  5. Bahrami S, Ghasemi R (2022) A new secure and searchable data outsourcing leveraging a bucket-chain index tree. J Inf Secur Appl 67:103206

    Google Scholar 

  6. Zhang X, Zhao B, Qin J, Hou W, Su Y, Yang H (2021) Practical wildcard searchable encryption with tree-based index. Int J Intell Syst 36:7475–7499

    Article  Google Scholar 

  7. Zhu J, Li Q, Wang C, Yuan X, Wang Q, Ren K (2018) Enabling generic, verifiable, and secure data search in cloud services. IEEE Trans Parallel Distrib Syst 29:1721–1735

    Article  Google Scholar 

  8. Shi Z, Fu X, Li X, Zhu K (2022) Esvsse: Enabling efficient, secure, verifiable searchable symmetric encryption. IEEE Trans Knowl Data Eng 34:3241–3254

    Google Scholar 

  9. Wang Q, Zhang X, Qin J, Ma J, Huang X (2021) A verifiable symmetric searchable encryption scheme based on the AVL tree. Comput J 66:174–183

    Article  MathSciNet  Google Scholar 

  10. Chen Q, Fan K, Zhang K, Wang H-Y, Li H, Yang Y (2020) Privacy-preserving searchable encryption in the intelligent edge computing. Comput Commun 164:31–41

    Article  Google Scholar 

  11. Shao J, Lu R, Guan Y, Wei G (2022) Achieve efficient and verifiable conjunctive and fuzzy queries over encrypted data in cloud. IEEE Trans Serv Comput 15:124–137

    Article  Google Scholar 

  12. Liu X, Yang G, Mu Y, Deng RH (2020) Multi-user verifiable searchable symmetric encryption for cloud storage. IEEE Trans Dependable Secure Comput 17:1322–1332

    Article  Google Scholar 

  13. Huang Q, Huang P, Li H, Huang J, Lin H-C (2023) A more efficient public-key authenticated encryption scheme with keyword search. J Syst Archit 137:102839

    Article  Google Scholar 

  14. Li H, Huang Q, Huang J, Susilo W (2023) Public-key authenticated encryption with keyword search supporting constant trapdoor generation and fast search. IEEE Trans Inf Forensics Secur 18:396–410

    Article  Google Scholar 

  15. Zhou Y, Hu Z, Li F (2023) Searchable public-key encryption with cryptographic reverse firewalls for cloud storage. IEEE Trans Cloud Comput 11:383–396

    Article  Google Scholar 

  16. Song DX, Wagner DA, Perrig A (2000) Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE Symposium on Security and Privacy. S &P 2000, pp 44–55

  17. Goh E-J (2003) Secure indexes. IACR Cryptol ePrint Arch 2003:216

    Google Scholar 

  18. Curtmola R, Garay JA, Kamara S, Ostrovsky RM (2006) Searchable symmetric encryption: improved definitions and efficient constructions. IACR Cryptol ePrint Arch 2006:210

    Google Scholar 

  19. Andola N, Prakash S, Yadav VK, Venkatesan S, Verma S (2022) A secure searchable encryption scheme for cloud using hash-based indexing. J Comput Syst Sci 126:119–137

    Article  MathSciNet  MATH  Google Scholar 

  20. Chai Q, Gong G (2012) Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers. In: 2012 IEEE International Conference on Communications (ICC), pp 917–922

  21. Gan Q, Liu JK, Wang X, Yuan X, Sun S, Huang D, Zuo C, Wang J (2022) Verifiable searchable symmetric encryption for conjunctive keyword queries in cloud storage. Front Comput Sci 16

  22. Cash D, Jarecki S, Jutla CS, Krawczyk H, Rosu M-C, Steiner M (2013) Highly-scalable searchable symmetric encryption with support for boolean queries. In: IACR Cryptology ePrint Archive

  23. Cui J, Sun Y, Xu Y, Tian M, Zhong H (2021) Forward and backward secure searchable encryption with multi-keyword search and result verification. Sci China Inf Sci 65

  24. Li X, Tong Q, Zhao J, Miao Y, Ma S, Weng J, Ma J, Choo KR (2023) Vrfms: Verifiable ranked fuzzy multi-keyword search over encrypted data. IEEE Trans Serv Comput 16:698–710

    Google Scholar 

  25. Tong Q, Miao Y, Weng J, Liu X, Choo KR, Deng RH (2023) Verifiable fuzzy multi-keyword search over encrypted data with adaptive security. IEEE Trans Knowl Data Eng 35:5386–5399

    Google Scholar 

  26. Najafi A, Javadi HHS, Bayat M (2021) Efficient and dynamic verifiable multi-keyword searchable symmetric encryption with full security. Multimed Tools Appl 80:26049–26068

    Article  Google Scholar 

  27. Li F, Ma J, Miao Y, Liu Z, Choo KR, Liu X, Deng RH (2023) Towards efficient verifiable boolean search over encrypted cloud data. IEEE Trans Cloud Comput 11:839–853

    Article  Google Scholar 

  28. Li F, Ma J, Miao Y, Jiang Q, Liu X, Choo KR (2021) Verifiable and dynamic multi-keyword search over encrypted cloud data using bitmap. IEEE Trans Cloud Comput 11:336–348

    Article  Google Scholar 

  29. Yan X, Feng S, Tang Y, Yin P, Deng D (2022) Blockchain-based verifiable and dynamic multi-keyword ranked searchable encryption scheme in cloud computing. J Inf Secur Appl 71:103353

    Google Scholar 

  30. Guo Y, Zhang C, Wang C, Jia X (2023) Towards public verifiable and forward-privacy encrypted search by using blockchain. IEEE Trans Dependable Secure Comput 20:2111–2126

    Article  Google Scholar 

  31. Yang W, Sun B, Zhu Y, Wu D (2021) A secure heuristic semantic searching scheme with blockchain-based verification. Inf Process Manag 58:102548

    Article  Google Scholar 

  32. Chen B, Xiang T, He D-B, Li H, Choo KR (2023) Bpvse: Publicly verifiable searchable encryption for cloud-assisted electronic health records. IEEE Trans Inf Forensics Secur 18:3171–3184

    Article  Google Scholar 

  33. Krawczyk H (2010) Cryptographic extraction and key derivation: The hkdf scheme. In: IACR Cryptology ePrint Archive

  34. Bellare M, Ristenpart T, Rogaway P, Stegers T (2009) Format-preserving encryption. In: International Workshop on Selected Areas in Cryptography

Download references

Funding

The authors did not receive support from any organization for the submitted work.

Author information

Authors and Affiliations

Authors

Contributions

Chenghao Yu contributed to the conception of the study and wrote the main manuscript text. Ruizhong Du and Mingyue Li helped perform the analysis with constructive discussions. All authors read and approved the final manuscript.

Corresponding author

Correspondence to Chenghao Yu.

Ethics declarations

Ethics approval

Not applicable.

Consent for publication

All authors approved the final manuscript and the submission to this journal.

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Du, R., Yu, C. & Li, M. Enabling efficient and verifiable secure search on cloud-based encrypted big data. Peer-to-Peer Netw. Appl. 16, 2574–2590 (2023). https://doi.org/10.1007/s12083-023-01546-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-023-01546-1

Keywords

Navigation