Abstract
Verifiable symmetric searchable encryption schemes have received a lot of attention as they can guarantee the correctness of query results in case of attack or misconfiguration of cloud servers. However, these schemes either suffer from the problem of using memory space in exchange for search speed, or need to perform a large amount of computation at some stage. To address these problems, we propose an Efficient and Verifiable Secure Search scheme (EVSS). In particular, the scheme designs a new index structure Privacy Protection - Finite State Transducers (PPFST), to verify the correctness of search results by storing path information, node states and their proofs on each PPFST arc. Besides, the structure can reuse common prefixes and suffixes to reduce storage space. In addition, the EVSS scheme uses the Key Derivation Function to act on file identifiers to resist substitution attacks and reduce the computational overhead in the index generation and verification phases. Compared with the state-of-the-art technology, our proposed solution accelerates the result validation time by a thousand times, with an index construction cost of one-tenth and a storage cost of 1%.
Similar content being viewed by others
Data availability
The datasets generated or analyzed during this study are available in the wikimedia repository, https://dumps.wikimedia.org/enwiki/.
Notes
Wikimedia (2023). https://dumps.wikimedia.org/enwiki/.
(2023). https://github.com/fxsjy/jieba#.
References
Li A, Chen Y, Yan Z, Zhou X, Shimizu S (2022) A survey on integrity auditing for data storage in the cloud: From single copy to multiple replicas. IEEE Trans Big Data 8:1428–1442
Zhang J, Wang A, Ma X, Carver B, Newman NJ, Anwar A, Rupprecht L, Skourtis D, Tarasov V, Yan F, Cheng Y (2022) Infinistore: Elastic serverless cloud storage. Proc VLDB Endow 16:1629–1642
Sun J, Xu G, Zhang T, Yang X, Alazab M, Deng RH (2023) Verifiable, fair and privacy-preserving broadcast authorization for flexible data sharing in clouds. IEEE Trans Inf Forensics Secur 18:683–698
Cash D, Jaeger J, Jarecki S, Jutla CS, Krawczyk H, Rosu M-C, Steiner M (2014) Dynamic searchable encryption in very-large databases: Data structures and implementation. IACR Cryptol ePrint Arch 2014:853
Bahrami S, Ghasemi R (2022) A new secure and searchable data outsourcing leveraging a bucket-chain index tree. J Inf Secur Appl 67:103206
Zhang X, Zhao B, Qin J, Hou W, Su Y, Yang H (2021) Practical wildcard searchable encryption with tree-based index. Int J Intell Syst 36:7475–7499
Zhu J, Li Q, Wang C, Yuan X, Wang Q, Ren K (2018) Enabling generic, verifiable, and secure data search in cloud services. IEEE Trans Parallel Distrib Syst 29:1721–1735
Shi Z, Fu X, Li X, Zhu K (2022) Esvsse: Enabling efficient, secure, verifiable searchable symmetric encryption. IEEE Trans Knowl Data Eng 34:3241–3254
Wang Q, Zhang X, Qin J, Ma J, Huang X (2021) A verifiable symmetric searchable encryption scheme based on the AVL tree. Comput J 66:174–183
Chen Q, Fan K, Zhang K, Wang H-Y, Li H, Yang Y (2020) Privacy-preserving searchable encryption in the intelligent edge computing. Comput Commun 164:31–41
Shao J, Lu R, Guan Y, Wei G (2022) Achieve efficient and verifiable conjunctive and fuzzy queries over encrypted data in cloud. IEEE Trans Serv Comput 15:124–137
Liu X, Yang G, Mu Y, Deng RH (2020) Multi-user verifiable searchable symmetric encryption for cloud storage. IEEE Trans Dependable Secure Comput 17:1322–1332
Huang Q, Huang P, Li H, Huang J, Lin H-C (2023) A more efficient public-key authenticated encryption scheme with keyword search. J Syst Archit 137:102839
Li H, Huang Q, Huang J, Susilo W (2023) Public-key authenticated encryption with keyword search supporting constant trapdoor generation and fast search. IEEE Trans Inf Forensics Secur 18:396–410
Zhou Y, Hu Z, Li F (2023) Searchable public-key encryption with cryptographic reverse firewalls for cloud storage. IEEE Trans Cloud Comput 11:383–396
Song DX, Wagner DA, Perrig A (2000) Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE Symposium on Security and Privacy. S &P 2000, pp 44–55
Goh E-J (2003) Secure indexes. IACR Cryptol ePrint Arch 2003:216
Curtmola R, Garay JA, Kamara S, Ostrovsky RM (2006) Searchable symmetric encryption: improved definitions and efficient constructions. IACR Cryptol ePrint Arch 2006:210
Andola N, Prakash S, Yadav VK, Venkatesan S, Verma S (2022) A secure searchable encryption scheme for cloud using hash-based indexing. J Comput Syst Sci 126:119–137
Chai Q, Gong G (2012) Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers. In: 2012 IEEE International Conference on Communications (ICC), pp 917–922
Gan Q, Liu JK, Wang X, Yuan X, Sun S, Huang D, Zuo C, Wang J (2022) Verifiable searchable symmetric encryption for conjunctive keyword queries in cloud storage. Front Comput Sci 16
Cash D, Jarecki S, Jutla CS, Krawczyk H, Rosu M-C, Steiner M (2013) Highly-scalable searchable symmetric encryption with support for boolean queries. In: IACR Cryptology ePrint Archive
Cui J, Sun Y, Xu Y, Tian M, Zhong H (2021) Forward and backward secure searchable encryption with multi-keyword search and result verification. Sci China Inf Sci 65
Li X, Tong Q, Zhao J, Miao Y, Ma S, Weng J, Ma J, Choo KR (2023) Vrfms: Verifiable ranked fuzzy multi-keyword search over encrypted data. IEEE Trans Serv Comput 16:698–710
Tong Q, Miao Y, Weng J, Liu X, Choo KR, Deng RH (2023) Verifiable fuzzy multi-keyword search over encrypted data with adaptive security. IEEE Trans Knowl Data Eng 35:5386–5399
Najafi A, Javadi HHS, Bayat M (2021) Efficient and dynamic verifiable multi-keyword searchable symmetric encryption with full security. Multimed Tools Appl 80:26049–26068
Li F, Ma J, Miao Y, Liu Z, Choo KR, Liu X, Deng RH (2023) Towards efficient verifiable boolean search over encrypted cloud data. IEEE Trans Cloud Comput 11:839–853
Li F, Ma J, Miao Y, Jiang Q, Liu X, Choo KR (2021) Verifiable and dynamic multi-keyword search over encrypted cloud data using bitmap. IEEE Trans Cloud Comput 11:336–348
Yan X, Feng S, Tang Y, Yin P, Deng D (2022) Blockchain-based verifiable and dynamic multi-keyword ranked searchable encryption scheme in cloud computing. J Inf Secur Appl 71:103353
Guo Y, Zhang C, Wang C, Jia X (2023) Towards public verifiable and forward-privacy encrypted search by using blockchain. IEEE Trans Dependable Secure Comput 20:2111–2126
Yang W, Sun B, Zhu Y, Wu D (2021) A secure heuristic semantic searching scheme with blockchain-based verification. Inf Process Manag 58:102548
Chen B, Xiang T, He D-B, Li H, Choo KR (2023) Bpvse: Publicly verifiable searchable encryption for cloud-assisted electronic health records. IEEE Trans Inf Forensics Secur 18:3171–3184
Krawczyk H (2010) Cryptographic extraction and key derivation: The hkdf scheme. In: IACR Cryptology ePrint Archive
Bellare M, Ristenpart T, Rogaway P, Stegers T (2009) Format-preserving encryption. In: International Workshop on Selected Areas in Cryptography
Funding
The authors did not receive support from any organization for the submitted work.
Author information
Authors and Affiliations
Contributions
Chenghao Yu contributed to the conception of the study and wrote the main manuscript text. Ruizhong Du and Mingyue Li helped perform the analysis with constructive discussions. All authors read and approved the final manuscript.
Corresponding author
Ethics declarations
Ethics approval
Not applicable.
Consent for publication
All authors approved the final manuscript and the submission to this journal.
Conflict of interest
The authors declare that they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Du, R., Yu, C. & Li, M. Enabling efficient and verifiable secure search on cloud-based encrypted big data. Peer-to-Peer Netw. Appl. 16, 2574–2590 (2023). https://doi.org/10.1007/s12083-023-01546-1
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-023-01546-1