Advertisement

Secure Inverted Index Based Search over Encrypted Cloud Data with User Access Rights Management

  • 71 Accesses

Abstract

Cloud computing is a technology that provides users with a large storage space and an enormous computing power. However, the outsourced data are often sensitive and confidential, and hence must be encrypted before being outsourced. Consequently, classical search approaches have become obsolete and new approaches that are compatible with encrypted data have become a necessity. For privacy reasons, most of these approaches are based on the vector model which is a time consuming process since the entire index must be loaded and exploited during the search process given that the query vector must be compared with each document vector. To solve this problem, we propose a new method for constructing a secure inverted index using two key techniques, homomorphic encryption and the dummy documents technique. However, 1) homomorphic encryption generates very large ciphertexts which are thousands of times larger than their corresponding plaintexts, and 2) the dummy documents technique that enhances the index security produces lots of false positives in the search results. The proposed approach exploits the advantages of these two techniques by proposing two methods called the compressed table of encrypted scores and the double score formula. Moreover, we exploit a second secure inverted index in order to manage the users’ access rights to the data. Finally, in order to validate our approach, we performed an experimental study using a data collection of one million documents. The experiments show that our approach is many times faster than any other approach based on the vector model.

This is a preview of subscription content, log in to check access.

Access options

Buy single article

Instant unlimited access to the full article PDF.

US$ 39.95

Price includes VAT for USA

Subscribe to journal

Immediate online access to all issues from 2019. Subscription will auto renew annually.

US$ 99

This is the net price. Taxes to be calculated in checkout.

References

  1. [1]

    Song D X D, Wagner D, Perrig A. Practical techniques for searches on encrypted data. In Proc. the 2000 IEEE Symposium on Security and Privacy, May 2000, pp.44-55.

  2. [2]

    Curtmola R, Garay J, Kamara S, Ostrovsky R. Searchable symmetric encryption: Improved definitions and efficient constructions. In Proc. the 13th ACM Conference on Computer and Communications Security, October 2006, pp.79-88.

  3. [3]

    Wang B, Yu S C, Lou W J, Hou Y T. Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud. In Proc. 2014 INFOCOM, April 2014, pp.2112-2120.

  4. [4]

    Xu J, Zhang W M, Yang C, Xu J J, Yu N H. Two-stepranking secure multi-keyword search over encrypted cloud data. In Proc. the 2012 International Conference on Cloud and Service Computing, November 2012, pp.124-130.

  5. [5]

    Yu J D, Lu P, Zhu Y M, Xue G T, Li M L. Toward secure multikeyword top-k retrieval over encrypted cloud data. IEEE Transactions on Dependable and Secure Computing, 2013, 10(4): 239-250.

  6. [6]

    Cao N, Wang C, Li M, Ren K, Lou W J. Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems, 2014, 25(1): 222-233.

  7. [7]

    Xia Z H, Zhu Y, Sun X M, Qin Z, Ren K. Towards privacypreserving content-based image retrieval in cloud computing. IEEE Transactions on Cloud Computing, 2018, 6(1): 276-286.

  8. [8]

    Boucenna F, Nouali O, Kechid S. Concept-based semantic search over encrypted cloud data. In Proc. the 12th International Conference on Web Information Systems and Technologies, April 2016, pp.235-242.

  9. [9]

    Li K, Zhang W M, Tian K, Liu R D, Yu N H. An efficient multi-keyword ranked retrieval scheme with Johnson-Lindenstrauss transform over encrypted cloud data. In Proc. the 2013 International Conference on Cloud Computing and Big Data, December 2013, pp.320-327.

  10. [10]

    Wang C, Cao N, Li J, Ren K, Lou W J. Secure ranked keyword search over encrypted cloud data. In Proc. the 30th International Conference on Distributed Computing Systems, June 2010, pp.253-262.

  11. [11]

    Xia Z H, Wang X H, Sun X M, Wang Q. A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems, 2016, 27(2): 340-352.

  12. [12]

    Gentry C. A fully homomorphic encryption scheme [Ph.D. Thesis]. Department of Computer Science, Stanford University, 2009.

  13. [13]

    Naehrig M, Lauter K, Vaikuntanathan V. Can homomorphic encryption be practical? In Proc. the 3rd ACM Cloud Computing Security Workshop, October 2011, pp.113-124.

  14. [14]

    Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption. In Proc. the 2007 IEEE Symposium on Security and Privacy, May 2007, pp.321-334.

  15. [15]

    Yang J, Li S J. Searchable public key encryption scheme with data integrity checking. In Proc. the 11th International Conference on Broadband and Wireless Computing, Communication and Applications, November 2016, pp.363-370.

  16. [16]

    Cash D, Grubbs P, Perry J, Ristenpart T. Leakage-abuse attacks against searchable encryption. In Proc. the 22nd ACM SIGSAC Conference on Computer and Communications Security, October 2015, pp.668-679.

  17. [17]

    Yang Y, Ma M D. Semantic searchable encryption scheme based on lattice in quantum-era. Journal of Information Science & Engineering, 2016, 32(2): 425-438.

  18. [18]

    van Dijk M, Gentry C, Halevi S, Vaikuntanathan V. Fully homomorphic encryption over the integers. In Proc. Annual International Conference on the Theory and Applications of Cryptographic Techniques, May 2010, pp.24-43.

  19. [19]

    Wong W K, Cheung D W L, Kao B, Mamoulis N. Secure kNN computation on encrypted databases. In Proc. the 2009 ACM SIGMOD International Conference on Management of Data, June 2009, pp.139-152.

  20. [20]

    Sun X, Zhu Y, Xia Z et al. Secure keyword-based ranked semantic search over encrypted cloud data. Advanced Science and Technology Letters, 2013, 31: 271-283.

  21. [21]

    Yang Y. Attribute-based data retrieval with semantic keyword search for e-health cloud. Journal of Cloud Computing, 2015, 4(1): Article No.10.

  22. [22]

    Bouabana-Tebibel T, Kaci A. Parallel search over encrypted data under attribute based encryption on the cloud computing. Computers & Security, 2015, 54: 77-91.

  23. [23]

    Meharwade A, Patil G. Efficient keyword search over encrypted cloud data. Procedia Computer Science, 2016, 78: 139-145.

  24. [24]

    Fu Z J, Sun X M, Liu Q, Zhou L, Shu J G. Achieving efficient cloud search services: Multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Transactions on Communications, 2015, E98.B(1): 190-200.

  25. [25]

    Xia Z H, Xiong N N, Vasilakos A V, Sun X M. EPCBIR: An efficient and privacy-preserving content-based image retrieval scheme in cloud computing. Information Sciences, 2017, 387: 195-204.

  26. [26]

    Johnson W B, Lindenstrauss J. Extensions of Lipschitz mappings into a Hilbert space. Contemporary Mathematics, 1984, 26(189-206): Article No. 1.

  27. [27]

    Boucenna F, Nouali O, Dabah A, Kechid S. Accelerated search over encrypted cloud data. In Proc. the 2017 IEEE International Conference on Big Data and Smart Computing, February 2017, pp.170-177.

  28. [28]

    Deng Z J, Li K L, Li K Q, Zhou J L. A multi-user searchable encryption scheme with keyword authorization in a cloud storage. Future Generation Computer Systems, 2016, 72: 208-218.

  29. [29]

    Li M, Yu S C, Cao N, LouW J. Authorized private keyword search over encrypted data in cloud computing. In Proc. the 31st International Conference on Distributed Computing Systems, June 2011, pp.383-392.

  30. [30]

    Han F, Qin J, Zhao H W, Hu J K. A general transformation from KP-ABE to searchable encryption. Future Generation Computer Systems, 2014, 30: 107-115.

  31. [31]

    Goyal V, Pandey O, Sahai A,Waters B. Attribute-based encryption for fine-grained access control of encrypted data. In Proc. the 13th ACM conference on Computer and Communications Security, October 2006, pp.89-98.

  32. [32]

    Yuan J W, Yu S C, Guo L K. SEISA: Secure and efficient encrypted image search with access control. In Proc. the 2015 IEEE Conference on Computer Communications, April 2015, pp.2083-2091.

  33. [33]

    Wang B, Song W, Lou W J, Hou Y T. Inverted index based multikeyword public-key searchable encryption with strong privacy guarantee. In Proc. the 2015 IEEE Conference on Computer Communications, April 2015, pp.2092-2100.

  34. [34]

    Brakerski Z, Gentry C, Vaikuntanathan V. (Leveled) fully homomorphic encryption without bootstrapping. In Proc. the 3rd Innovations in Theoretical Computer Science Conference, January 2012, pp.309-325.

  35. [35]

    Sahai A, Waters B. Fuzzy identity-based encryption. In Proc. the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, May 2005 pp.457-473.

  36. [36]

    Emura K, Miyaji A, Nomura A, Omote K, Soshi M. A ciphertext-policy attribute-based encryption scheme with constant ciphertext length. In Proc. the 5th International Conference on Information Security Practice and Experience, April 2009, pp.13-23.

  37. [37]

    Ibraimi L, Tang Q, Hartel P, Jonker W. Efficient and provable secure ciphertext-policy attribute-based encryption schemes. In Proc. the 5th International Conference on Information Security Practice and Experience, April 2009, pp.1-12.

  38. [38]

    Islam M S, Kuzu M, Kantarcioglu M. Access pattern disclosure on searchable encryption: Ramification, attack and mitigation. In Proc. the 19th Annual Network & Distributed System Security Symposium, February 2012, Article No. 12.

  39. [39]

    Liu C, Zhu L, Wang M Z, Tan Y. Search pattern leakage in searchable encryption: Attacks and new construction. Information Sciences, 2014, 265: 176-188.

  40. [40]

    Gabrilovich E, Markovitch S. Computing semantic relatedness of words and texts in Wikipedia-derived semantic space. In Proc. the 20th International Joint Conference on Artificial Intelligence, January 2006, pp.1606-1611.

  41. [41]

    Egozi O, Markovitch S, Gabrilovich E. Concept-based information retrieval using explicit semantic analysis. ACM Transactions on Information Systems, 2011, 29(2): Article No. 8.

  42. [42]

    Brakerski Z, Vaikuntanathan V. Efficient fully homomorphic encryption from (standard) LWE. SIAM Journal on Computing, 2014, 43(2): 831-871.

  43. [43]

    Smart N P, Vercauteren F. Fully homomorphic encryption with relatively small key and ciphertext sizes. In Proc. International Workshop on Public Key Cryptography, May 2010, pp.420-443.

  44. [44]

    Brakerski Z, Vaikuntanathan V. Efficient fully homomorphic encryption from (standard) LWE. In Proc. the 52nd Annual Symposium on Foundations of Computer Science, October 2011, pp.97-106.

  45. [45]

    Naveed M, Prabhakaran M, Gunter C A. Dynamic searchable encryption via blind storage. In Proc. the 2014 IEEE Symposium on Security and Privacy, May 2014, pp.639-654.

Download references

Acknowledgement(s)

We wish to express our gratitude to Dr. Djamal Belazzougui and Mr. Mohamed Saddek Derki for their help to improve this work. We also thank the anonymous reviewers and the editors for their constructive suggestions and remarks.

Author information

Correspondence to Fateh Boucenna.

Electronic supplementary material

ESM 1

(PDF 227 kb)

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Boucenna, F., Nouali, O., Kechid, S. et al. Secure Inverted Index Based Search over Encrypted Cloud Data with User Access Rights Management. J. Comput. Sci. Technol. 34, 133–154 (2019) doi:10.1007/s11390-019-1903-2

Download citation

Keywords

  • searchable encryption
  • cloud computing
  • homomorphic encryption
  • attribute-based encryption
  • inverted index