Advertisement

Peer-to-Peer Networking and Applications

, Volume 12, Issue 1, pp 32–42 | Cite as

Secure and efficient encrypted keyword search for multi-user setting in cloud computing

  • Haijiang WangEmail author
  • Xiaolei Dong
  • Zhenfu Cao
Article
  • 177 Downloads

Abstract

A key challenge to design searchable encryption in multi-user setting lies in the efficient management of encryption and search keys. Existing multi-user searchable encryption schemes either extend the single-user searchable encryption framework with broadcast encryption or require search user refers to the data owner and get the search token. However, this implies the necessity that the data owner distributes a single shared secret key among the group of users or requires the data owner stay online to authorize other users to search. In this paper, we address this practical problem, which is neglected in the literature. We also study secret-key-recovery attack where a malicious user can deduce a valid secret when given a search token. We show such attack violates secret key privacy, which is important in the whole system. Inspired by asymmetric group key agreement and multilinear map technology, we provide a secure and efficient encrypted keyword search scheme for multi-user setting, in which a data owner can share data with a group users without knowing which user in the group. In the proposed scheme, (a) each user has his own secret key, (b) each user generates trapdoors without getting any help from data owner or the third party, (c) our scheme features constant communication overhead, and (d) our scheme resist the secret-key-recovery attack. Our scheme preserves the traceability inherited from the asymmetric group key agreement system. We offer rigorous security proof of our scheme, and the performance analysis demonstrates the efficiency of our scheme.

Keywords

Asymmetric group key agreement Searchable encryption Keyword search Date sharing Constant communication overhead 

Notes

Acknowledgements

This work was supported in part by the National Natural Science Foundation of China (Grant No. 61371083, 61373154, 61632012, and 61672239), in part by the Prioritized Development Projects through the Specialized Research Fund for the Doctoral Program of Higher Education of China under (Grant No. 20130073130004), and in part by Shanghai High-tech field project under (Grant No. 16511101400).

References

  1. 1.
    Bao F, Deng R H, Ding X, Yang Y (2008) Private query on encrypted data in multi-user settings. In: International conference on information security practice and experience. Springer, pp 71–85Google Scholar
  2. 2.
    Blake I F, Seroussi G, Smart NP (2005) Advances in elliptic curve cryptography, volume 317 of london mathematical society lecture note series. Camb Univ Press Camb 19(20):666Google Scholar
  3. 3.
    Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. In: International conference on the theory and applications of cryptographic techniques. Springer, pp 506–522Google Scholar
  4. 4.
    Boneh D, Gentry C, Waters B (2005) Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Crypto, vol 3621. Springer, pp 258–275Google Scholar
  5. 5.
    Boneh D, Silverberg A (2003) Applications of multilinear forms to cryptography. Contemp Math 324 (1):71–90MathSciNetCrossRefGoogle Scholar
  6. 6.
    Boyen X, Waters B (2006) Compact group signatures without random oracles. In: Annual international conference on the theory and applications of cryptographic techniques. Springer, pp 427–444Google Scholar
  7. 7.
    Cao N, Wang C, Li M, Ren K, Lou W (2014) Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans Parallel Distrib Syst 25(1):222–233CrossRefGoogle Scholar
  8. 8.
    Cash D, Jaeger J, Jarecki S, Jutla C S, Krawczyk H, Rosu M-C, Steiner M (2014) Dynamic searchable encryption in very-large databases: Data structures and implementation. NDSS 14:23–26Google Scholar
  9. 9.
    Chang Y-C, Mitzenmacher M (2005) Privacy preserving keyword searches on remote encrypted data. In: Applied cryptography and network security. Springer, pp 442–455Google Scholar
  10. 10.
    Coron J-S, Lepoint T, Tibouchi M (2013) Practical multilinear maps over the integers. In: Advances in cryptology–CRYPTO 2013. Springer, pp 476–493Google Scholar
  11. 11.
    Cui B, Liu Z, Wang L (2016) Key-aggregate searchable encryption (kase) for group data sharing via cloud storage. IEEE Trans Comput 65(8):2374–2385MathSciNetCrossRefGoogle Scholar
  12. 12.
    Curtmola R, Garay J, Kamara S, Ostrovsky R (2006) Searchable symmetric encryption: Improved definitions and efficient constructions. In: Proceedings of the 13th ACM conference on computer and communications security. ACM, pp 79–88Google Scholar
  13. 13.
    Deng Z, Li K, Li K, Zhou J (2017) A multi-user searchable encryption scheme with keyword authorization in a cloud storage. Futur Gener Comput Syst 72:208–218CrossRefGoogle Scholar
  14. 14.
    Dong C, Russello G, Dulay N (2011) Shared and searchable encrypted data for untrusted servers. J Comput Secur 19(3):367– 397CrossRefGoogle Scholar
  15. 15.
    Garg S, Gentry C, Halevi S (2013) Candidate multilinear maps from ideal lattices. In: Annual international conference on the theory and applications of cryptographic techniques. Springer, pp 1–17Google Scholar
  16. 16.
    Goh E-J et al. (2003) Secure indexes. IACR Cryptology ePrint Archive 2003:216Google Scholar
  17. 17.
    Huang H, Du J, Wang H, Wang R (2016) A multi-keyword multi-user searchable encryption scheme based on cloud storage. In: Trustcom/BigDataSE/I? SPA, 2016 IEEE. IEEE, pp 1937–1943Google Scholar
  18. 18.
    Jarecki S, Jutla C, Krawczyk H, Rosu M, Steiner M (2013) Outsourced symmetric private information retrieval. In: Proceedings of the ACM SIGSAC conference on computer & communications security. ACM, pp 875–888Google Scholar
  19. 19.
    Kermanshahi S K, Liu J K, Steinfeld R (2017) Multi-user cloud-based secure keyword search. In: Australasian conference on information security and privacy. Springer, pp 227–247Google Scholar
  20. 20.
    Kiayias A, Oksuz O, Russell A, Tang Q, Wang B (2016) Efficient encrypted keyword search for multi-user data sharing. In: European symposium on research in computer security. Springer, pp 173–195Google Scholar
  21. 21.
    Li H, Yi Y, Luan T, Liang X, Zhou L, Shen X (2015) Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud dataGoogle Scholar
  22. 22.
    Li J, Lin X, Zhang Y, Han J (2016) Ksf-oabe: Outsourced attribute-based encryption with keyword search function for cloud storage. IEEE Trans Serv Comput 1–1Google Scholar
  23. 23.
    Li J, Wang Q, Wang C, Cao N, Ren K, Lou W (2010) Fuzzy keyword search over encrypted data in cloud computing. In: INFOCOM 2010 proceedings IEEE. IEEE, pp 1–5Google Scholar
  24. 24.
    Li M, Yu S, Cao N, Lou W (2011) Authorized private keyword search over encrypted data in cloud computing. In: 2011 31st International conference on distributed computing systems (ICDCS). IEEE, pp 383–392Google Scholar
  25. 25.
    Li M, Shucheng Y, Ren K, Lou W, Hou T Y (2013) Toward privacy-assured and searchable cloud data storage services. IEEE Netw 27(4):56–62CrossRefGoogle Scholar
  26. 26.
    Lu Y (2012) Privacy-preserving logarithmic-time search on encrypted data in cloud. In: NDSSGoogle Scholar
  27. 27.
    Lynn B (2006) Pbc library. Online: http://crypto.stanford.edu/pbc
  28. 28.
    Song D X, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: Proceedings IEEE symposium on security and privacy, 2000. S&P 2000. IEEE, pp 44–55Google Scholar
  29. 29.
    Sun W, Wang B, Cao N, Li M, Lou W, Hou T Y, Li H (2013) Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. In: Proceedings of the 8th ACM SIGSAC symposium on information, computer and communications security. ACM, pp 71–82Google Scholar
  30. 30.
    Wu Q, Mu Y, Susilo W, Qin B, Domingo-Ferrer J (2009) Asymmetric group key agreement. In: Advances in Cryptology-EUROCRYPT 2009. Springer, pp 153–170Google Scholar
  31. 31.
    Xia Z, Wang X, Sun X, Wang Q (2015) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud dataGoogle Scholar
  32. 32.
    Zhao X, Wei D, Wang H (2010) Asymmetric group key agreement with traitor traceability. In: 2010 International conference on computational intelligence and security (CIS). IEEE, pp 347–351Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2017

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringShanghai Jiao Tong UniversityShanghaiChina
  2. 2.Shanghai Key Lab for Trustworthy ComputingEast China Normal UniversityShanghaiChina

Personalised recommendations