Skip to main content
Log in

EVSS: An efficient verifiable search scheme over encrypted cloud data

  • Published:
World Wide Web Aims and scope Submit manuscript

Abstract

Cloud computing is now being used by more and more enterprises and individuals. To protect the privacy of outsourced data in the cloud, the searchable symmetric encryption is adopted. However, verifying search results to detect whether there is malicious behavior in the cloud server is still a challenge. In order to overcome this problem, we propose an efficient verifiable search scheme (EVSS), which allows users to retrieve ciphertext and verify the search result efficiently. A novel RSA accumulator-based Patricia tree (RAP-tree) is designed as the search index, where the token of a keyword and the proof evidence of documents containing the keyword are taken as the key-value pair to be placed in a node of the tree. By using the RAP-tree index, the efficient verifiable keyword search over encrypted data is realized. The security of the proposed scheme is analyzed by theoretical proofs. Experimental results on real data sets show that the proposed scheme is efficient and effective in terms of search processing and result verification.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Figure 1.
Figure 2.
Algorithm 1
Algorithm 2
Algorithm 3
Algorithm 4
Figure 3.
Figure 4.
Figure 5.
Figure 6.
Figure 7.
Figure 8.
Figure 9.
Figure 10.
Figure 11.

Similar content being viewed by others

Data availability

Details of the datasets have been described in Section 7.

References

  1. Jiaxun, H., Yu, L., He, C., Xiuxia, T., Cheqing, J.: An enhanced wildcard-based fuzzy searching scheme in encrypted databases. World Wide Web 23(3), 2185–2214 (2020)

    Article  Google Scholar 

  2. Qiang, C., Yanping, L., Zhenqiang, W., Yinbin, M., Jianqing, L.: Privacy-preserving conjunctive keyword search on encrypted data with enhanced fine-grained access control. World Wide Web 23(2), 959–989 (2020)

    Article  Google Scholar 

  3. Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceedings of the 2000 IEEE Symposium on Security and Privacy, pp 44–55. IEEE Computer Society (2000)

  4. Goh, E.-J.: Secure indexes, IACR Cryptology ePrint Archive. 2003, 1–18 (2004)

  5. Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: Improved definitions and efficient constructions. J. Comput. Secur. 19(5), 895–934 (2011)

    Article  Google Scholar 

  6. Tiwari, M.: Fuzzy keyword search over encrypted data in cloud computing. International Journal of Research in Engineering & Technology 4(6), 15–20 (2016)

    Google Scholar 

  7. Sun, W., Shucheng, Y., Lou, W., Thomas, Y., Li, H.: Protecting your right: Verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. IEEE Transaction on Parallel Distributed System 27(4), 1187–1198 (2016)

    Article  Google Scholar 

  8. Zhang, W., Lin, Y., Xiao, S., Liu, Q., Zhou, T.: Secure distributed keyword search in multiple clouds. IEEE, IWQoS (2014)

  9. Kurosawa, K., Ohtaki, Y.: Uc-secure searchable symmetric encryption. In: Financial Cryptography and Data Security, pp 285–298. Springer, Berlin (2012)

  10. Pang, H., Jain, A., Ramamritham, K., Tan, K.-L.: Verifying completeness of relational query results in data publishing. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, pp 407–418. Association for Computing Machinery (2005)

  11. Narasimha, M., Tsudik, G.: Dsac: integrity for outsourced databases with signature aggregation and chaining. In: Proceedings of the 2005 ACM CIKM International Conference on Information and Knowledge Management, pp 235–236. Association for Computing Machinery (2005)

  12. Chai, Q., Gong, G.: Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers. IEEE (2012)

  13. Kumar, M., Pasupuleti, S.K.: Lightweight verifiable auditing for outsourced database in cloud computing. In: Distributed Computing and Internet Technology - 14th International Conference, pp 280–287. Springer (2018)

  14. Yang, Y., Papadopoulos, S., Papadias, D., Kollios, G.: Authenticated indexing for outsourced spatial databases. VLDB J. 18(3), 631–648 (2009)

    Article  Google Scholar 

  15. Camenisch, J., Lysyanskaya, A.: Dynamic accumulators and application to efficient revocation of anonymous credentials. In: Advances in Cryptology-CRYPTO 2002, pp 61–76. Springer, Berlin (2002)

  16. Chang, Y.-C., Mitzenmacher, M.: Privacy preserving keyword searches on remote encrypted data. In: Applied Cryptography and Network Security, vol. 3531, pp 442–455. Springer, Berlin (2005)

  17. Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Advances in Cryptology-EUROCRYPT 2004, vol. 3027, pp 506–522. Springer, Berlin (2004)

  18. Golle, P., Staddon, J., Waters, B.: Secure conjunctive keyword search over encrypted data. In: Applied Cryptography and Network Security, pp 31–45. Springer, Berlin (2004)

  19. Boneh, D., Waters, B.: Conjunctive, subset, and range queries on encrypted data. In: Theory of Cryptography, pp 535–554. Springer, Berlin (2007)

  20. Hore, B., Chang, E.-C., Diallo, M., Mehrotra, S.: Indexing encrypted documents for supporting efficient keyword search. In: Secure Data Management-9th VLDB Workshop, pp 93–110. Springer (2012)

  21. Chuah, M., Hu, W.: Privacy-aware bedtree based solution for fuzzy multi-keyword search over encrypted data. In: Proceedings of the 2011 31st International Conference on Distributed Computing Systems Workshops, pp 273–281. IEEE Computer Society (2011)

  22. Xu, P., Jin, H.: Public-key encryption with fuzzy keyword search: a provably secure scheme under keyword guessing attack. IEEE Transaction on Computers 62(11), 2266–2277 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  23. Wang, C., Ren, K., Yu, S.: Achieving usable and privacy-assured similarity search over outsourced cloud data. In: Proceedings of the IEEE INFOCOM 2012, pp 451–459. IEEE (2012)

  24. Pang, H., Mouratidis, K.: Authenticating the query results of text search engines. The Proceedings of the VLDB Endowment (PVLDB) 1(1), 126–137 (2008)

    Article  Google Scholar 

  25. Zhang, Z., Wang, J., Wang, Y., Su, Y., Chen, X.: Towards efficient verifiable forward secure searchable symmetric encryption. In: Computer Security-ESORICS 2019, vol. 11736, pp 304–321. Springer International Publishing (2019)

  26. Gao, X., Yu, J., Chang, Y., Wang, H., Fan, J.: Checking only when it is necessary: Enabling integrity auditing based on the keyword with sensitive information privacy for encrypted cloud data. IEEE Transactions on Dependable and Secure Computing PP 1–17 (2021)

  27. Hu, H., Xu, J., Chen, Q., Yang, Z.: Authenticating location-based services without compromising location privacy. In: Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data, pp 301–312. Association for Computing Machinery (2012)

  28. Deepa, N., Perumal, P.: Hybrid context aware recommendation system for e-health care by merkle hash tree from cloud using evolutionary algorithm. Soft. Comput. 24(10), 7149–7161 (2020)

    Article  Google Scholar 

  29. Zhu, J., Li, Q., Wang, C., Yuan, X., Wang, Q., Ren, K.: Enabling generic, verifiable, and secure data search in cloud services. IEEE Trans. Parallel Distrib. Syst. 29(8), 1721–1735 (2018)

    Article  Google Scholar 

  30. Liu, Q., Nie, X., Liu, X., Peng, T., Wu, J.: Verifiable ranked search over dynamic encrypted data in cloud computing. In: 25th IEEE/ACM International Symposium on Quality of Service, pp 1–6. IEEE (2017)

  31. Liu, Q., Tian, Y., Wu, J., Peng, T., Wang, G.: Enabling verifiable and dynamic ranked search over outsourced data. IEEE Trans. Serv. Comput. 15(1), 69–82 (2022)

    Article  Google Scholar 

  32. Goodrich, M., Tamassia, R., Hasic Telalovic, J.: An efficient dynamic and distributed rsa accumulator. arXiv:0905.1307 (2009)

  33. Wood, G.: Ethereum: A secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151, 1–32 (2014)

    Google Scholar 

  34. Liu, Z., Li, T., Li, P., Jia, C., Li, J.: Verifiable searchable encryption with aggregate keys for data sharing system. Futur. Gener. Comput. Syst. 78, 778–788 (2018)

    Article  Google Scholar 

  35. Kamara, S., Papamanthou, C., Roeder, T.: Cs2: A searchable cryptographic cloud storage system (2011)

  36. New york times database: https://developer,nytimes.com/docs (2020)

Download references

Funding

This work is supported by the National Natural Science Foundation of China under the grant Nos.61872197, 61972209, 61902199 and 61771251; the Postdoctoral Science Foundation of China under the Grand No. 2019M651919; the Postgraduate Research and Practice Innovation Program of Jiangsu Province under the Grand No. KYCX22_0984.

Author information

Authors and Affiliations

Authors

Contributions

This work thanks the following authors for their contributions: Qian Zhou and Hua Dai contributed to the conception of the study; Qian Zhou and Wenjie Sheng performed the experiment; Qian Zhou and Yuanlong Liu contributed significantly to analysis and manuscript preparation; Hua Dai and Wenjie Sheng performed the data analyses and wrote the manuscript; Geng Yang helped perform the analysis with constructive discussions.

Corresponding author

Correspondence to Hua Dai.

Ethics declarations

Ethics approval and consent to participate

Our manuscripts were not submitted to multiple journals for simultaneous consideration and original. All authors agree with the content of the article.

Consent for publication

Our manuscript is approved by all authors for publication.

Competing interests

No conflict of interest exits in the submission of this manuscript, and manuscript is approved by all authors for publication.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhou, Q., Dai, H., Sheng, W. et al. EVSS: An efficient verifiable search scheme over encrypted cloud data. World Wide Web 26, 1459–1479 (2023). https://doi.org/10.1007/s11280-022-01097-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11280-022-01097-0

Keywords

Navigation