Abstract
Attribute-based searchable encryption (ABSE) allows only authorized users to perform a keyword search over encrypted data in the cloud while preserving the data privacy and keyword privacy. Although ABSE provides data privacy, access control, and keyword search, it does not support data authenticity which plays a major role in the cloud environment to ensure that the data is not modified. Alongside, improving search efficiency in ABSE becomes mandatory since the cloud is attracting massive data. To address these issues, in this paper, we propose a practical verifiable multi-keyword attribute-based searchable signcryption scheme in cloud storage. The scheme uses ciphertext-policy attribute-based signcryption to achieve data privacy, access control, and data authenticity. Further, we integrate the multi-dimensional \(B^{+}\)-tree with the Merkle tree in index construction to enhance the search efficiency and to verify the search results. The security analysis proves that our scheme satisfies security requirements such as data privacy and authenticity, index and query privacy, trapdoor unlinkability. We also prove that our scheme is secure against chosen plaintext attacks and signature forgery attacks. Finally, the performance analysis demonstrates that the proposed scheme is efficient and practical.
Similar content being viewed by others
References
Beimel Amos et al (1996) Secure schemes for secret sharing and key distribution. Technion-Israel Institute of technology, Faculty of computer science
Cao N, Wang C, Li M, Ren K, Lou W (2013) Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans Parallel Distrib Syst 25(1):222–233
Chaudhari P, Das ML (2021) Privacy preserving searchable encryption with fine-grained access control. IEEE Trans Cloud Comput 9(2):753–762. https://doi.org/10.1109/TCC.2019.2892116
Deng N, Deng S, Chunqiang H, Lei K (2019) An efficient revocable attribute-based signcryption scheme with outsourced unsigncryption in cloud computing. IEEE Access 8:42805–42815
Ding X, Liu P, Jin H (2019) Privacy-preserving multi-keyword top-k similarity search over encrypted data. IEEE Trans Depend Secure Comput 16(02):344–357
Eltayieb N, Elhabob R, Hassan A, Li F (2020) A blockchain-based attribute-based signcryption scheme to secure data sharing in the cloud. J Syst Archit 102:101653
Eltayieb N, Elhabob R, Hassan A, Li F (2021) Secure mobile health system supporting search function and decryption verification. J Ambient Intell Humaniz Comput 12(2):2221–2231
Enron Email Dataset (2015) Enron Email Dataset. https://www.cs.cmu.edu/~./enron/. Accessed 16 Aug 2021
Fu Z, Sun X, Liu Q, Zhou L, Shu J (2015) Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans Commun 98(1):190–200
Gao H, Qin X, Barroso RJ, Hussain W, Xu Y, Yin Y (2020) Collaborative learning-based industrial IoT API recommendation for software-defined devices: the implicit knowledge discovery perspective. IEEE Trans Emerg Top Comput Intell. https://doi.org/10.1109/TETCI.2020.3023155
Gao H, Xu K, Cao M, Xiao J, Xu Q, Yin Y (2021) The deep features and attention mechanism-based method to dish healthcare under social IoT systems: an empirical study with a hand-deep local-global net. IEEE Trans Comput Soc Syst. https://doi.org/10.1109/TCSS.2021.3102591
He H, Zhang J, Li P, Jin Y, Zhang T (2019) A lightweight secure conjunctive keyword search scheme in hybrid cloud. Future Gener Comput Syst 93:727–736
Huang Y, Huahu X, Gao H, Ma X, Hussain W (2021) SSUR: an approach to optimizing virtual machine allocation strategy based on user requirements for cloud data center. IEEE Trans Green Commun Netw 5(2):670–681
Li K, Zhang W, Yang C, Nenghai Yu (2015) Security analysis on one-to-many order preserving encryption-based cloud data search. IEEE Trans Inf Forensics Secur 10(9):1918–1926
Li H, Yang Y, Dai Y, Shui Yu, Xiang Y (2020) Achieving secure and efficient dynamic searchable symmetric encryption over medical cloud data. IEEE Trans Cloud Comput 8(2):484–494
Miao Y, Ma J, Liu X, Weng J, Li H, Li H (2018) Lightweight fine-grained search over encrypted data in fog computing. IEEE Trans Serv Comput 12(5):772–785
Niaz MS, Saake G (2015) Merkle hash tree based techniques for data integrity of outsourced data. In: GvD, pp 66–71
Noroozi M, Eslami Z (2020) Public-key encryption with keyword search: a generic construction secure against online and offline keyword guessing attacks. J Ambient Intell Humaniz Comput 11(2):879–890
Ondreička M, Pokornỳ J (2008) Extending Fagin’s algorithm for more users based on multidimensional B-tree. In: East European conference on advances in databases and information systems. Springer, pp 199–214
Pandit T, Pandey SK, Barua R (2014) Attribute-based signcryption: signer privacy, strong unforgeability and IND-CCA2 security in adaptive-predicates attack. In: International conference on provable security. Springer, pp 274–290
Peng C, Wang W, Tian Y, Yuan Z (2016) An attribute-based signcryption scheme and its application in information hiding. Chin J Electron 25(4):632–640
Rao YS (2017) A secure and efficient ciphertext-policy attribute-based signcryption for personal health records sharing in cloud computing. Future Gener Comput Syst 67:133–151
Ren J, Zhang L, Wang B (2021) Decentralized multi-authority attribute-based searchable encryption scheme. Int J Netw Secur 23(2):332–342
Shahien T, Sarhan AM, Alshewimy MAM (2021) Multi-server searchable data crypt: searchable data encryption scheme for secure distributed cloud storage. J Ambient Intell Humaniz Comput 12:8663–8681
Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE symposium on security and privacy. S&P 2000. IEEE, pp 44–55
Varri U, Pasupuleti S, Kadambari KV (2020) A scoping review of searchable encryption schemes in cloud computing: taxonomy, methods, and recent developments. J Supercomput 76(4):3013–3042
Wan Z, Deng RH (2016) Vpsearch: achieving verifiability for privacy-preserving multi-keyword search over encrypted cloud data. IEEE Trans Depend Secure Comput 15(6):1083–1095
Wang N, Fu J, Bhargava BK, Zeng J (2018) Efficient retrieval over documents encrypted by attributes in cloud computing. IEEE Trans Inf Forensics Secur 13(10):2653–2667
Wong WK, Cheung DW, Kao B, Mamoulis N (2009) Secure KNN computation on encrypted databases. In: Proceedings of the 2009 ACM SIGMOD international conference on management of data, pp 139–152
Qing W, Ma X, Zhang L, Chen Y (2021) Expressive ciphertext policy attribute-based searchable encryption for medical records in cloud. Int J Netw Secur 23(3):461–472
Xia Z, Wang X, Sun X, Wang Q (2015) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 27(2):340–352
Xue L, Yu Y, Li Y, Au MH, Du X, Yang B (2019) Efficient attribute-based encryption with attribute revocation for assured data deletion. Inf Sci 479:640–650
Yang Y, Liu X, Zheng X, Rong C, Guo W (2018) Efficient traceable authorization search system for secure cloud storage. IEEE Trans Cloud Comput 8(3):819–832
Yin H, Zhang J, Yinqiao Xiong LO, Li F, Liao S, Li K (2019) CP-ABSE: a ciphertext-policy attribute-based searchable encryption scheme. IEEE Access 7:5682–5694
Yin Y, Cao Z, Yueshen X, Gao H, Li R, Mai Z (2020) QoS prediction for service recommendation with features learning in mobile edge computing environment. IEEE Trans Cognit Commun Netw 6(4):1136–1145
Jiguo Yu, Liu S, Wang S, Xiao Y, Yan B (2020) LH-ABSC: a lightweight hybrid attribute-based signcryption scheme for cloud-fog-assisted IoT. IEEE Internet Things J 7(9):7949–7966
Zhang W, Lin Y, Qi G (2018) Catch you if you misbehave: ranked keyword search results verification in cloud computing. IEEE Comput Archit Lett 6(01):74–86
Zhang L, Jian S, Yi M (2020) Outsourcing attributed-based ranked searchable encryption with revocation for cloud storage. IEEE Access 8:104344–104356
Zhu Y, Zhang W, Chen Y, Gao H (2019) A novel approach to workload prediction using attention-based LSTM encoder–decoder network in cloud environment. EURASIP J Wirel Commun Netw 2019(1):1–18
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Varri, U.S., Pasupuleti, S.K. & Kadambari, K.V. Practical verifiable multi-keyword attribute-based searchable signcryption in cloud storage. J Ambient Intell Human Comput 14, 11455–11467 (2023). https://doi.org/10.1007/s12652-022-03715-1
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-022-03715-1