Skip to main content
Log in

Practical verifiable multi-keyword attribute-based searchable signcryption in cloud storage

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

Attribute-based searchable encryption (ABSE) allows only authorized users to perform a keyword search over encrypted data in the cloud while preserving the data privacy and keyword privacy. Although ABSE provides data privacy, access control, and keyword search, it does not support data authenticity which plays a major role in the cloud environment to ensure that the data is not modified. Alongside, improving search efficiency in ABSE becomes mandatory since the cloud is attracting massive data. To address these issues, in this paper, we propose a practical verifiable multi-keyword attribute-based searchable signcryption scheme in cloud storage. The scheme uses ciphertext-policy attribute-based signcryption to achieve data privacy, access control, and data authenticity. Further, we integrate the multi-dimensional \(B^{+}\)-tree with the Merkle tree in index construction to enhance the search efficiency and to verify the search results. The security analysis proves that our scheme satisfies security requirements such as data privacy and authenticity, index and query privacy, trapdoor unlinkability. We also prove that our scheme is secure against chosen plaintext attacks and signature forgery attacks. Finally, the performance analysis demonstrates that the proposed scheme is efficient and practical.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  • Beimel Amos et al (1996) Secure schemes for secret sharing and key distribution. Technion-Israel Institute of technology, Faculty of computer science

  • Cao N, Wang C, Li M, Ren K, Lou W (2013) Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans Parallel Distrib Syst 25(1):222–233

    Article  Google Scholar 

  • Chaudhari P, Das ML (2021) Privacy preserving searchable encryption with fine-grained access control. IEEE Trans Cloud Comput 9(2):753–762. https://doi.org/10.1109/TCC.2019.2892116

    Article  Google Scholar 

  • Deng N, Deng S, Chunqiang H, Lei K (2019) An efficient revocable attribute-based signcryption scheme with outsourced unsigncryption in cloud computing. IEEE Access 8:42805–42815

    Article  Google Scholar 

  • Ding X, Liu P, Jin H (2019) Privacy-preserving multi-keyword top-k similarity search over encrypted data. IEEE Trans Depend Secure Comput 16(02):344–357

    Article  Google Scholar 

  • Eltayieb N, Elhabob R, Hassan A, Li F (2020) A blockchain-based attribute-based signcryption scheme to secure data sharing in the cloud. J Syst Archit 102:101653

    Article  Google Scholar 

  • Eltayieb N, Elhabob R, Hassan A, Li F (2021) Secure mobile health system supporting search function and decryption verification. J Ambient Intell Humaniz Comput 12(2):2221–2231

    Article  Google Scholar 

  • Enron Email Dataset (2015) Enron Email Dataset. https://www.cs.cmu.edu/~./enron/. Accessed 16 Aug 2021

  • Fu Z, Sun X, Liu Q, Zhou L, Shu J (2015) Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans Commun 98(1):190–200

    Article  Google Scholar 

  • Gao H, Qin X, Barroso RJ, Hussain W, Xu Y, Yin Y (2020) Collaborative learning-based industrial IoT API recommendation for software-defined devices: the implicit knowledge discovery perspective. IEEE Trans Emerg Top Comput Intell. https://doi.org/10.1109/TETCI.2020.3023155

    Article  Google Scholar 

  • Gao H, Xu K, Cao M, Xiao J, Xu Q, Yin Y (2021) The deep features and attention mechanism-based method to dish healthcare under social IoT systems: an empirical study with a hand-deep local-global net. IEEE Trans Comput Soc Syst. https://doi.org/10.1109/TCSS.2021.3102591

    Article  Google Scholar 

  • He H, Zhang J, Li P, Jin Y, Zhang T (2019) A lightweight secure conjunctive keyword search scheme in hybrid cloud. Future Gener Comput Syst 93:727–736

    Article  Google Scholar 

  • Huang Y, Huahu X, Gao H, Ma X, Hussain W (2021) SSUR: an approach to optimizing virtual machine allocation strategy based on user requirements for cloud data center. IEEE Trans Green Commun Netw 5(2):670–681

    Article  Google Scholar 

  • Li K, Zhang W, Yang C, Nenghai Yu (2015) Security analysis on one-to-many order preserving encryption-based cloud data search. IEEE Trans Inf Forensics Secur 10(9):1918–1926

    Article  Google Scholar 

  • Li H, Yang Y, Dai Y, Shui Yu, Xiang Y (2020) Achieving secure and efficient dynamic searchable symmetric encryption over medical cloud data. IEEE Trans Cloud Comput 8(2):484–494

    Article  Google Scholar 

  • Miao Y, Ma J, Liu X, Weng J, Li H, Li H (2018) Lightweight fine-grained search over encrypted data in fog computing. IEEE Trans Serv Comput 12(5):772–785

    Article  Google Scholar 

  • Niaz MS, Saake G (2015) Merkle hash tree based techniques for data integrity of outsourced data. In: GvD, pp 66–71

  • Noroozi M, Eslami Z (2020) Public-key encryption with keyword search: a generic construction secure against online and offline keyword guessing attacks. J Ambient Intell Humaniz Comput 11(2):879–890

    Article  Google Scholar 

  • Ondreička M, Pokornỳ J (2008) Extending Fagin’s algorithm for more users based on multidimensional B-tree. In: East European conference on advances in databases and information systems. Springer, pp 199–214

  • Pandit T, Pandey SK, Barua R (2014) Attribute-based signcryption: signer privacy, strong unforgeability and IND-CCA2 security in adaptive-predicates attack. In: International conference on provable security. Springer, pp 274–290

  • Peng C, Wang W, Tian Y, Yuan Z (2016) An attribute-based signcryption scheme and its application in information hiding. Chin J Electron 25(4):632–640

    Article  Google Scholar 

  • Rao YS (2017) A secure and efficient ciphertext-policy attribute-based signcryption for personal health records sharing in cloud computing. Future Gener Comput Syst 67:133–151

    Article  Google Scholar 

  • Ren J, Zhang L, Wang B (2021) Decentralized multi-authority attribute-based searchable encryption scheme. Int J Netw Secur 23(2):332–342

    Google Scholar 

  • Shahien T, Sarhan AM, Alshewimy MAM (2021) Multi-server searchable data crypt: searchable data encryption scheme for secure distributed cloud storage. J Ambient Intell Humaniz Comput 12:8663–8681

    Article  Google Scholar 

  • Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE symposium on security and privacy. S&P 2000. IEEE, pp 44–55

  • Varri U, Pasupuleti S, Kadambari KV (2020) A scoping review of searchable encryption schemes in cloud computing: taxonomy, methods, and recent developments. J Supercomput 76(4):3013–3042

    Article  Google Scholar 

  • Wan Z, Deng RH (2016) Vpsearch: achieving verifiability for privacy-preserving multi-keyword search over encrypted cloud data. IEEE Trans Depend Secure Comput 15(6):1083–1095

    Article  Google Scholar 

  • Wang N, Fu J, Bhargava BK, Zeng J (2018) Efficient retrieval over documents encrypted by attributes in cloud computing. IEEE Trans Inf Forensics Secur 13(10):2653–2667

    Article  Google Scholar 

  • Wong WK, Cheung DW, Kao B, Mamoulis N (2009) Secure KNN computation on encrypted databases. In: Proceedings of the 2009 ACM SIGMOD international conference on management of data, pp 139–152

  • Qing W, Ma X, Zhang L, Chen Y (2021) Expressive ciphertext policy attribute-based searchable encryption for medical records in cloud. Int J Netw Secur 23(3):461–472

    Google Scholar 

  • Xia Z, Wang X, Sun X, Wang Q (2015) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 27(2):340–352

    Article  Google Scholar 

  • Xue L, Yu Y, Li Y, Au MH, Du X, Yang B (2019) Efficient attribute-based encryption with attribute revocation for assured data deletion. Inf Sci 479:640–650

    Article  MATH  Google Scholar 

  • Yang Y, Liu X, Zheng X, Rong C, Guo W (2018) Efficient traceable authorization search system for secure cloud storage. IEEE Trans Cloud Comput 8(3):819–832

    Google Scholar 

  • Yin H, Zhang J, Yinqiao Xiong LO, Li F, Liao S, Li K (2019) CP-ABSE: a ciphertext-policy attribute-based searchable encryption scheme. IEEE Access 7:5682–5694

    Article  Google Scholar 

  • Yin Y, Cao Z, Yueshen X, Gao H, Li R, Mai Z (2020) QoS prediction for service recommendation with features learning in mobile edge computing environment. IEEE Trans Cognit Commun Netw 6(4):1136–1145

    Article  Google Scholar 

  • Jiguo Yu, Liu S, Wang S, Xiao Y, Yan B (2020) LH-ABSC: a lightweight hybrid attribute-based signcryption scheme for cloud-fog-assisted IoT. IEEE Internet Things J 7(9):7949–7966

    Article  Google Scholar 

  • Zhang W, Lin Y, Qi G (2018) Catch you if you misbehave: ranked keyword search results verification in cloud computing. IEEE Comput Archit Lett 6(01):74–86

    Google Scholar 

  • Zhang L, Jian S, Yi M (2020) Outsourcing attributed-based ranked searchable encryption with revocation for cloud storage. IEEE Access 8:104344–104356

    Article  Google Scholar 

  • Zhu Y, Zhang W, Chen Y, Gao H (2019) A novel approach to workload prediction using attention-based LSTM encoder–decoder network in cloud environment. EURASIP J Wirel Commun Netw 2019(1):1–18

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Uma Sankararao Varri.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Varri, U.S., Pasupuleti, S.K. & Kadambari, K.V. Practical verifiable multi-keyword attribute-based searchable signcryption in cloud storage. J Ambient Intell Human Comput 14, 11455–11467 (2023). https://doi.org/10.1007/s12652-022-03715-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-022-03715-1

Keywords

Navigation