Skip to main content
Log in

CRSQ-KASE: Key Aggregate Searchable Encryption Supporting Conjunctive Range and Sort Query on Multi-owner Encrypted Data

  • Research Article - Computer Engineering and Computer Science
  • Published:
Arabian Journal for Science and Engineering Aims and scope Submit manuscript

Abstract

The existing key aggregate searchable encryption (KASE) schemes allow searches on the encrypted dataset using a single query trapdoor, with a feature to delegate the search rights of multiple files using a constant-size key. However, the limitation of the existing KASE schemes is they only support the exact keyword match \( (Keyword = Value)\) search query for a single query keyword. In addition, to perform a conjunctive keyword search using the existing KASE schemes, the user requires to submit different trapdoors for each individual keyword to the server. Considering the existence of numeric keywords, the KASE should support different types of query such as range query\( (Value_1 \le Keyword \le Value_2) \), comparison query(\( (Keyword \ge Value)\) or \( (Keyword \le Value)\)), and sort query. Therefore, a novel KASE scheme is proposed in this paper that supports the conjunctive range and sort query (i.e., CRSQ-KASE) on the encrypted dataset and enhances the query expressiveness of the existing KASE schemes. The proposed CRSQ-KASE scheme supports search among different keyword fields considering both numeric and non-numeric keywords. The user can search over shared encrypted dataset by giving arbitrary conjunctive queries \( (Keyword_1 = Value_1\wedge Keyword_2 \le Value_2 \wedge \cdots \wedge Value_{n_1} \le Keyword_n \le Value_{n_2}) \) using a single trapdoor. Furthermore, in the multi-owner setting, the user can search over multiple users’ documents set using a single query trapdoor. The theoretical, empirical, and security analyses show that the proposed CRSQ-KASE scheme performs better than the existing KASE schemes. To the best of our knowledge, the CRSQ-KASE is the first attempt that efficiently supports multi-dimensional, conjunctive keyword searches on the multi-owner encrypted dataset and gives the sorted search result.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Hospital compare. https://data.medicare.gov/data/hospital-compare (2019). Accessed 13 Feb 2019

  2. Ballard, L.; Kamara, S.; Monrose, F.: Achieving efficient conjunctive keyword searches over encrypted data. In: ICICS, vol. 5, pp. 414–426. Springer (2005)

  3. Belazzougui, D.; Boldi, P.; Pagh, R.; Vigna, S.: Theory and practice of monotone minimal perfect hashing. J. Exp. Algorithmics (JEA) 16, 2–3 (2011)

    MathSciNet  MATH  Google Scholar 

  4. Cash, D.; Jarecki, S.; Jutla, C.; Krawczyk, H.; Roşu, M.C.; Steiner, M.: Highly-scalable searchable symmetric encryption with support for boolean queries. In: Advances in Cryptology–CRYPTO 2013, pp. 353–373. Springer (2013)

  5. Cheon, J.H.: Security analysis of the strong diffie-hellman problem. In: Advances in Cryptology—EUROCRYPT 2006, pp. 1–11. Springer, Berlin, Heidelberg (2006). https://doi.org/10.1007/11761679_1

  6. Chuah, M.; Hu, W.: Privacy-aware bedtree based solution for fuzzy multi-keyword search over encrypted data. In: 2011 31st International Conference on Distributed Computing Systems Workshops (ICDCSW), pp. 273–281. IEEE (2011)

  7. Cui, B.; Liu, Z.; Wang, L.: Key-aggregate searchable encryption (kase) for group data sharing via cloud storage. IEEE Trans. Comput. 65(8), 2374–2385 (2016)

    Article  MathSciNet  Google Scholar 

  8. Curtmola, R.; Garay, J.; Kamara, S.; Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. J. Comput. Secur. 19(5), 895–934 (2011)

    Article  Google Scholar 

  9. De Caro, A.; Iovino, V.: jpbc: Java pairing based cryptography. In: 2011 IEEE Symposium on Computers and Communications (ISCC), pp. 850–855. IEEE (2011)

  10. Fu, Z.; Sun, X.; Liu, Q.; Zhou, L.; Shu, J.: Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans. Commun. 98(1), 190–200 (2015)

    Article  Google Scholar 

  11. Golle, P.; Staddon, J.; Waters, B.: Secure conjunctive keyword search over encrypted data. In: ACNS, vol. 4, pp. 31–45. Springer (2004)

  12. Guo, C.; Zhuang, R.; Jie, Y.; Choo, K.K.R.; Tang, X.: Secure range search over encrypted uncertain iot outsourced data

  13. Gura, N.; Patel, A.; Wander, A.; Eberle, H.; Shantz, S.C.: Comparing elliptic curve cryptography and rsa on 8-bit cpus. In: International Workshop on Cryptographic Hardware and Embedded Systems, pp. 119–132. Springer (2004)

  14. Hwang, M.S.; Hsu, S.T.; Lee, C.C.: A new public key encryption with conjunctive field keyword search scheme. Inf. Technol. Control 43(3), 277–288 (2014). https://doi.org/10.5755/j01.itc.43.3.6429

    Article  Google Scholar 

  15. Khan, N.S.; Krishna, C.R.; Khurana, A.: Secure ranked fuzzy multi-keyword search over outsourced encrypted cloud data. In: 2014 International Conference on Computer and Communication Technology (ICCCT), pp. 241–249. IEEE (2014)

  16. Kiayias, A.; Oksuz, O.; Russell, A.; Tang, Q.; Wang, B.: Efficient encrypted keyword search for multi-user data sharing. In: European Symposium on Research in Computer Security, vol. NA, pp. 173–195. Springer (2016)

  17. Li, H.; Liu, D.; Dai, Y.; Luan, T.H.; Shen, X.S.: Enabling efficient multi-keyword ranked search over encrypted mobile cloud data through blind storage. IEEE Trans. Emerg. Topics Comput. 3(1), 127–138 (2015)

    Article  Google Scholar 

  18. Li, H.; Yang, Y.; Luan, T.H.; Liang, X.; Zhou, L.; Shen, X.S.: Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data. IEEE Trans. Dependable Secure Comput. 13(3), 312–325 (2016)

    Article  Google Scholar 

  19. Li, T.; Liu, Z.; Jia, C.; Fu, Z.; Li, J.: Key-aggregate searchable encryption under multi-owner setting for group data sharing in the cloud. Int. J. Web Grid Serv. 14(1), 21–43 (2018)

    Article  Google Scholar 

  20. Li, T.; Liu, Z.; Li, P.; Jia, C.; Jiang, Z.L.; Li, J.: Verifiable searchable encryption with aggregate keys for data sharing in outsourcing storage. In: Information Security and Privacy, pp. 153–169. Springer International Publishing (2016). https://doi.org/10.1007/978-3-319-40367-0_10

  21. Liu, Z.; Li, T.; Li, P.; Jia, C.; Li, J.: Verifiable searchable encryption with aggregate keys for data sharing system. Future Gen. Comput. Syst. 78, 778–788 (2018)

    Article  Google Scholar 

  22. Liu, Z.; Liu, Y.: Verifiable and authenticated searchable encryption scheme with aggregate key in cloud storage. In: 2018 14th International Conference on Computational Intelligence and Security (CIS), pp. 421–425. IEEE (2018)

  23. Ma, C.; Xue, K.; Hong, P.: Distributed access control with adaptive privacy preserving property for wireless sensor networks. Secur. Commun. Netw. 7(4), 759–773 (2014)

    Article  Google Scholar 

  24. Miao, Y.; Weng, J.; Liu, X.; Choo, K.K.R.; Liu, Z.; Li, H.: Enabling verifiable multiple keywords search over encrypted cloud data. Inf. Sci. 465, 21–37 (2018)

    Article  Google Scholar 

  25. Mukti Padhya, D.C.J.: Mulkase—a novel approach for key aggregate searchable encryption for multi-owner data. Front. Inf. Technol. Electron. Eng. 1(1) (2018). https://doi.org/10.1631/FITEE.1800192

  26. Pagh, R.; Rodler, F.F.: Cuckoo hashing. J. Algorithms 51(2), 122–144 (2004)

    Article  MathSciNet  Google Scholar 

  27. Rouselakis, Y., Waters, B.: Efficient statically-secure large-universe multi-authority attribute-based encryption. In: International Conference on Financial Cryptography and Data Security, pp. 315–332. Springer (2015)

  28. Ryu, E.K., Takagi, T.: Efficient conjunctive keyword-searchable encryption. In: 21st International Conference on Advanced Information Networking and Applications Workshops, 2007, AINAW’07, vol. 1, pp. 409–414. IEEE (2007)

  29. Shim, K.A.: Cpas: an efficient conditional privacy-preserving authentication scheme for vehicular sensor networks. IEEE Trans. Veh. Technol. 61(4), 1874–1883 (2012)

    Article  Google Scholar 

  30. Shim, K.A.; Lee, Y.R.; Park, C.M.: Eibas: an efficient identity-based broadcast authentication scheme in wireless sensor networks. Ad Hoc Netw. 11(1), 182–189 (2013)

    Article  Google Scholar 

  31. Sun, W.; Wang, B.; Cao, N.; Li, M.; Lou, W.; Hou, Y.T.; Li, H.: Verifiable privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. IEEE Trans. Parallel Distrib. Syst. 25(11), 3025–3035 (2014)

    Article  Google Scholar 

  32. Yang, Y.; Liu, X.; Deng, R.: Expressive query over outsourced encrypted data. Inf. Sci. 442, 33–53 (2018)

    Article  MathSciNet  Google Scholar 

  33. Zhou, R.; Zhang, X.; Du, X.; Wang, X.; Yang, G.; Guizani, M.: File-centric multi-key aggregate keyword searchable encryption for industrial internet of things. IEEE Trans. Ind. Inf. 14, 3648–3658 (2018)

    Article  Google Scholar 

  34. Zhou, R.; Zhang, X.; Wang, X.; Yang, G.; Li, W.: Keyword searchable encryption with fine-grained forward secrecy for internet of thing data. In: International Conference on Algorithms and Architectures for Parallel Processing, pp. 288–302. Springer (2018)

  35. Zhou, Y.; Xu, G.; Wang, Y.; Wang, X.: Chaotic map-based time-aware multi-keyword search scheme with designated server. Wirel. Commun. Mobile Comput. 16(13), 1851–1858 (2016)

    Article  Google Scholar 

Download references

Funding

Funding information is not applicable. No funding was received. The experiments and research comply with the current laws of the country.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mukti Padhya.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Padhya, M., Jinwala, D.C. CRSQ-KASE: Key Aggregate Searchable Encryption Supporting Conjunctive Range and Sort Query on Multi-owner Encrypted Data. Arab J Sci Eng 45, 3133–3155 (2020). https://doi.org/10.1007/s13369-019-04302-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s13369-019-04302-x

Keywords

Navigation