Abstract
The existing key aggregate searchable encryption (KASE) schemes allow searches on the encrypted dataset using a single query trapdoor, with a feature to delegate the search rights of multiple files using a constant-size key. However, the limitation of the existing KASE schemes is they only support the exact keyword match \( (Keyword = Value)\) search query for a single query keyword. In addition, to perform a conjunctive keyword search using the existing KASE schemes, the user requires to submit different trapdoors for each individual keyword to the server. Considering the existence of numeric keywords, the KASE should support different types of query such as range query\( (Value_1 \le Keyword \le Value_2) \), comparison query(\( (Keyword \ge Value)\) or \( (Keyword \le Value)\)), and sort query. Therefore, a novel KASE scheme is proposed in this paper that supports the conjunctive range and sort query (i.e., CRSQ-KASE) on the encrypted dataset and enhances the query expressiveness of the existing KASE schemes. The proposed CRSQ-KASE scheme supports search among different keyword fields considering both numeric and non-numeric keywords. The user can search over shared encrypted dataset by giving arbitrary conjunctive queries \( (Keyword_1 = Value_1\wedge Keyword_2 \le Value_2 \wedge \cdots \wedge Value_{n_1} \le Keyword_n \le Value_{n_2}) \) using a single trapdoor. Furthermore, in the multi-owner setting, the user can search over multiple users’ documents set using a single query trapdoor. The theoretical, empirical, and security analyses show that the proposed CRSQ-KASE scheme performs better than the existing KASE schemes. To the best of our knowledge, the CRSQ-KASE is the first attempt that efficiently supports multi-dimensional, conjunctive keyword searches on the multi-owner encrypted dataset and gives the sorted search result.
Similar content being viewed by others
References
Hospital compare. https://data.medicare.gov/data/hospital-compare (2019). Accessed 13 Feb 2019
Ballard, L.; Kamara, S.; Monrose, F.: Achieving efficient conjunctive keyword searches over encrypted data. In: ICICS, vol. 5, pp. 414–426. Springer (2005)
Belazzougui, D.; Boldi, P.; Pagh, R.; Vigna, S.: Theory and practice of monotone minimal perfect hashing. J. Exp. Algorithmics (JEA) 16, 2–3 (2011)
Cash, D.; Jarecki, S.; Jutla, C.; Krawczyk, H.; Roşu, M.C.; Steiner, M.: Highly-scalable searchable symmetric encryption with support for boolean queries. In: Advances in Cryptology–CRYPTO 2013, pp. 353–373. Springer (2013)
Cheon, J.H.: Security analysis of the strong diffie-hellman problem. In: Advances in Cryptology—EUROCRYPT 2006, pp. 1–11. Springer, Berlin, Heidelberg (2006). https://doi.org/10.1007/11761679_1
Chuah, M.; Hu, W.: Privacy-aware bedtree based solution for fuzzy multi-keyword search over encrypted data. In: 2011 31st International Conference on Distributed Computing Systems Workshops (ICDCSW), pp. 273–281. IEEE (2011)
Cui, B.; Liu, Z.; Wang, L.: Key-aggregate searchable encryption (kase) for group data sharing via cloud storage. IEEE Trans. Comput. 65(8), 2374–2385 (2016)
Curtmola, R.; Garay, J.; Kamara, S.; Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. J. Comput. Secur. 19(5), 895–934 (2011)
De Caro, A.; Iovino, V.: jpbc: Java pairing based cryptography. In: 2011 IEEE Symposium on Computers and Communications (ISCC), pp. 850–855. IEEE (2011)
Fu, Z.; Sun, X.; Liu, Q.; Zhou, L.; Shu, J.: Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans. Commun. 98(1), 190–200 (2015)
Golle, P.; Staddon, J.; Waters, B.: Secure conjunctive keyword search over encrypted data. In: ACNS, vol. 4, pp. 31–45. Springer (2004)
Guo, C.; Zhuang, R.; Jie, Y.; Choo, K.K.R.; Tang, X.: Secure range search over encrypted uncertain iot outsourced data
Gura, N.; Patel, A.; Wander, A.; Eberle, H.; Shantz, S.C.: Comparing elliptic curve cryptography and rsa on 8-bit cpus. In: International Workshop on Cryptographic Hardware and Embedded Systems, pp. 119–132. Springer (2004)
Hwang, M.S.; Hsu, S.T.; Lee, C.C.: A new public key encryption with conjunctive field keyword search scheme. Inf. Technol. Control 43(3), 277–288 (2014). https://doi.org/10.5755/j01.itc.43.3.6429
Khan, N.S.; Krishna, C.R.; Khurana, A.: Secure ranked fuzzy multi-keyword search over outsourced encrypted cloud data. In: 2014 International Conference on Computer and Communication Technology (ICCCT), pp. 241–249. IEEE (2014)
Kiayias, A.; Oksuz, O.; Russell, A.; Tang, Q.; Wang, B.: Efficient encrypted keyword search for multi-user data sharing. In: European Symposium on Research in Computer Security, vol. NA, pp. 173–195. Springer (2016)
Li, H.; Liu, D.; Dai, Y.; Luan, T.H.; Shen, X.S.: Enabling efficient multi-keyword ranked search over encrypted mobile cloud data through blind storage. IEEE Trans. Emerg. Topics Comput. 3(1), 127–138 (2015)
Li, H.; Yang, Y.; Luan, T.H.; Liang, X.; Zhou, L.; Shen, X.S.: Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data. IEEE Trans. Dependable Secure Comput. 13(3), 312–325 (2016)
Li, T.; Liu, Z.; Jia, C.; Fu, Z.; Li, J.: Key-aggregate searchable encryption under multi-owner setting for group data sharing in the cloud. Int. J. Web Grid Serv. 14(1), 21–43 (2018)
Li, T.; Liu, Z.; Li, P.; Jia, C.; Jiang, Z.L.; Li, J.: Verifiable searchable encryption with aggregate keys for data sharing in outsourcing storage. In: Information Security and Privacy, pp. 153–169. Springer International Publishing (2016). https://doi.org/10.1007/978-3-319-40367-0_10
Liu, Z.; Li, T.; Li, P.; Jia, C.; Li, J.: Verifiable searchable encryption with aggregate keys for data sharing system. Future Gen. Comput. Syst. 78, 778–788 (2018)
Liu, Z.; Liu, Y.: Verifiable and authenticated searchable encryption scheme with aggregate key in cloud storage. In: 2018 14th International Conference on Computational Intelligence and Security (CIS), pp. 421–425. IEEE (2018)
Ma, C.; Xue, K.; Hong, P.: Distributed access control with adaptive privacy preserving property for wireless sensor networks. Secur. Commun. Netw. 7(4), 759–773 (2014)
Miao, Y.; Weng, J.; Liu, X.; Choo, K.K.R.; Liu, Z.; Li, H.: Enabling verifiable multiple keywords search over encrypted cloud data. Inf. Sci. 465, 21–37 (2018)
Mukti Padhya, D.C.J.: Mulkase—a novel approach for key aggregate searchable encryption for multi-owner data. Front. Inf. Technol. Electron. Eng. 1(1) (2018). https://doi.org/10.1631/FITEE.1800192
Pagh, R.; Rodler, F.F.: Cuckoo hashing. J. Algorithms 51(2), 122–144 (2004)
Rouselakis, Y., Waters, B.: Efficient statically-secure large-universe multi-authority attribute-based encryption. In: International Conference on Financial Cryptography and Data Security, pp. 315–332. Springer (2015)
Ryu, E.K., Takagi, T.: Efficient conjunctive keyword-searchable encryption. In: 21st International Conference on Advanced Information Networking and Applications Workshops, 2007, AINAW’07, vol. 1, pp. 409–414. IEEE (2007)
Shim, K.A.: Cpas: an efficient conditional privacy-preserving authentication scheme for vehicular sensor networks. IEEE Trans. Veh. Technol. 61(4), 1874–1883 (2012)
Shim, K.A.; Lee, Y.R.; Park, C.M.: Eibas: an efficient identity-based broadcast authentication scheme in wireless sensor networks. Ad Hoc Netw. 11(1), 182–189 (2013)
Sun, W.; Wang, B.; Cao, N.; Li, M.; Lou, W.; Hou, Y.T.; Li, H.: Verifiable privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. IEEE Trans. Parallel Distrib. Syst. 25(11), 3025–3035 (2014)
Yang, Y.; Liu, X.; Deng, R.: Expressive query over outsourced encrypted data. Inf. Sci. 442, 33–53 (2018)
Zhou, R.; Zhang, X.; Du, X.; Wang, X.; Yang, G.; Guizani, M.: File-centric multi-key aggregate keyword searchable encryption for industrial internet of things. IEEE Trans. Ind. Inf. 14, 3648–3658 (2018)
Zhou, R.; Zhang, X.; Wang, X.; Yang, G.; Li, W.: Keyword searchable encryption with fine-grained forward secrecy for internet of thing data. In: International Conference on Algorithms and Architectures for Parallel Processing, pp. 288–302. Springer (2018)
Zhou, Y.; Xu, G.; Wang, Y.; Wang, X.: Chaotic map-based time-aware multi-keyword search scheme with designated server. Wirel. Commun. Mobile Comput. 16(13), 1851–1858 (2016)
Funding
Funding information is not applicable. No funding was received. The experiments and research comply with the current laws of the country.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Padhya, M., Jinwala, D.C. CRSQ-KASE: Key Aggregate Searchable Encryption Supporting Conjunctive Range and Sort Query on Multi-owner Encrypted Data. Arab J Sci Eng 45, 3133–3155 (2020). https://doi.org/10.1007/s13369-019-04302-x
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s13369-019-04302-x