Fast Multi-keywords Search over Encrypted Cloud Data

  • Cheng HongEmail author
  • Yifu Li
  • Min Zhang
  • Dengguo Feng
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10041)


Searchable encryption (SE) allows a client to store his data in the Cloud in a way that it is encrypted but still searchable by the server. However, when doing multi-keywords search (MKS), most SE schemes seems to be rather inefficient. In this paper, we design and implement an SE scheme that allows the MKS indices to be pre-built secretly at the server side, making fast MKS on very large databases possible. Detailed experiments and analysis are given, showing that our scheme is efficient, while the possible information leakages during the construction are proved to be minimized.


Searchable encryption Multi-keywords search Cloud storage 


  1. 1.
    Fulton, S.M., III.: Google Docs security hole may have exposed private (2009).
  2. 2.
    Leonhard, W.: Re-examining Dropbox and its (2011).
  3. 3.
    Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: IEEE Symposium on Security and Privacy, pp. 44–55 (2000)Google Scholar
  4. 4.
    Goh, E.J.: Secure indexes.Cryptology ePrint Archive, Report 2003/216 (2003).
  5. 5.
    Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. J. Comput. Secur. 19(5), 79–88 (2011)Google Scholar
  6. 6.
    Cash, D., Jaeger, J., Jarecki, S., Jutla, C., Krawczyk, H., Roşu, M.C. et al.: Dynamic searchable encryption in very-large databases: data structures and implementation. In: Network and Distributed System Security Symposium (2014)Google Scholar
  7. 7.
    Pappas, V., Krell, F., Vo, B., Kolesnikov, V.: Blind seer: a scalable private dbms. In: IEEE Symposium on Security and Privacy, pp. 359–374 (2014)Google Scholar
  8. 8.
    Jin, W.B., Dong, H.L.: On a security model of conjunctive keyword search over encrypted relational database. J. Syst. Softw. 84(8), 1364–1372 (2011)CrossRefGoogle Scholar
  9. 9.
    Cash, D., Jarecki, S., Jutla, C., Krawczyk, H., Roşu, M.-C., Steiner, M.: Highly-scalable searchable symmetric encryption with support for boolean queries. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013. LNCS, vol. 8042, pp. 353–373. Springer, Heidelberg (2013). doi: 10.1007/978-3-642-40041-4_20 CrossRefGoogle Scholar
  10. 10.
    Golle, P., Staddon, J., Waters, B.: Secure conjunctive keyword search over encrypted data. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol. 3089, pp. 31–45. Springer, Heidelberg (2004). doi: 10.1007/978-3-540-24852-1_3 CrossRefGoogle Scholar
  11. 11.
    Wang, P., Wang, H., Pieprzyk, J.: An efficient scheme of common secure indices for conjunctive keyword-based retrieval on encrypted data. In: Chung, K.-I., Sohn, K., Yung, M. (eds.) WISA 2008. LNCS, vol. 5379, pp. 145–159. Springer, Heidelberg (2009). doi: 10.1007/978-3-642-00306-6_11 CrossRefGoogle Scholar
  12. 12.
    Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 25(1), 222–233 (2014)CrossRefGoogle Scholar
  13. 13.
    Li, R., Liu, A.X., Wang, A.L., Bruhadeshwar, B.: Fast range query processing with strong privacy protection for cloud computing. Proc. VLDB Endowment 7(14), 1953–1964 (2014)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing AG 2016

Authors and Affiliations

  1. 1.Trusted Computing and Information Assurance Laboratory, Institute of SoftwareChinese Academy of SciencesBeijingChina
  2. 2.National Computer Emergency Response Team and Coordination Center of ChinaBeijingChina

Personalised recommendations