Privacy-Preserving Searchable Encryption Scheme over Encrypted Data Supporting Dynamic Update

  • R. RashmiEmail author
  • D. V. N. Siva Kumar
  • P. Santhi Thilagam
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 969)


With the advancement of network technology, cloud computing services have become popular due to the on-demand availability of computing resources, large-scale data storage and distribution. Many users are influenced to outsource their private data to cloud servers to cut the costs of building by storing their data locally. Security and privacy protection of such outsourced data become a major security concern. To address this, the outsourced data is encrypted before it is stored on the cloud server. At the same time, users must be enabled to retrieve the data of their interest rather than going through all documents and picking up the ones that are required. This creates a need to search the encrypted data without allowing the cloud service providers know about the search query but still provide the clients with relevant documents. With data continuously changing over time, clients wish to keep their documents updated so as to maintain data consistency and enable other users to fetch the latest relevant data. However, while adding new keywords to documents, the potential positions of newly added keywords are leaked in the existing approaches. In this paper, an efficient and secure approach is proposed that returns the latest relevant documents and also preserves the privacy of updated keywords.


Searchable encryption Keyword addition Privacy preserving Multi-keyword ranked search 


  1. 1.
    Request for comments (2018).
  2. 2.
    Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506–522. Springer, Heidelberg (2004). Scholar
  3. 3.
    Bost, R.: \(\sum {o\varphi o \varsigma }\): forward secure searchable encryption. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 1143–1154. ACM (2016)Google Scholar
  4. 4.
    Bost, R., Minaud, B., Ohrimenko, O.: Forward and backward private searchable encryption from constrained cryptographic primitives. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 1465–1482. ACM (2017)Google Scholar
  5. 5.
    Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 25(1), 222–233 (2014)CrossRefGoogle Scholar
  6. 6.
    Chang, Y.-C., Mitzenmacher, M.: Privacy preserving keyword searches on remote encrypted data. In: Ioannidis, J., Keromytis, A., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 442–455. Springer, Heidelberg (2005). Scholar
  7. 7.
    Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. J. Comput. Secur. 19(5), 895–934 (2011)CrossRefGoogle Scholar
  8. 8.
    Etemad, M., Küpçü, A., Papamanthou, C., Evans, D.: Efficient dynamic searchable encryption with forward privacy. Proc. Priv. Enhancing Technol. 2018(1), 5–20 (2018)CrossRefGoogle Scholar
  9. 9.
    Fu, Z., Wu, X., Wang, Q., Ren, K.: Enabling central keyword-based semantic extension search over encrypted outsourced data. IEEE Trans. Inf. Forensics Secur. 12(12), 2986–2997 (2017)CrossRefGoogle Scholar
  10. 10.
    Goh, E.J., et al.: Secure indexes. IACR Cryptology ePrint Archive 2003, 216 (2003)Google Scholar
  11. 11.
    Kamara, S., Papamanthou, C.: Parallel and dynamic searchable symmetric encryption. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 258–274. Springer, Heidelberg (2013). Scholar
  12. 12.
    Kamara, S., Papamanthou, C., Roeder, T.: Dynamic searchable symmetric encryption. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 965–976. ACM (2012)Google Scholar
  13. 13.
    Kim, K.S., Kim, M., Lee, D., Park, J.H., Kim, W.H.: Forward secure dynamic searchable symmetric encryption with efficient updates. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 1449–1463. ACM (2017)Google Scholar
  14. 14.
    Li, R., Xu, Z., Kang, W., Yow, K.C., Xu, C.Z.: Efficient multi-keyword ranked query over encrypted data in cloud computing. Futur. Gener. Comput. Syst. 30, 179–190 (2014)CrossRefGoogle Scholar
  15. 15.
    Manning, C., Raghavan, P., Schütze, H.: Introduction to Information Retrieval. Cambridge University Press, New York (2008)CrossRefGoogle Scholar
  16. 16.
    Mell, P., Grance, T.: The nist definition of cloud computing. Commun. ACM 53(6), 50 (2010)Google Scholar
  17. 17.
    Naveed, M., Prabhakaran, M., Gunter, C.A.: Dynamic searchable encryption via blind storage. In: 2014 IEEE Symposium on Security and Privacy (SP), pp. 639–654. IEEE (2014)Google Scholar
  18. 18.
    Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceedings. 2000 IEEE Symposium on Security and Privacy, S&P 2000, pp. 44–55. IEEE (2000)Google Scholar
  19. 19.
    Stefanov, E., Papamanthou, C., Shi, E.: Practical dynamic searchable encryption with small leakage. In: NDSS, vol. 14, pp. 23–26 (2014)Google Scholar
  20. 20.
    Xia, Z., Wang, X., Sun, X., Wang, Q.: A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 27(2), 340–352 (2016)CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  • R. Rashmi
    • 1
    Email author
  • D. V. N. Siva Kumar
    • 1
  • P. Santhi Thilagam
    • 1
  1. 1.Department of Computer Science and EngineeringNational Institute of Technology Karnataka SurathkalMangaloreIndia

Personalised recommendations