Fine-Grained, Multi-key Search Control in Multi-user Searchable Encryption

  • Manju S. NairEmail author
  • M. S. Rajasree
  • Sabu M. Thampi
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10658)


Searchable encryption schemes support selective retrieval of encrypted data stored in the cloud storage. However, extending this scheme to support diverse set of users to selectively share and retrieve data from the cloud storage still remains as a challenge; it requires managing the access control policies of the users by a third party, the cloud provider. When multiple users are involved, the system needs to ensure that only controlled information is disclosed to a legitimate user and also a dishonest user colluding with the cloud provider cannot leak any thing beyond the granted privileges. The proposed model is designed to support fine grained search control on selected set of documents by authorized users. The system does not require shared keys or expensive trusted third parties. The search complexity is linear to the number of documents that can be accessed by an authorized user and is also secure against the possible leakage due to collusion attack. The security of the system is proved using rigorous security analysis.


Searchable encryption Search control Keyword privacy Bilinear pairing Multi-key 



The authors would like to thank College of Engineering Trivandrum for providing facilities to carry out the work and IHRD for sponsoring the research work.


  1. 1.
    Akinyele, J.A., Garman, C., Miers, I., Pagano, M.W., Rushanan, M., Green, M., Rubin, A.D.: Charm: a framework for rapidly prototyping cryptosystems. J. Cryptogr. Eng. 3(2), 111–128 (2013)CrossRefGoogle Scholar
  2. 2.
    Bao, F., Deng, R.H., Ding, X., Yang, Y.: Private query on encrypted data in multi-user settings. In: Chen, L., Mu, Y., Susilo, W. (eds.) ISPEC 2008. LNCS, vol. 4991, pp. 71–85. Springer, Heidelberg (2008). CrossRefGoogle Scholar
  3. 3.
    Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. SIAM J. Comput. 32(3), 586–615 (2003)MathSciNetCrossRefzbMATHGoogle Scholar
  4. 4.
    Bouabana-Tebibel, T., Kaci, A.: Parallel search over encrypted data under attribute based encryption on the cloud computing. Comput. Secur. 54, 77–91 (2015)CrossRefGoogle Scholar
  5. 5.
    Cash, D., Jaeger, J., Jarecki, S., Jutla, C., Krawczyk, H., Rosu, M.C., Steiner, M.: Dynamic searchable encryption in very-large databases: data structures and implementation. In: Network and Distributed System Security Symposium (NDSS 2014) (2014)Google Scholar
  6. 6.
    Chang, Y.-C., Mitzenmacher, M.: Privacy preserving keyword searches on remote encrypted data. In: Ioannidis, J., Keromytis, A., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 442–455. Springer, Heidelberg (2005). CrossRefGoogle Scholar
  7. 7.
    Cui, B., Liu, Z., Wang, L.: Key-aggregate searchable encryption (KASE) for group data sharing via cloud storage. IEEE Trans. Comput. 65(8), 2374–2385 (2016)MathSciNetCrossRefzbMATHGoogle Scholar
  8. 8.
    Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 79–88. ACM (2006)Google Scholar
  9. 9.
    Granlund, T., et al.: GNU MP 6.0 Multiple Precision Arithmetic Library. Samurai Media Limited, Thames Ditton (2015)Google Scholar
  10. 10.
    Kamara, S., Lauter, K.: Cryptographic cloud storage. In: Sion, R., Curtmola, R., Dietrich, S., Kiayias, A., Miret, J.M., Sako, K., Sebé, F. (eds.) FC 2010. LNCS, vol. 6054, pp. 136–149. Springer, Heidelberg (2010). CrossRefGoogle Scholar
  11. 11.
    Lynn, B.: PBC Library (2006).
  12. 12.
    Popa, R.A., Zeldovich, N.: Multi-key searchable encryption. IACR Cryptol. ePrint Arch. 2013, 508 (2013)Google Scholar
  13. 13.
    Zhang, W., Lin, Y., Xiao, S., Wu, J., Zhou, S.: Privacy preserving ranked multi-keyword search for multiple data owners in cloud computing. IEEE Trans. Comput. 65(5), 1566–1577 (2016)MathSciNetCrossRefzbMATHGoogle Scholar
  14. 14.
    Zhu, Y., Huang, Z., Takagi, T.: Secure and controllable k-NN query over encrypted cloud data with key confidentiality. J. Parallel Distrib. Comput. 89, 1–12 (2016)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  • Manju S. Nair
    • 1
    • 2
    Email author
  • M. S. Rajasree
    • 3
  • Sabu M. Thampi
    • 4
  1. 1.College of Engineering, TrivandrumThiruvananthapuramIndia
  2. 2.University of KeralaThiruvananthapuramIndia
  3. 3.Government Engineering CollegeThiruvananthapuramIndia
  4. 4.Indian Institute of Information Technology and Management KeralaKazhakkoottamIndia

Personalised recommendations