Skip to main content
Log in

A scoping review of searchable encryption schemes in cloud computing: taxonomy, methods, and recent developments

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

With the emergence of cloud computing, data owners are showing interest to outsource the data to the cloud servers and allowing the data users to access the data as and when required. However, outsourcing sensitive data into the cloud leads to privacy issues. Encrypting the data before outsourcing provides privacy, but it does not provide search functionality. To achieve search over encrypted data without compromising the privacy, searchable encryption (SE) schemes have been proposed. It protects the user’s sensitive information by providing searchability on encrypted data stored in the cloud. In this paper, we surveyed different SE schemes which are existed in the cloud domain. In this survey, we presented the taxonomy of the SE schemes: symmetric searchable encryption, public key searchable encryption, and attribute-based searchable encryption schemes, and then provided a detailed discussion on the SE schemes in terms of index structure and search functionality. A comparative analysis of SE schemes is also provided on security and performance. Furthermore, we discussed the challenges, future directions, and applications of SE schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Ahsan MAM, Chowdhury FZ, Sabilah M, Wahab A, Idris B (2017) An efficient fuzzy keyword matching technique for searching through encrypted cloud data. In: International Conference on Research and Innovation in Information Systems (ICRIIS). https://doi.org/10.1109/ICRIIS.2017.8002456

  2. Ali FS, Lu S (2016) Searchable encryption with conjunctive field free keyword search scheme. In: 2016 International Conference on Network and Information Systems for Computers (ICNISC), IEEE, pp 260–264. https://doi.org/10.1109/ICNISC.2016.064

  3. Bellare M, Goldreich O, Goldwasser S (1994) Incremental cryptography: the case of hashing and signing. In: Annual International Cryptology Conference, Springer, Berlin, pp 216–233

  4. Bost R, Fouque PA, Pointcheval D (2016) Verifiable dynamic symmetric searchable encryption: optimality and forward security. IACR Cryptology ePrint Archive p 62

  5. Cai C, Yuan X, Wang C (2017) Towards trustworthy and private keyword search in encrypted decentralized storage. In: 2017 IEEE International Conference on Communications (ICC), IEEE, pp 1–7. https://doi.org/10.1109/ICC.2017.7996810

  6. Cai K, Hong C, Zhang M, Feng D, Lv Z (2013) A secure conjunctive keywords search over encrypted cloud data against inclusion-relation attack. In: 2013 IEEE 5th International Conference on Cloud Computing Technology and Science, IEEE, vol 1, pp 339–346. https://doi.org/10.1109/CloudCom.2013.51

  7. Cao N, Wang C, Lia M, Ren K, Lou W (2014) Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans Parallel Distrib Syst 25(1):222–233. https://doi.org/10.1109/TPDS.2013.45

    Article  Google Scholar 

  8. Cash D, Jaeger J, Jarecki S, Jutla CS, Krawczyk H, Rosu MC, Steiner M (2014) Dynamic searchable encryption in very-large databases: data structures and implementation. In: NDSS, Citeseer, vol 14, pp 23–26. https://doi.org/10.14722/ndss.2014.23264

  9. Chang YC, Mitzenmacher M (2005) Privacy preserving keyword searches on remote encrypted data. In: International Conference on Applied Cryptography and Network Security, Springer, pp 442–455. https://doi.org/10.1007/11496137_30

  10. Chase M, Kamara S (2010) Structured encryption and controlled disclosure. In: International Conference on the Theory and Application of Cryptology and Information Security, Springer, pp 577–594. https://doi.org/10.1007/978-3-642-17373-8_33

  11. Chen R, Mu Y, Yang G, Guo F, Wang X (2016) Dual-server public-key encryption with keyword search for secure cloud storage. IEEE Trans Inf Forensics Secur 11(4):789–798. https://doi.org/10.1109/TIFS.2015.2510822

    Article  Google Scholar 

  12. Cheng R, Yan J, Guan C, Zhang F, Ren K (2015) Verifiable searchable symmetric encryption from indistinguishability obfuscation. In: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ACM, pp 621–626. https://doi.org/10.1145/2714576.2714623

  13. Cui J, Zhou H, Zhong H, Xu Y (2018) Akser: attribute-based keyword search with efficient revocation in cloud computing. Inf Sci 423:343–352. https://doi.org/10.1016/j.ins.2017.09.029

    Article  Google Scholar 

  14. Curtmola R, Garay J, Kamara S, Ostrovsky R (2006) Searchable symmetric encryption: improved definitions and efficient constructions. In: 13th ACM Conference on Computer and Communications Security

  15. Ding M, Gao F, Jin Z, Zhang H (2012) An efficient public key encryption with conjunctive keyword search scheme based on pairings. In: 2012 3rd IEEE International Conference on Network Infrastructure and Digital Content, IEEE, pp 526–530. https://doi.org/10.1109/ICNIDC.2012.6418809

  16. Du M, Wang Q, He M, Weng J (2018) Privacy-preserving indexing and query processing for secure dynamic cloud storage. IEEE Trans Inf Forensics Secur 13(9):2320–2332. https://doi.org/10.1109/TIFS.2018.2818651

    Article  Google Scholar 

  17. Farràs O, Ribes-González J (2019) Provably secure public-key encryption with conjunctive and subset keyword search. Int J Inf Secur. https://doi.org/10.1007/s10207-018-00426-7

    Article  Google Scholar 

  18. Fu Z, Shu J, Sun X, Linge N (2014a) Smart cloud search services: verifiable keyword-based semantic search over encrypted cloud data. IEEE Trans Consum Electr 60(4):762–770. https://doi.org/10.1109/TCE.2014.7027353

    Article  Google Scholar 

  19. Fu Z, Sun X, Linge N, Zhou L (2014b) Achieving effective cloud search services: multi-keyword ranked search over encrypted cloud data supporting synonym query. IEEE Trans Consum Electr 60(1):164–172. https://doi.org/10.1109/TCE.2014.6780939

    Article  Google Scholar 

  20. Fu Z, Wu X, Guan C, Sun X, Ren K (2016) Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Trans Inf Forensics Secur 11(12):2706–2716. https://doi.org/10.1109/TIFS.2016.2596138

    Article  Google Scholar 

  21. Fu Z, Wu X, Wang Q, Ren K (2017) Enabling central keyword-based semantic extension search over encrypted outsourced data. IEEE Trans Inf Forensics Secur 12(12):2986–2997. https://doi.org/10.1109/TIFS.2017.2730365

    Article  Google Scholar 

  22. Fu Z, Xia L, Sun X, Liu AX, Xie G (2018) Semantic-aware searching over encrypted data for cloud computing. IEEE Trans Inf Forensics Secur 13(9):2359–2371. https://doi.org/10.1109/TIFS.2018.2819121

    Article  Google Scholar 

  23. Goh EJ et al (2003) Secure indexes. IACR Cryptol ePrint Archive 2003:216

    Google Scholar 

  24. Han F, Qin J, Hu J (2016) Secure searches in the cloud: a survey. Fut Gener Comput Syst 62:66–75. https://doi.org/10.1016/j.future.2016.01.007

    Article  Google Scholar 

  25. Höfer C, Karagiannis G (2011) Cloud computing services: taxonomy and comparison. J Internet Serv Appl 2(2):81–94. https://doi.org/10.1007/s13174-011-0027-x

    Article  Google Scholar 

  26. Hu S, Cai C, Wang Q, Wang C, Luo X, Ren K (2018) Searching an encrypted cloud meets blockchain: a decentralized, reliable and fair realization. In: IEEE INFOCOM 2018-IEEE Conference on Computer Communications, IEEE, pp 792–800. https://doi.org/10.1109/INFOCOM.2018.8485890

  27. Huang Q, Li H (2017) An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks. Inf Sci 403:1–14. https://doi.org/10.1016/j.ins.2017.03.038

    Article  MATH  Google Scholar 

  28. Hur J, Noh DK (2011) Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Trans Parall Distrib Syst 22(7):1214–1221. https://doi.org/10.1109/TPDS.2010.203

    Article  Google Scholar 

  29. Hwang MS, Hsu ST, Lee CC (2014) A new public key encryption with conjunctive field keyword search scheme. Inf Technol Control 43(3):277–288. https://doi.org/10.5755/j01.itc.43.3.6429

    Article  Google Scholar 

  30. Jeong IR, Kwon JO, Hong D, Lee DH (2009) Constructing PEKS schemes secure against keyword guessing attacks is possible? Comput Commun 32(2):394–396. https://doi.org/10.1016/j.comcom.2008.11.018

    Article  Google Scholar 

  31. Kalapatapu A, Sarkar M (2012) Cloud computing: an overview. Cloud Comput Methodol Syst Appl. https://doi.org/10.1201/b11149-8

    Article  Google Scholar 

  32. Kuzu M, Islam MS, Kantarcioglu M (2012) Efficient similarity search over encrypted data. In: 2012 IEEE 28th International Conference on Data Engineering, IEEE, pp 1156–1167. https://doi.org/10.1109/ICDE.2012.23

  33. Li J, Wang Q, Wang C, Cao N, Ren K, Lou W (2010) Fuzzy keyword search over encrypted data in cloud computing. In: Proceedings 2010 IEEE INFOCOM, IEEE, pp 1–5. https://doi.org/10.1109/INFCOM.2010.5462196

  34. Li R, Liu AX (2017) Adaptively secure conjunctive query processing over encrypted data for cloud computing. In: 2017 IEEE 33rd International Conference on Data Engineering (ICDE), IEEE, pp 697–708. https://doi.org/10.1109/ICDE.2017.122

  35. Li Y, Zhou F, Qin Y, Lin M, Xu Z (2018) Integrity-verifiable conjunctive keyword searchable encryption in cloud storage. Int J Inf Secur 17(5):549–568. https://doi.org/10.1007/s10207-017-0394-9

    Article  Google Scholar 

  36. Liang K, Susilo W (2015a) Searchable attribute-based mechanism with efficient data sharing for secure cloud storage. IEEE Trans Inf Forensics Secur 10(9):1981–1992. https://doi.org/10.1109/TIFS.2015.2442215

    Article  Google Scholar 

  37. Liang K, Susilo W (2015b) Searchable attribute-based mechanism with efficient data sharing for secure cloud storage. IEEE Trans Inf Forensics Secur 10(9):1981–1992. https://doi.org/10.1109/TIFS.2015.2442215

    Article  Google Scholar 

  38. Liu P, Wang J, Ma H, Nie H (2014) Efficient verifiable public key encryption with keyword search based on kp-abe. In: 2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications, IEEE, pp 584–589. https://doi.org/10.1109/BWCCA.2014.119

  39. Liu Z, Lv S, Wei Y, Li J, Liu JK, Xiang Y (2017) Ffsse: flexible forward secure searchable encryption with efficient performance. IACR Cryptol ePrint Archive 2017:1105

    Google Scholar 

  40. Ma S (2016) Identity-based encryption with outsourced equality test in cloud computing. Inf Sci 328:389–402. https://doi.org/10.1016/j.ins.2015.08.053

    Article  MATH  Google Scholar 

  41. Miao Y, Ma J, Liu X, Liu Z, Shen L, Wei F (2016) Vmkdo: verifiable multi-keyword search over encrypted cloud data for dynamic data-owner. Peer-to-Peer Netw Appl. https://doi.org/10.1007/s12083-016-0487-7

    Article  Google Scholar 

  42. Miao Y, Ma J, Jiang Q, Li X, Sangaiah AK (2018) Verifiable keyword search over encrypted cloud data in smart city. Comput Electr Eng 65:90–101. https://doi.org/10.1016/j.compeleceng.2017.06.021

    Article  Google Scholar 

  43. Ogata W, Kurosawa K (2016) Efficient no-dictionary verifiable SSE. IACR Cryptol ePrint Archive 2016:981

    Google Scholar 

  44. Pasupuleti SK, Ramalingam S, Buyya R (2016) An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing. J Netw Comput Appl 64:12–22. https://doi.org/10.1016/j.jnca.2015.11.023

    Article  Google Scholar 

  45. Pham H, Woodworth J, Salehi MA (2018) Survey on secure search over encrypted data on the cloud. arXiv preprint arXiv:181109767

  46. Poh GS, Chin JJ, Yau WC, Choo KKR, Mohamad MS (2017) Searchable symmetric encryption: designs and challenges. ACM Comput Surv (CSUR) 50(3):40. https://doi.org/10.1145/3064005

    Article  Google Scholar 

  47. Premkamal PK, Pasupuleti SK, Alphonse P (2018) A new verifiable outsourced ciphertext-policy attribute based encryption for big data privacy and access control in cloud. J Ambient Intell Human Comput 10:2693–2707

    Article  Google Scholar 

  48. Qian L, Luo Z, Du Y, Guo L (2009) Cloud computing: An overview. In: IEEE International Conference on Cloud Computing, Springer, pp 626–631. https://doi.org/10.1007/978-3-642-10665-1_63

  49. Sarga L (2012) Cloud computing: an overview. J Syst Integr 3(4):3–14. https://doi.org/10.20470/jsi.v3i4.131

    Article  Google Scholar 

  50. Shen J, Shen J, Chen X, Huang X, Susilo W (2017a) An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Trans Inf Forensics Secur 12(10):2402–2415. https://doi.org/10.1109/TIFS.2017.2705620

    Article  Google Scholar 

  51. Shen J, Wang C, Wang A, Ji S, Zhang Y (2018) A searchable and verifiable data protection scheme for scholarly big data. IEEE Trans Emerg Topics Comput. https://doi.org/10.1109/TETC.2018.2830368

    Article  Google Scholar 

  52. Shen Z, Shu J, Xue W (2017b) Keyword search with access control over encrypted cloud data. IEEE Sens J 17(3):858–868. https://doi.org/10.1109/JSEN.2016.2634018

    Article  Google Scholar 

  53. Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000, IEEE, pp 44–55. https://doi.org/10.1109/SECPRI.2000.848445

  54. Su S, Teng Y, Cheng X, Xiao K, Li G, Chen J (2015) Privacy-preserving top-k spatial keyword queries in untrusted cloud environments. IEEE Trans Serv Comput. https://doi.org/10.1109/TSC.2015.2481900

    Article  Google Scholar 

  55. Sun J, Wang X, Wang S, Ren L (2018) A searchable personal health records framework with fine-grained access control in cloud-fog computing. PloS One 13(11):e0207543. https://doi.org/10.1371/journal.pone.0207543

    Article  Google Scholar 

  56. Sun W, Wang B, Cao N, Li M, Lou W, Hou YT, Li H (2013) Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. In: Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, ACM, pp 71–82

  57. Sun W, Liu X, Lou W, Hou YT, Li H (2015) Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data. In: 2015 IEEE Conf Comput Commun (INFOCOM), IEEE, pp 2110–2118

  58. Sun W, Yu S, Lou W, Hou YT, Li H (2016) Protecting your right: verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. IEEE Trans Parallel Distrib Syst 27(4):1187–1198. https://doi.org/10.1109/TPDS.2014.2355202

    Article  Google Scholar 

  59. Wan Z, Deng RH (2018) Vpsearch: achieving verifiability for privacy-preserving multi-keyword search over encrypted cloud data. IEEE Trans Depend Secure Comput 15(6):1083–1095. https://doi.org/10.1109/TDSC.2016.2635128

    Article  Google Scholar 

  60. Wang B, Yu S, Lou W, Hou YT (2014) Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud. IEEE INFOCOM 2014-IEEE Conference on Computer Communications pp 2112–2120. https://doi.org/10.1109/INFOCOM.2014.6848153

  61. Wang C, Cao N, Ren K, Lou W (2012) Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Trans Parallel Distrib Syst 23(8):1467–1479. https://doi.org/10.1109/TPDS.2011.282

    Article  Google Scholar 

  62. Wang N, Fu J, Bhargava BK, Zeng J (2018) Efficient retrieval over documents encrypted by attributes in cloud computing. IEEE Trans Inf Forensics Secur 13(10):2653–2667. https://doi.org/10.1109/TIFS.2018.2825952

    Article  Google Scholar 

  63. Wang Y, Wang J, Chen X (2016) Secure searchable encryption: a survey. J Commun Inf Netw 1(4):52–65. https://doi.org/10.1007/BF03391580

    Article  Google Scholar 

  64. Wu D, Gan Q, Wang X (2018) Verifiable public key encryption with keyword search based on homomorphic encryption in multi-user setting. IEEE Access 6:42445–42453. https://doi.org/10.1109/ACCESS.2018.2861424

    Article  Google Scholar 

  65. Wu Z, Li K (2019) Vbtree: forward secure conjunctive queries over encrypted data for cloud computing. VLDB J 28(1):25–46. https://doi.org/10.1007/s00778-018-0517-6

    Article  Google Scholar 

  66. Xia Z, Wang X, Sun X, Wang Q (2016) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 27(2):340–352. https://doi.org/10.1109/TPDS.2015.2401003

    Article  Google Scholar 

  67. Xu K, Wang G, Wang S, Zhao Z, Wang J (2017) A secure channel free conjunctive keyword search without random oracle under simple assumption. In: 2017 IEEE 9th International Conference on Communication Software and Networks (ICCSN), IEEE, pp 1467–1476. https://doi.org/10.1109/ICCSN.2017.8230352

  68. Xu P, Jin H, Wu Q, Wang W (2013a) Public-key encryption with fuzzy keyword search: A provably secure scheme under keyword guessing attack. IEEE Trans Comput 62(11):2266–2277. https://doi.org/10.1109/TC.2012.215

    Article  MathSciNet  MATH  Google Scholar 

  69. Xu P, Jin H, Wu Q, Wang W (2013b) Public-key encryption with fuzzy keyword search: a provably secure scheme under keyword guessing attack. IEEE Trans Comput 62(11):2266–2277. https://doi.org/10.1109/TC.2012.215

    Article  MathSciNet  MATH  Google Scholar 

  70. Yan J, Zhang Y, Liu X (2016) Secure multi-keyword search supporting dynamic update and ranked retrieval. China Commun 13(20):209–221. https://doi.org/10.1109/CC.2016.7733045

    Article  Google Scholar 

  71. Yang Y, Ma M (2016) Conjunctive keyword search with designated tester and timing enabled proxy re-encryption function for e-health clouds. IEEE Trans Inf Forensics Secur 11(4):746–759. https://doi.org/10.1109/TIFS.2015.2509912

    Article  Google Scholar 

  72. Yu J, Lu P, Zhu Y, Xue G, Li M (2013) Toward secure multikeyword top-k retrieval over encrypted cloud data. IEEE Trans Depend Secure Comput 10(4):239–250. https://doi.org/10.1109/TDSC.2013.9

    Article  Google Scholar 

  73. Yuan X, Wang X, Wang C, Yu C, Nutanong S (2017) Privacy-preserving similarity joins over encrypted data. IEEE Trans Inf Forensics Secur 12(11):2763–2775. https://doi.org/10.1109/TIFS.2017.2721221

    Article  Google Scholar 

  74. Wang Q, He M, Du M, Chow SS, Lai RW, Zou Q (2018) Searchable encryption over feature-rich data. IEEE Trans Depend Secure Comput 15(3):496–510. https://doi.org/10.1109/TDSC.2016.2593444

    Article  Google Scholar 

  75. Zhang W, Lin Y, Xiao S, Wu J, Zhou S (2016) Privacy preserving ranked multi-keyword search for multiple data owners in cloud computing. IEEE Trans Comput 65(5):1566–1577. https://doi.org/10.1109/TC.2015.2448099

    Article  MathSciNet  MATH  Google Scholar 

  76. Zhang W, Lin Y, Qi G (2018) Catch you if you misbehave: ranked keyword search results verification in cloud computing. IEEE Trans Cloud Comput 6(1):74–86. https://doi.org/10.1109/TCC.2015.2481389

    Article  Google Scholar 

  77. Zheng Q, Xu S, Ateniese G (2014) Vabks: verifiable attribute-based keyword search over outsourced encrypted data. In: IEEE INFOCOM 2014-IEEE Conference on Computer Communications, IEEE, pp 522–530. https://doi.org/10.1109/INFOCOM.2014.6847976

  78. Zhu J, Li Q, Wang C, Yuan X, Wang Q, Ren K (2018) Enabling generic, verifiable, and secure data search in cloud services. IEEE Trans Parallel Distrib Syst 29(8):1721–1735. https://doi.org/10.1109/TPDS.2018.2808283

    Article  Google Scholar 

Download references

Acknowledgements

The authors would like to thank the editor and the anonymous reviewers whose comments significantly helped to improve the quality of this paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Umasankararao Varri.

Ethics declarations

Conflict of interest

The authors declare that they have no known competing for financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Varri, U., Pasupuleti, S. & Kadambari, K.V. A scoping review of searchable encryption schemes in cloud computing: taxonomy, methods, and recent developments. J Supercomput 76, 3013–3042 (2020). https://doi.org/10.1007/s11227-019-03087-y

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-019-03087-y

Keywords

Navigation