Browse > Article
http://dx.doi.org/10.3837/tiis.2019.11.016

How to retrieve the encrypted data on the blockchain  

Li, Huige (School of Data and Computer Science, Sun Yat-sen University)
Zhang, Fangguo (School of Data and Computer Science, Sun Yat-sen University)
Luo, Peiran (School of Data and Computer Science, Sun Yat-sen University)
Tian, Haibo (School of Data and Computer Science, Sun Yat-sen University)
He, Jiejie (School of Data and Computer Science, Sun Yat-sen University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.13, no.11, 2019 , pp. 5560-5579 More about this Journal
Abstract
Searchable symmetric encryption (SSE) scheme can perform search on encrypted data directly without revealing the plain data and keywords. At present, many constructive SSE schemes were proposed. However, they cannot really resist the malicious adversary, because it (i.e., the cloud server) may delete some important data. As a result, it is very likely that the returned search results are incorrect. In order to better guarantee the integrity of outsourcing data, and ensure the correction of returned search results at the same time, in this paper, we combine SSE with blockchain (BC), and propose a SSE-on-BC framework model. We then construct two concrete schemes based on the size of the data, which can better provide privacy protection and integrity verification for data. Lastly, we present their security and performance analyses, which show that they are secure and feasible.
Keywords
Searchable encryption; blockchain; cloud-storage; symmetric encryption; privacy;
Citations & Related Records
연도 인용수 순위
  • Reference
1 E. Stefanov, C. Papamanthou, and E. Shi, "Practical dynamic searchable encryption with small leakage," NDSS, volume 14, pages 23-26, 2014.
2 R. Bost, P. A. Fouque, and D. Pointcheval, "Verifiable dynamic symmetric searchable encryption: Optimality and forward security," IACR Cryptology ePrint Archive, 2016:62, 2016. http://eprint.iacr.org/2016/062
3 R. Bost, "${\Sigma}o{\varphi}o{\zeta}$: Forward Secure Searchable Encryption," in Proc. of the 2016 ACM SIGSAC Conference on Computer and Communications Security, ACM, pages 1143-1154, 2016.
4 S. Kamara, C. Papamanthou, "Parallel and dynamic searchable symmetric encryption," in Proc. of International Conference on Financial Cryptography and Data Security, Springer, pages 258-274, 2013.
5 J. Alderman, K. Martin, and S. Louise Renwick, "Multi-level access in searchable symmetric encryption," in Proc. of International Conference on Financial Cryptography and Data Security, Springer, pages 35-52, 2017.
6 C. Bosch, P. Hartel, W. Jonker, and et al., "A survey of provably secure searchable encryption," ACM Computing Surveys (CSUR), 47(2), 18, 2015.
7 K. Kurosawa and Y. Ohtaki, "UC-secure searchable symmetric encryption," Financial Cryptography and Data Security, Springer, pages 285-298, 2012.
8 R. Cheng, J. Yan, C. Guan, and et al., "Verifiable searchable symmetric encryption from indistinguishability obfuscation," in Proc. of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '15, pages 621-626, Singapore, April 14-17, 2015.
9 S. G. Dai, H. G. Li, and F. G. Zhang, "Memory leakage-resilient searchable symmetric encryption," Future Generation Comp. Syst., 62, 76-84, 2016.   DOI
10 D. X. Song, D. Wagner, and A. Perrig, "Practical techniques for searches on encrypted data," in Proc. of 2000 IEEE Symposium on Security and Privacy, IEEE, pages 44-55, 2000.
11 E. J. Goh, "Secure indexes," IACR Cryptology ePrint Archive, 2003. http://eprint.iacr.org/2003/216
12 R. Curtmola, J. A. Garay, S. Kamara, and et al., "Searchable symmetric encryption: improved definitions and efficient constructions," in Proc. of the 13th ACM conference on Computer and communications security, ACM, pages 79-88, 2006.
13 P. Golle, J. Staddon, and B. Waters, "Secure conjunctive keyword search over encrypted data," International Conference on Applied Cryptography and Network Security, Springer, pages 31-45, 2004.
14 T. Moataz and A. Shikfa, "Boolean symmetric searchable encryption," in Proc. of the 8th ACM SIGSAC symposium on Information, computer and communications security, ACM, pages 265-276, 2013.
15 D. Cash, S. Jarecki, C. S. Jutla, and so on, "Highly-scalable searchable symmetric encryption with support for boolean queries," Advances in Cryptology-CRYPTO 2013, Springer, pages 353-373, 2013.
16 S. Kamara, T. Moataz, "Boolean searchable symmetric encryption with worst-case sub-linear complexity," in Proc. of Annual International Conference on the Theory and Applications of Cryptographic Techniques, Springer, pages 94-124, 2017.
17 J. Li, Q. Wang, C.Wang, and et al., "Fuzzy keyword search over encrypted data in cloud computing," in Proc. of INFOCOM, 2010 Proceedings IEEE, pages 1-5, 2010.
18 M. Swan, "Blockchain: Blueprint for a new economy [M]," O'Reilly Media, Inc., 2015.
19 H. G. Li, F. G. Zhang, and C. I. Fan, "Deniable searchable symmetric encryption," Information Sciences, 402:233-243, 2017.   DOI
20 S. Nakamoto, Bitcoin: A peer-to-peer electronic cash system, 2008.
21 M. Andrychowicz, S. Dziembowski, D. Malinowski, and et al., "Fair two-party computations via bitcoin deposits," in Proc. of International Conference on Financial Cryptography and Data Security, Springer, pages 105-121, 2014.
22 D. Chaum, "Blind signatures for untraceable payments," Advances in cryptology, pages 199-203, Springer, 1983.
23 D. Chaum, "Blind signature system," Advances in cryptology, Springer, pages 153-153, 1984.
24 M. Andrychowicz, S. Dziembowski, D. Malinowski, and et al., "Secure multiparty computations on bitcoin," in Proc. of 2014 IEEE Symposium on Security and Privacy, IEEE, pages 443-458, 2014.
25 S. Kamara, C. Papamanthou, and T. Roeder, "Dynamic searchable symmetric encryption," in Proc. of the 2012 ACM conference on Computer and communications security, ACM, pages 965-976, 2012.
26 A. Boldyreva, N. Chenette, "Efficient fuzzy search on encrypted data," Fast Software Encryption, Springer, pages 613-633, 2014.
27 W. K. Wong, D. W. Cheung, B. Kao, and et al., "Secure knn computation on encrypted databases," in Proc. of the 2009 ACM SIGMOD International Conference on Management of data, ACM, pages 139-152, 2009.
28 N. Cao, C. Wang, M. Li, and et al., "Privacy-preserving multi-keyword ranked search over encrypted cloud data," IEEE Trans. Parallel Distrib. Syst., 25(1), 222-233, 2014.   DOI
29 Z. J. Fu, F. X. Huang, K. Ren, and et al., "Privacy-preserving smart semantic search based on conceptual graphs over encrypted outsourced data," IEEE Trans. Information Forensics and Security, 12(8):1874-1884, 2017.   DOI
30 P. V. Liesdonk, S. Sedghi, J. Doumen, and et al., "Computationally efficient searchable symmetric encryption," in Proc. of Workshop on Secure Data Management, Springer, pages 87-100, 2010.
31 K. Kurosawa and Y. Ohtaki, "How to update documents verifiably in searchable symmetric encryption," in Proc. of Cryptology and Network Security-12th International Conference, CANS 2013, pages 309-328, Paraty, Brazil, November 20-22, 2013.
32 D. Cash, J. Jaeger, S. Jarecki, and et al., "Dynamic searchable encryption in very-large databases: Data structures and implementation," NDSS, volume 14, pages 23-26, Citeseer, 2014.
33 M. Naveed, M. Prabhakaran, and C.A. Gunter, "Dynamic searchable encryption via blind storage," Security and Privacy (SP), 2014 IEEE Symposium on, IEEE, pages 639-654, 2014.
34 C. Guo, X. Chen, Y. M. Jie, and et al., "Dynamic multi-phrase ranked search over encrypted data with symmetric searchable encryption," IEEETrans. Services Computing, 2017.