Browse > Article
http://dx.doi.org/10.3837/tiis.2022.04.011

Enabling Dynamic Multi-Client and Boolean Query in Searchable Symmetric Encryption Scheme for Cloud Storage System  

Xu, Wanshan (Faculty of Information Technology, Beijing University of Technology)
Zhang, Jianbiao (Faculty of Information Technology, Beijing University of Technology)
Yuan, Yilin (Faculty of Information Technology, Beijing University of Technology)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.16, no.4, 2022 , pp. 1286-1306 More about this Journal
Abstract
Searchable symmetric encryption (SSE) provides a safe and effective solution for retrieving encrypted data on cloud servers. However, the existing SSE schemes mainly focus on single keyword search in single client, which is inefficient for multiple keywords and cannot meet the needs for multiple clients. Considering the above drawbacks, we propose a scheme enabling dynamic multi-client and Boolean query in searchable symmetric encryption for cloud storage system (DMC-SSE). DMC-SSE realizes the fine-grained access control of multi-client in SSE by attribute-based encryption (ABE) and novel access control list (ACL), and supports Boolean query of multiple keywords. In addition, DMC-SSE realizes the full dynamic update of client and file. Compared with the existing multi-client schemes, our scheme has the following advantages: 1) Dynamic. DMC-SSE not only supports the dynamic addition or deletion of multiple clients, but also realizes the dynamic update of files. 2) Non-interactivity. After being authorized, the client can query keywords without the help of the data owner and the data owner can dynamically update client's permissions without requiring the client to stay online. At last, the security analysis and experiments results demonstrate that our scheme is safe and efficient.
Keywords
searchable symmetric encryption; multi-client; Boolean query; attribute-based encryption; cloud storage;
Citations & Related Records
연도 인용수 순위
  • Reference
1 S.F. Sun, C. Zuo, J.K. Liu, A. Sakzad, R. Steinfeld, T.H. Yuen, D. Gu, "Non-Interactive Multi-Client Searchable Encryption: Realization and Implementation," IEEE Trans. Depend. Secure Comput, vol. 19, no. 1, pp. 452-467, 2022.   DOI
2 G. Xu, H.W. Li, Y.S. Dai, K. Yang, X.D. Lin, "Enabling efficient and geometric range query with access control over encrypted spatial data," IEEE Trans.Inf. Forensics Security, vol.14, no.4, pp.870-885, Apr.2019.   DOI
3 Y. Zhang, J. Katz, and C. Papamanthou, "All your queries are belong to us: The power of file-injection attacks on searchable encryption," in Proc. of IEEE Symp. Secur. Privacy, pp. 707-720, 2016.
4 X. Song, C. Dong, D. Yuan, Q.L. Xu, M.H. Zhao, "Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency," IEEE Trans. Depend. Secure Comput, vol.17, no.5, pp.912-927, Sept.-Oct. 1 2020.   DOI
5 L. Du, K. Li, Q. Liu, Z. Wu, S. Zhang, "Dynamic multi-client searchable symmetric encryption with support for boolean queries," Inf. Sci, vol.506, pp.234-257, Jan. 2020.   DOI
6 M. Raykova, B. Vo, S. M. Bellovin, and T. Malkin, "Secure anonymous database search," in Proc. of the 2009 ACM workshop on Cloud computing security, pp. 115-126, 2009.
7 B.A. Fisch, B. Vo, F. Krell, A. Kumarasubramanian, V. Kolesnikov, T. Malkin, S.M. Bellovin, "Malicious-client security in blind seer: a scalable private DBMS," in Proc. of IEEE Symp. Secur. Privacy, pp. 395-410, 2015.
8 S. Faber, S. Jarecki, H. Krawczyk, Q. Nguyen, M. Rosu, M. Steiner, "Rich queries on encrypted data: beyond exact matches," in Proc. of ESORICS, Vienna, Austria, 123-145, 2015.
9 D. Cash, P. Grubbs, J. Perry, and T. Ristenpart, "Leakage-abuse attacks against searchable encryption," in Proc. of 22nd ACM SIGSAC Conf. Comput. Commun. Secur., pp. 668-679, 2015.
10 Y. Wei, S. Lv, X. Guo, Z. Liu, Y. Huang, and B. Li, "FSSE: Forward secure searchable encryption with keyed-block chains," Inf. Sci., vol. 500, pp. 113-126, Oct. 2019.   DOI
11 B. Fuhry, R. Bahmani, F. Brasser, F. Hahn, F. Kerschbaum, AR. Sadeghi, "HardIDX: Practical and Secure Index with SGX," in Proc. of IFIP Annual Conference on Data and Applications Security and Privacy XXXI, pp.386-408, 2017.
12 J. G. Chamani, D. Papadopoulos, C. Papamanthou, and R. Jalili, "New constructions for forward and backward private symmetric searchable encryption," in Proc. of ACM Conf Computer Commun Secur., pp. 1038-1055, 2018.
13 H. Li, Y. Yang, Y. Dai, Y. Shui, X. Yong, "Achieving Secure and Efficient Dynamic Searchable Symmetric Encryption over Medical Cloud Data," IEEE Trans.Cloud Comput, vol.8, no.2, pp. 484-494. April-June 2020.   DOI
14 X. Liu, G. Yang, Y. Mu, H. Deng, "Multi-user Verifiable Searchable Symmetric Encryption for Cloud Storage," IEEE Trans. Depend.Secure Comput, vol.17, no.6, pp.1322-1332, Nov.-Dec. 1 2020.   DOI
15 K. S. Kim, M. Kim, D. Lee, J. H. Park, and W. Kim, "Forward secure dynamic searchable symmetric encryption with efficient updates," in Proc. of ACM Conf. Comput. Commun. Secur., pp. 1449-1463, 2017.
16 D. X. Song, D. Wagner, and A. Perrig, "Practical techniques for searches on encrypted data," in Proc. of IEEE Symp. Secur. Privacy, pp. 44-55, 2000.
17 S. Kamara, C. Papamanthou, and T. Roeder, "Dynamic searchable symmetric encryption," in Proc. of ACM Conf. Comput. Commun. Secur., pp. 965-976, 2012.
18 S. Tahir, S. Ruj, Y. Rahulamathavan, M. Rajarajan and C. Glackin, "A New Secure and Lightweight Searchable Encryption Scheme over Encrypted Cloud Data," IEEE Trans. Emerging Topics in Computing, vol. 7, no. 4, pp. 530-544, 1 Oct.-Dec. 2019.   DOI
19 D. Boneh, G. D. Crescenzo, R. Ostrovsky, and G. Persiano, "Public key encryption with keyword search," in Proc. of Int. Conf. Theory Appl. Cryptographic Techn., pp. 506-522, 2004.
20 M.Naveed, M. Prabhakaran, and C.A. Gunter, "Dynamic searchable encryption via blind storage," in Proc. of IEEE Symp. Secur. Privacy, pp. 639-654, 2014.
21 J. Li, Y. Huang, Y. Wei, Z. L. Liu, C. Y. Dong, W. J. Lou, "Searchable Symmetric Encryption with Forward Search Privacy," IEEE Trans. Dependa. Secure Comput, vol. 18, no. 1, pp. 460-474, Jan/Feb 2021.   DOI
22 H. Li, Y. Yang, Y. Dai, S. Yu and Y. Xiang, "Achieving Secure and Efficient Dynamic Searchable Symmetric Encryption over Medical Cloud Data," IEEE Trans.Cloud Comput, vol. 8, no. 2, pp. 484-494, 1 April-June 2020.   DOI
23 R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, "Searchable symmetric encryption: improved definitions and efficient constructions," Journal of Computer Security, vol. 19, no. 5, pp. 895-934, 2011.   DOI
24 S. Kamara, T. Moataz, "Boolean searchable symmetric encryption with worst-case sub-linear complexity," in Proc. of Advances in Cryptology - EUROCRYPT 2017, pp.94-124, 2017.
25 L. Ballard, S. Kamara, F. Monrose, "Achieving efficient conjunctive keyword searches over encrypted data," in Proc. of 7th. Int. Conf. Info. Commu. Secur, pp. 414-426, 2005.
26 S. Jarecki, C. S. Jutla, H. Krawczyk, M. Rosu, and M. Steiner, "Outsourced symmetric private information retrieval," in Proc. of ACM Conf. Comput. Commun. Secur., pp. 875-888, 2013.
27 M. Chase and S. Kamara, "Structured encryption and controlled disclosure," in Proc. of Advances in Cryptology - ASIACRYPT 2010, pp. 577-594, 2010.
28 P. Golle, J. Staddon, and B. R. Waters, "Secure conjunctive keyword search over encrypted data," in Proc. of International Conference on Applied Cryptography and Network Security, pp. 31-45, 2004.
29 S. Lai, S. Patranabis, A. Sakzad, J. Liu, D. Mukhopadhyay, R. Steinfeld, S. Sun, D. Liu, and C. Zuo, "Result pattern hidingsearchable encryption for conjunctive queries," in Proc. of ACM Conf. Comput. Commun. Secur., pp. 745-762, 2018.
30 D. Cash, S. Jarecki, C. S. Jutla, H. Krawczyk, M. Rosu, and M. Steiner, "Highly-scalable searchable symmetric encryption with support for boolean queries," Advances in Cryptology-CRYPTO, pp. 353-373, 2013.