Advertisement

A scoping review of searchable encryption schemes in cloud computing: taxonomy, methods, and recent developments

  • Umasankararao VarriEmail author
  • Syamkumar Pasupuleti
  • K. V. Kadambari
Article
  • 26 Downloads

Abstract

With the emergence of cloud computing, data owners are showing interest to outsource the data to the cloud servers and allowing the data users to access the data as and when required. However, outsourcing sensitive data into the cloud leads to privacy issues. Encrypting the data before outsourcing provides privacy, but it does not provide search functionality. To achieve search over encrypted data without compromising the privacy, searchable encryption (SE) schemes have been proposed. It protects the user’s sensitive information by providing searchability on encrypted data stored in the cloud. In this paper, we surveyed different SE schemes which are existed in the cloud domain. In this survey, we presented the taxonomy of the SE schemes: symmetric searchable encryption, public key searchable encryption, and attribute-based searchable encryption schemes, and then provided a detailed discussion on the SE schemes in terms of index structure and search functionality. A comparative analysis of SE schemes is also provided on security and performance. Furthermore, we discussed the challenges, future directions, and applications of SE schemes.

Keywords

Cloud storage Searchable encryption Privacy preserving Search functionality Security 

Notes

Acknowledgements

The authors would like to thank the editor and the anonymous reviewers whose comments significantly helped to improve the quality of this paper.

Compliance with ethical standards

Conflict of interest

The authors declare that they have no known competing for financial interests or personal relationships that could have appeared to influence the work reported in this paper.

References

  1. 1.
    Ahsan MAM, Chowdhury FZ, Sabilah M, Wahab A, Idris B (2017) An efficient fuzzy keyword matching technique for searching through encrypted cloud data. In: International Conference on Research and Innovation in Information Systems (ICRIIS).  https://doi.org/10.1109/ICRIIS.2017.8002456
  2. 2.
    Ali FS, Lu S (2016) Searchable encryption with conjunctive field free keyword search scheme. In: 2016 International Conference on Network and Information Systems for Computers (ICNISC), IEEE, pp 260–264.  https://doi.org/10.1109/ICNISC.2016.064
  3. 3.
    Bellare M, Goldreich O, Goldwasser S (1994) Incremental cryptography: the case of hashing and signing. In: Annual International Cryptology Conference, Springer, Berlin, pp 216–233Google Scholar
  4. 4.
    Bost R, Fouque PA, Pointcheval D (2016) Verifiable dynamic symmetric searchable encryption: optimality and forward security. IACR Cryptology ePrint Archive p 62Google Scholar
  5. 5.
    Cai C, Yuan X, Wang C (2017) Towards trustworthy and private keyword search in encrypted decentralized storage. In: 2017 IEEE International Conference on Communications (ICC), IEEE, pp 1–7.  https://doi.org/10.1109/ICC.2017.7996810
  6. 6.
    Cai K, Hong C, Zhang M, Feng D, Lv Z (2013) A secure conjunctive keywords search over encrypted cloud data against inclusion-relation attack. In: 2013 IEEE 5th International Conference on Cloud Computing Technology and Science, IEEE, vol 1, pp 339–346.  https://doi.org/10.1109/CloudCom.2013.51
  7. 7.
    Cao N, Wang C, Lia M, Ren K, Lou W (2014) Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans Parallel Distrib Syst 25(1):222–233.  https://doi.org/10.1109/TPDS.2013.45 CrossRefGoogle Scholar
  8. 8.
    Cash D, Jaeger J, Jarecki S, Jutla CS, Krawczyk H, Rosu MC, Steiner M (2014) Dynamic searchable encryption in very-large databases: data structures and implementation. In: NDSS, Citeseer, vol 14, pp 23–26.  https://doi.org/10.14722/ndss.2014.23264
  9. 9.
    Chang YC, Mitzenmacher M (2005) Privacy preserving keyword searches on remote encrypted data. In: International Conference on Applied Cryptography and Network Security, Springer, pp 442–455.  https://doi.org/10.1007/11496137_30 CrossRefGoogle Scholar
  10. 10.
    Chase M, Kamara S (2010) Structured encryption and controlled disclosure. In: International Conference on the Theory and Application of Cryptology and Information Security, Springer, pp 577–594.  https://doi.org/10.1007/978-3-642-17373-8_33 CrossRefGoogle Scholar
  11. 11.
    Chen R, Mu Y, Yang G, Guo F, Wang X (2016) Dual-server public-key encryption with keyword search for secure cloud storage. IEEE Trans Inf Forensics Secur 11(4):789–798.  https://doi.org/10.1109/TIFS.2015.2510822 CrossRefGoogle Scholar
  12. 12.
    Cheng R, Yan J, Guan C, Zhang F, Ren K (2015) Verifiable searchable symmetric encryption from indistinguishability obfuscation. In: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ACM, pp 621–626.  https://doi.org/10.1145/2714576.2714623
  13. 13.
    Cui J, Zhou H, Zhong H, Xu Y (2018) Akser: attribute-based keyword search with efficient revocation in cloud computing. Inf Sci 423:343–352.  https://doi.org/10.1016/j.ins.2017.09.029 CrossRefGoogle Scholar
  14. 14.
    Curtmola R, Garay J, Kamara S, Ostrovsky R (2006) Searchable symmetric encryption: improved definitions and efficient constructions. In: 13th ACM Conference on Computer and Communications SecurityGoogle Scholar
  15. 15.
    Ding M, Gao F, Jin Z, Zhang H (2012) An efficient public key encryption with conjunctive keyword search scheme based on pairings. In: 2012 3rd IEEE International Conference on Network Infrastructure and Digital Content, IEEE, pp 526–530.  https://doi.org/10.1109/ICNIDC.2012.6418809
  16. 16.
    Du M, Wang Q, He M, Weng J (2018) Privacy-preserving indexing and query processing for secure dynamic cloud storage. IEEE Trans Inf Forensics Secur 13(9):2320–2332.  https://doi.org/10.1109/TIFS.2018.2818651 CrossRefGoogle Scholar
  17. 17.
    Farràs O, Ribes-González J (2019) Provably secure public-key encryption with conjunctive and subset keyword search. Int J Inf Secur.  https://doi.org/10.1007/s10207-018-00426-7 CrossRefGoogle Scholar
  18. 18.
    Fu Z, Shu J, Sun X, Linge N (2014a) Smart cloud search services: verifiable keyword-based semantic search over encrypted cloud data. IEEE Trans Consum Electr 60(4):762–770.  https://doi.org/10.1109/TCE.2014.7027353 CrossRefGoogle Scholar
  19. 19.
    Fu Z, Sun X, Linge N, Zhou L (2014b) Achieving effective cloud search services: multi-keyword ranked search over encrypted cloud data supporting synonym query. IEEE Trans Consum Electr 60(1):164–172.  https://doi.org/10.1109/TCE.2014.6780939 CrossRefGoogle Scholar
  20. 20.
    Fu Z, Wu X, Guan C, Sun X, Ren K (2016) Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Trans Inf Forensics Secur 11(12):2706–2716.  https://doi.org/10.1109/TIFS.2016.2596138 CrossRefGoogle Scholar
  21. 21.
    Fu Z, Wu X, Wang Q, Ren K (2017) Enabling central keyword-based semantic extension search over encrypted outsourced data. IEEE Trans Inf Forensics Secur 12(12):2986–2997.  https://doi.org/10.1109/TIFS.2017.2730365 CrossRefGoogle Scholar
  22. 22.
    Fu Z, Xia L, Sun X, Liu AX, Xie G (2018) Semantic-aware searching over encrypted data for cloud computing. IEEE Trans Inf Forensics Secur 13(9):2359–2371.  https://doi.org/10.1109/TIFS.2018.2819121 CrossRefGoogle Scholar
  23. 23.
    Goh EJ et al (2003) Secure indexes. IACR Cryptol ePrint Archive 2003:216Google Scholar
  24. 24.
    Han F, Qin J, Hu J (2016) Secure searches in the cloud: a survey. Fut Gener Comput Syst 62:66–75.  https://doi.org/10.1016/j.future.2016.01.007 CrossRefGoogle Scholar
  25. 25.
    Höfer C, Karagiannis G (2011) Cloud computing services: taxonomy and comparison. J Internet Serv Appl 2(2):81–94.  https://doi.org/10.1007/s13174-011-0027-x CrossRefGoogle Scholar
  26. 26.
    Hu S, Cai C, Wang Q, Wang C, Luo X, Ren K (2018) Searching an encrypted cloud meets blockchain: a decentralized, reliable and fair realization. In: IEEE INFOCOM 2018-IEEE Conference on Computer Communications, IEEE, pp 792–800.  https://doi.org/10.1109/INFOCOM.2018.8485890
  27. 27.
    Huang Q, Li H (2017) An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks. Inf Sci 403:1–14.  https://doi.org/10.1016/j.ins.2017.03.038 CrossRefGoogle Scholar
  28. 28.
    Hur J, Noh DK (2011) Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Trans Parall Distrib Syst 22(7):1214–1221.  https://doi.org/10.1109/TPDS.2010.203 CrossRefGoogle Scholar
  29. 29.
    Hwang MS, Hsu ST, Lee CC (2014) A new public key encryption with conjunctive field keyword search scheme. Inf Technol Control 43(3):277–288.  https://doi.org/10.5755/j01.itc.43.3.6429 CrossRefGoogle Scholar
  30. 30.
    Jeong IR, Kwon JO, Hong D, Lee DH (2009) Constructing PEKS schemes secure against keyword guessing attacks is possible? Comput Commun 32(2):394–396.  https://doi.org/10.1016/j.comcom.2008.11.018 CrossRefGoogle Scholar
  31. 31.
    Kalapatapu A, Sarkar M (2012) Cloud computing: an overview. Cloud Comput Methodol Syst Appl.  https://doi.org/10.1201/b11149-8 CrossRefGoogle Scholar
  32. 32.
    Kuzu M, Islam MS, Kantarcioglu M (2012) Efficient similarity search over encrypted data. In: 2012 IEEE 28th International Conference on Data Engineering, IEEE, pp 1156–1167.  https://doi.org/10.1109/ICDE.2012.23
  33. 33.
    Li J, Wang Q, Wang C, Cao N, Ren K, Lou W (2010) Fuzzy keyword search over encrypted data in cloud computing. In: Proceedings 2010 IEEE INFOCOM, IEEE, pp 1–5.  https://doi.org/10.1109/INFCOM.2010.5462196
  34. 34.
    Li R, Liu AX (2017) Adaptively secure conjunctive query processing over encrypted data for cloud computing. In: 2017 IEEE 33rd International Conference on Data Engineering (ICDE), IEEE, pp 697–708.  https://doi.org/10.1109/ICDE.2017.122
  35. 35.
    Li Y, Zhou F, Qin Y, Lin M, Xu Z (2018) Integrity-verifiable conjunctive keyword searchable encryption in cloud storage. Int J Inf Secur 17(5):549–568.  https://doi.org/10.1007/s10207-017-0394-9 CrossRefGoogle Scholar
  36. 36.
    Liang K, Susilo W (2015a) Searchable attribute-based mechanism with efficient data sharing for secure cloud storage. IEEE Trans Inf Forensics Secur 10(9):1981–1992.  https://doi.org/10.1109/TIFS.2015.2442215 CrossRefGoogle Scholar
  37. 37.
    Liang K, Susilo W (2015b) Searchable attribute-based mechanism with efficient data sharing for secure cloud storage. IEEE Trans Inf Forensics Secur 10(9):1981–1992.  https://doi.org/10.1109/TIFS.2015.2442215 CrossRefGoogle Scholar
  38. 38.
    Liu P, Wang J, Ma H, Nie H (2014) Efficient verifiable public key encryption with keyword search based on kp-abe. In: 2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications, IEEE, pp 584–589.  https://doi.org/10.1109/BWCCA.2014.119
  39. 39.
    Liu Z, Lv S, Wei Y, Li J, Liu JK, Xiang Y (2017) Ffsse: flexible forward secure searchable encryption with efficient performance. IACR Cryptol ePrint Archive 2017:1105Google Scholar
  40. 40.
    Ma S (2016) Identity-based encryption with outsourced equality test in cloud computing. Inf Sci 328:389–402.  https://doi.org/10.1016/j.ins.2015.08.053 CrossRefzbMATHGoogle Scholar
  41. 41.
    Miao Y, Ma J, Liu X, Liu Z, Shen L, Wei F (2016) Vmkdo: verifiable multi-keyword search over encrypted cloud data for dynamic data-owner. Peer-to-Peer Netw Appl.  https://doi.org/10.1007/s12083-016-0487-7 CrossRefGoogle Scholar
  42. 42.
    Miao Y, Ma J, Jiang Q, Li X, Sangaiah AK (2018) Verifiable keyword search over encrypted cloud data in smart city. Comput Electr Eng 65:90–101.  https://doi.org/10.1016/j.compeleceng.2017.06.021 CrossRefGoogle Scholar
  43. 43.
    Ogata W, Kurosawa K (2016) Efficient no-dictionary verifiable SSE. IACR Cryptol ePrint Archive 2016:981Google Scholar
  44. 44.
    Pasupuleti SK, Ramalingam S, Buyya R (2016) An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing. J Netw Comput Appl 64:12–22.  https://doi.org/10.1016/j.jnca.2015.11.023 CrossRefGoogle Scholar
  45. 45.
    Pham H, Woodworth J, Salehi MA (2018) Survey on secure search over encrypted data on the cloud. arXiv preprint arXiv:181109767
  46. 46.
    Poh GS, Chin JJ, Yau WC, Choo KKR, Mohamad MS (2017) Searchable symmetric encryption: designs and challenges. ACM Comput Surv (CSUR) 50(3):40.  https://doi.org/10.1145/3064005 CrossRefGoogle Scholar
  47. 47.
    Premkamal PK, Pasupuleti SK, Alphonse P (2018) A new verifiable outsourced ciphertext-policy attribute based encryption for big data privacy and access control in cloud. J Ambient Intell Human Comput 10:2693–2707CrossRefGoogle Scholar
  48. 48.
    Qian L, Luo Z, Du Y, Guo L (2009) Cloud computing: An overview. In: IEEE International Conference on Cloud Computing, Springer, pp 626–631.  https://doi.org/10.1007/978-3-642-10665-1_63 Google Scholar
  49. 49.
    Sarga L (2012) Cloud computing: an overview. J Syst Integr 3(4):3–14.  https://doi.org/10.20470/jsi.v3i4.131 CrossRefGoogle Scholar
  50. 50.
    Shen J, Shen J, Chen X, Huang X, Susilo W (2017a) An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Trans Inf Forensics Secur 12(10):2402–2415.  https://doi.org/10.1109/TIFS.2017.2705620 CrossRefGoogle Scholar
  51. 51.
    Shen J, Wang C, Wang A, Ji S, Zhang Y (2018) A searchable and verifiable data protection scheme for scholarly big data. IEEE Trans Emerg Topics Comput.  https://doi.org/10.1109/TETC.2018.2830368 CrossRefGoogle Scholar
  52. 52.
    Shen Z, Shu J, Xue W (2017b) Keyword search with access control over encrypted cloud data. IEEE Sens J 17(3):858–868.  https://doi.org/10.1109/JSEN.2016.2634018 CrossRefGoogle Scholar
  53. 53.
    Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000, IEEE, pp 44–55.  https://doi.org/10.1109/SECPRI.2000.848445
  54. 54.
    Su S, Teng Y, Cheng X, Xiao K, Li G, Chen J (2015) Privacy-preserving top-k spatial keyword queries in untrusted cloud environments. IEEE Trans Serv Comput.  https://doi.org/10.1109/TSC.2015.2481900 CrossRefGoogle Scholar
  55. 55.
    Sun J, Wang X, Wang S, Ren L (2018) A searchable personal health records framework with fine-grained access control in cloud-fog computing. PloS One 13(11):e0207543.  https://doi.org/10.1371/journal.pone.0207543 CrossRefGoogle Scholar
  56. 56.
    Sun W, Wang B, Cao N, Li M, Lou W, Hou YT, Li H (2013) Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. In: Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, ACM, pp 71–82Google Scholar
  57. 57.
    Sun W, Liu X, Lou W, Hou YT, Li H (2015) Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data. In: 2015 IEEE Conf Comput Commun (INFOCOM), IEEE, pp 2110–2118Google Scholar
  58. 58.
    Sun W, Yu S, Lou W, Hou YT, Li H (2016) Protecting your right: verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. IEEE Trans Parallel Distrib Syst 27(4):1187–1198.  https://doi.org/10.1109/TPDS.2014.2355202 CrossRefGoogle Scholar
  59. 59.
    Wan Z, Deng RH (2018) Vpsearch: achieving verifiability for privacy-preserving multi-keyword search over encrypted cloud data. IEEE Trans Depend Secure Comput 15(6):1083–1095.  https://doi.org/10.1109/TDSC.2016.2635128 CrossRefGoogle Scholar
  60. 60.
    Wang B, Yu S, Lou W, Hou YT (2014) Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud. IEEE INFOCOM 2014-IEEE Conference on Computer Communications pp 2112–2120.  https://doi.org/10.1109/INFOCOM.2014.6848153
  61. 61.
    Wang C, Cao N, Ren K, Lou W (2012) Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Trans Parallel Distrib Syst 23(8):1467–1479.  https://doi.org/10.1109/TPDS.2011.282 CrossRefGoogle Scholar
  62. 62.
    Wang N, Fu J, Bhargava BK, Zeng J (2018) Efficient retrieval over documents encrypted by attributes in cloud computing. IEEE Trans Inf Forensics Secur 13(10):2653–2667.  https://doi.org/10.1109/TIFS.2018.2825952 CrossRefGoogle Scholar
  63. 63.
    Wang Y, Wang J, Chen X (2016) Secure searchable encryption: a survey. J Commun Inf Netw 1(4):52–65.  https://doi.org/10.1007/BF03391580 CrossRefGoogle Scholar
  64. 64.
    Wu D, Gan Q, Wang X (2018) Verifiable public key encryption with keyword search based on homomorphic encryption in multi-user setting. IEEE Access 6:42445–42453.  https://doi.org/10.1109/ACCESS.2018.2861424 CrossRefGoogle Scholar
  65. 65.
    Wu Z, Li K (2019) Vbtree: forward secure conjunctive queries over encrypted data for cloud computing. VLDB J 28(1):25–46.  https://doi.org/10.1007/s00778-018-0517-6 CrossRefGoogle Scholar
  66. 66.
    Xia Z, Wang X, Sun X, Wang Q (2016) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 27(2):340–352.  https://doi.org/10.1109/TPDS.2015.2401003 CrossRefGoogle Scholar
  67. 67.
    Xu K, Wang G, Wang S, Zhao Z, Wang J (2017) A secure channel free conjunctive keyword search without random oracle under simple assumption. In: 2017 IEEE 9th International Conference on Communication Software and Networks (ICCSN), IEEE, pp 1467–1476.  https://doi.org/10.1109/ICCSN.2017.8230352
  68. 68.
    Xu P, Jin H, Wu Q, Wang W (2013a) Public-key encryption with fuzzy keyword search: A provably secure scheme under keyword guessing attack. IEEE Trans Comput 62(11):2266–2277.  https://doi.org/10.1109/TC.2012.215 MathSciNetCrossRefzbMATHGoogle Scholar
  69. 69.
    Xu P, Jin H, Wu Q, Wang W (2013b) Public-key encryption with fuzzy keyword search: a provably secure scheme under keyword guessing attack. IEEE Trans Comput 62(11):2266–2277.  https://doi.org/10.1109/TC.2012.215 MathSciNetCrossRefzbMATHGoogle Scholar
  70. 70.
    Yan J, Zhang Y, Liu X (2016) Secure multi-keyword search supporting dynamic update and ranked retrieval. China Commun 13(20):209–221.  https://doi.org/10.1109/CC.2016.7733045 CrossRefGoogle Scholar
  71. 71.
    Yang Y, Ma M (2016) Conjunctive keyword search with designated tester and timing enabled proxy re-encryption function for e-health clouds. IEEE Trans Inf Forensics Secur 11(4):746–759.  https://doi.org/10.1109/TIFS.2015.2509912 CrossRefGoogle Scholar
  72. 72.
    Yu J, Lu P, Zhu Y, Xue G, Li M (2013) Toward secure multikeyword top-k retrieval over encrypted cloud data. IEEE Trans Depend Secure Comput 10(4):239–250.  https://doi.org/10.1109/TDSC.2013.9 CrossRefGoogle Scholar
  73. 73.
    Yuan X, Wang X, Wang C, Yu C, Nutanong S (2017) Privacy-preserving similarity joins over encrypted data. IEEE Trans Inf Forensics Secur 12(11):2763–2775.  https://doi.org/10.1109/TIFS.2017.2721221 CrossRefGoogle Scholar
  74. 74.
    Wang Q, He M, Du M, Chow SS, Lai RW, Zou Q (2018) Searchable encryption over feature-rich data. IEEE Trans Depend Secure Comput 15(3):496–510.  https://doi.org/10.1109/TDSC.2016.2593444 CrossRefGoogle Scholar
  75. 75.
    Zhang W, Lin Y, Xiao S, Wu J, Zhou S (2016) Privacy preserving ranked multi-keyword search for multiple data owners in cloud computing. IEEE Trans Comput 65(5):1566–1577.  https://doi.org/10.1109/TC.2015.2448099 MathSciNetCrossRefzbMATHGoogle Scholar
  76. 76.
    Zhang W, Lin Y, Qi G (2018) Catch you if you misbehave: ranked keyword search results verification in cloud computing. IEEE Trans Cloud Comput 6(1):74–86.  https://doi.org/10.1109/TCC.2015.2481389 CrossRefGoogle Scholar
  77. 77.
    Zheng Q, Xu S, Ateniese G (2014) Vabks: verifiable attribute-based keyword search over outsourced encrypted data. In: IEEE INFOCOM 2014-IEEE Conference on Computer Communications, IEEE, pp 522–530.  https://doi.org/10.1109/INFOCOM.2014.6847976
  78. 78.
    Zhu J, Li Q, Wang C, Yuan X, Wang Q, Ren K (2018) Enabling generic, verifiable, and secure data search in cloud services. IEEE Trans Parallel Distrib Syst 29(8):1721–1735.  https://doi.org/10.1109/TPDS.2018.2808283 CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.National Institute of Technology (NIT) WarangalHyderabadIndia
  2. 2.Institute for Development and Research in Banking Technology (IDRBT)HyderabadIndia

Personalised recommendations