Peer-to-Peer Networking and Applications

, Volume 11, Issue 2, pp 287–297 | Cite as

VMKDO: Verifiable multi-keyword search over encrypted cloud data for dynamic data-owner

  • Yinbin Miao
  • Jianfeng Ma
  • Ximeng Liu
  • Zhiquan Liu
  • Limin Shen
  • Fushan Wei


The advantages of cloud computing encourage individuals and enterprises to outsource their local data storage and computation to cloud server, however, data security and privacy concerns seriously hinder the practicability of cloud storage. Although searchable encryption (SE) technique enables cloud server to provide fundamental encrypted data retrieval services for data-owners, equipping with a result verification mechanism is still of prime importance in practice as semi-trusted cloud server may return incorrect search results. Besides, single keyword search inevitably incurs many irrelevant results which result in waste of bandwidth and computation resources. In this paper, we are among the first to tackle the problems of data-owner updating and result verification simultaneously. To this end, we devise an efficient cryptographic primitive called as verifiable multi-keyword search over encrypted cloud data for dynamic data-owner scheme to protect both data confidentiality and integrity. Rigorous security analysis proves that our scheme is secure against keyword guessing attack (KGA) in standard model. As a further contribution, the empirical experiments over real-world dataset show that our scheme is efficient and feasible in practical applications.


Cloud storage Searchable encryption Result verification Data-owner updating Keyword guessing attack 



This work was supported by the National High Technology Research and Development Program (863 Program) (No. 2015AA016007, No. 2015AA017203), the Key Program of NSFC (No. U1405255, No. U1135002), the Changjiang Scholars and Innovation Research Team in University (No. IRT1078), the Fundamental Research Funds for the Center Universities (No. JY10000903001) and the Major Nature Science Foundation of China (No. 61370078, No. 61309016).


  1. 1.
    Khalil I, Khreishah A, Azeem M (2014) Cloud computing security: a survey. Computers 3(1):1–35CrossRefGoogle Scholar
  2. 2.
    Wei L F, Zhu H J, Cao Z F, Dong X L, Jia W W, Chen Y L, Vasilakos A (2014) Security and privacy for storage and computation in cloud computing. Inf Sci 258:371–386CrossRefGoogle Scholar
  3. 3.
    Wei L F, Zhu H J, Cao Z F, Jia W W, Vasilakos A (2010) Seccloud: Bridging Secure Storage and Computation in Cloud. IEEE International Conference on Distributed Computing Systems Workshops. IEEE:52–61Google Scholar
  4. 4.
    Boneh D, Crescenzo G D, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. International Conference on the Theory and Applications of Cryptographic Techniques. Springer, pp 506–522Google Scholar
  5. 5.
    Li H W, Liu D X, Dai Y S, Luan T H (2015) Engineering searchable encryption of mobile cloud networks: when QoE meets QoP. IEEE Wirel Commun 22(4):74–80CrossRefGoogle Scholar
  6. 6.
    Chai Q, Gong G (2012) Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers. IEEE International Conference on Communications. IEEE:917–922Google Scholar
  7. 7.
    Hsien W F, Yang C C, Hwang M S (2016) A survey of public auditing for secure data storage in cloud computing. I J Network Security 18(1):133–142Google Scholar
  8. 8.
    Ren Y J, Shen J, Wang J, Han J, Lee S Y (2015) Mutual verifiable provable data auditing in public cloud storage. J Internet Tech 16(2):317–323Google Scholar
  9. 9.
    Song D X, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. IEEE Symposium on Security and Privacy. IEEE:44–55Google Scholar
  10. 10.
    Miao Y B, Ma J F, Liu Z Q (2016) Revocable and anonymous searchable encryption in multi-user setting. Concurrency and Computation: Practice and Experience 28(4):1204–1218CrossRefGoogle Scholar
  11. 11.
    Xia Z H, Wang X H, Sun X M, Wang Q (2016) A secure and dynamic Multi-Keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 27(2):340–352CrossRefGoogle Scholar
  12. 12.
    Miao Y B, Liu J, Ma J F (2015) Fine-grained searchable encryption over encrypted data in multi-clouds. IEEE International Conference on Wireless Algorithms, Systems, and Applications. IEEE:407–416Google Scholar
  13. 13.
    Fu Z J, Ren K, Shu J G, Sun X M, Huang F X (2015) Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement. IEEE Transactions on Parallel and Distributed SystemsGoogle Scholar
  14. 14.
    Li J, Wang Q, Wang C, Cao N, Ren K, Lou W J (2010) Fuzzy keyword search over encrypted data in cloud computing. IEEE International Conference on Computer Communications. IEEE:441–445Google Scholar
  15. 15.
    Wang C, Cao N, Ren K, Lou W J (2012) Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud data. IEEE Trans Parallel Distrib Syst 23(8):1467–1479CrossRefGoogle Scholar
  16. 16.
    Fu Z J, Sun X M, Liu Q, Zhou L, Shu J G (2015) Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans 98-B(1):190–200CrossRefGoogle Scholar
  17. 17.
    Boneh D, Waters B (2007) Conjunctive, subset, and range queries on encrypted data. International Conference on Theory of Cryptography. Springer, pp 535–554Google Scholar
  18. 18.
    Hwang Y H, Lee P J (2007) Public key encryption with conjunctive keyword search and its extension to a multi-user system. International Conference on Theory of Cryptography. Springer, pp 2–22Google Scholar
  19. 19.
    Lee C C, Hsu S T, Hwang M S (2013) A study of conjunctive keyword searchable schemes. I J Network Security 15(5):321–330Google Scholar
  20. 20.
    Li H W, Yang Y, Luan T H, Liang X H, Zhou l, Shen X M (2015) Enabling Fine-Grained Multi-keyword Search Supporting Classified Subdictionaries over Encrypted Cloud Data. IEEE Transactions on Dependable and Secure Computing. doi: 10.1009/tdsc.2015.2406704
  21. 21.
    Golle P, Staddon J, Waters B (2004) Secure conjunctive keyword search over encrypted data. IEEE International Conference on Applied Cryptography and Network Security. IEEE:31–45Google Scholar
  22. 22.
    Zheng Q J, Xu S H, Ateniese G (2014) VABKS: Verifiable Attribute-based keyword search over outsourced encrypted data. IEEE International Conference on Computer Communications. IEEE:522–530Google Scholar
  23. 23.
    Sun W H, Yu S C, Lou W J, Hou Y T, Li H (2016) Protecting your right: verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. IEEE Trans Parallel Distrib Syst 27(4):1187–1198CrossRefGoogle Scholar
  24. 24.
    Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. ACM Conference on Computer and Communications Security. ACM:89–98Google Scholar
  25. 25.
    Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. IEEE Symposium on Security and Privacy. IEEE:321–334Google Scholar
  26. 26.
    Waters B (2011) Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. International Conference on Practice and Theory in Public Key Cryptography. Springer, pp 53–70Google Scholar
  27. 27.
    Sun W H, Liu X F, Lou W J, Hou Y T, Li H (2015) Catch you if you lie to me: efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data. IEEE International Conference on Computer Communications. IEEE:2110–2118Google Scholar
  28. 28.
    Miao Y B, Ma J F, Wei F S, Liu Z Q, Wang X A, Lu C B (2016) VCSE: Verfiable Conjunctive Keywords Search over Encrypted Data without Secure-channel. Peer-to-Peer Networking and Applications. doi: 10.1007/s12083-016-0458-z
  29. 29.
    Shao J, Cao Z F, Liang X H, Lin H (2010) Proxy re-encryption with keyword search. Inf Sci 180 (13):2576–2587MathSciNetCrossRefMATHGoogle Scholar
  30. 30.
    Fang L M, Susilo W, Ge C P, Wang J D (2012) Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search. Theor Comput Sci 462:39–58MathSciNetCrossRefMATHGoogle Scholar
  31. 31.
    Wang X A, Huang X Y, Yang X Y, Liu L F, Wu X G (2012) Further observation on proxy re-encryption with keyword search. J Syst Softw 85(3):643–654CrossRefGoogle Scholar
  32. 32.
    Guo L F, Lu B, Li X Y, Xu H (2013) A verifiable proxy re-encryption with keyword search without random oracle. IEEE International Conference on Computational Intelligence and Security. IEEE:474–478Google Scholar
  33. 33.
    Yang Y, Ma M D (2016) Conjunctive keyword search with designated tester and timing enabled proxy re-encryption function for e-health clouds. IEEE Trans Inf Forensics Secur 11(4):746–759Google Scholar
  34. 34.
    Hu C Y, Liu P T (2011) A secure searchable public key encryption scheme with a designated tester against keyword guessing attacks and its extension. IEEE International Conference on Advances in Computer Science, Environment, Ecoinformatics, and Education. IEEE:131–136Google Scholar
  35. 35.
    Rhee H S, Park J H, Lee D H (2012) Generic construction of designated tester public-key encryption with keyword search. Inf Sci 205:93–109MathSciNetCrossRefMATHGoogle Scholar
  36. 36.
    Yau W C, Phan R C, Heng S H, Goi B M (2013) Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester. Int J Comput Math 90(12):2581–2587CrossRefMATHGoogle Scholar
  37. 37.
    Yang Y (2012) A communication efficient group key distribution scheme for mANETs. IEEE International Conference on Network and System Security. IEEE:361–372Google Scholar
  38. 38.
    Wang B Y, Li B C, Li H (2014) Oruta: privacy-preserving public auditingfor shared data in the cloud. IEEE Trans Cloud Computing 2(1):43–56CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2016

Authors and Affiliations

  • Yinbin Miao
    • 1
  • Jianfeng Ma
    • 1
  • Ximeng Liu
    • 2
  • Zhiquan Liu
    • 1
  • Limin Shen
    • 1
  • Fushan Wei
    • 3
  1. 1.State Key Laboratory of Integrated Services NetworksXidian UniversityXi’anChina
  2. 2.School of Information SystemsSingapore Management UniversitySingaporeSingapore
  3. 3.State Key Laboratory of Mathematical Engineering and Advanced ComputingThe PLA Information Engineering UniversityZhengzhouChina

Personalised recommendations