Skip to main content
Log in

VMKDO: Verifiable multi-keyword search over encrypted cloud data for dynamic data-owner

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

The advantages of cloud computing encourage individuals and enterprises to outsource their local data storage and computation to cloud server, however, data security and privacy concerns seriously hinder the practicability of cloud storage. Although searchable encryption (SE) technique enables cloud server to provide fundamental encrypted data retrieval services for data-owners, equipping with a result verification mechanism is still of prime importance in practice as semi-trusted cloud server may return incorrect search results. Besides, single keyword search inevitably incurs many irrelevant results which result in waste of bandwidth and computation resources. In this paper, we are among the first to tackle the problems of data-owner updating and result verification simultaneously. To this end, we devise an efficient cryptographic primitive called as verifiable multi-keyword search over encrypted cloud data for dynamic data-owner scheme to protect both data confidentiality and integrity. Rigorous security analysis proves that our scheme is secure against keyword guessing attack (KGA) in standard model. As a further contribution, the empirical experiments over real-world dataset show that our scheme is efficient and feasible in practical applications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Notes

  1. http://www.cs.cmu.edu/~enron/.

References

  1. Khalil I, Khreishah A, Azeem M (2014) Cloud computing security: a survey. Computers 3(1):1–35

    Article  Google Scholar 

  2. Wei L F, Zhu H J, Cao Z F, Dong X L, Jia W W, Chen Y L, Vasilakos A (2014) Security and privacy for storage and computation in cloud computing. Inf Sci 258:371–386

    Article  Google Scholar 

  3. Wei L F, Zhu H J, Cao Z F, Jia W W, Vasilakos A (2010) Seccloud: Bridging Secure Storage and Computation in Cloud. IEEE International Conference on Distributed Computing Systems Workshops. IEEE:52–61

  4. Boneh D, Crescenzo G D, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. International Conference on the Theory and Applications of Cryptographic Techniques. Springer, pp 506–522

  5. Li H W, Liu D X, Dai Y S, Luan T H (2015) Engineering searchable encryption of mobile cloud networks: when QoE meets QoP. IEEE Wirel Commun 22(4):74–80

    Article  Google Scholar 

  6. Chai Q, Gong G (2012) Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers. IEEE International Conference on Communications. IEEE:917–922

  7. Hsien W F, Yang C C, Hwang M S (2016) A survey of public auditing for secure data storage in cloud computing. I J Network Security 18(1):133–142

    Google Scholar 

  8. Ren Y J, Shen J, Wang J, Han J, Lee S Y (2015) Mutual verifiable provable data auditing in public cloud storage. J Internet Tech 16(2):317–323

    Google Scholar 

  9. Song D X, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. IEEE Symposium on Security and Privacy. IEEE:44–55

  10. Miao Y B, Ma J F, Liu Z Q (2016) Revocable and anonymous searchable encryption in multi-user setting. Concurrency and Computation: Practice and Experience 28(4):1204–1218

    Article  Google Scholar 

  11. Xia Z H, Wang X H, Sun X M, Wang Q (2016) A secure and dynamic Multi-Keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 27(2):340–352

    Article  Google Scholar 

  12. Miao Y B, Liu J, Ma J F (2015) Fine-grained searchable encryption over encrypted data in multi-clouds. IEEE International Conference on Wireless Algorithms, Systems, and Applications. IEEE:407–416

  13. Fu Z J, Ren K, Shu J G, Sun X M, Huang F X (2015) Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement. IEEE Transactions on Parallel and Distributed Systems

  14. Li J, Wang Q, Wang C, Cao N, Ren K, Lou W J (2010) Fuzzy keyword search over encrypted data in cloud computing. IEEE International Conference on Computer Communications. IEEE:441–445

  15. Wang C, Cao N, Ren K, Lou W J (2012) Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud data. IEEE Trans Parallel Distrib Syst 23(8):1467–1479

    Article  Google Scholar 

  16. Fu Z J, Sun X M, Liu Q, Zhou L, Shu J G (2015) Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans 98-B(1):190–200

    Article  Google Scholar 

  17. Boneh D, Waters B (2007) Conjunctive, subset, and range queries on encrypted data. International Conference on Theory of Cryptography. Springer, pp 535–554

  18. Hwang Y H, Lee P J (2007) Public key encryption with conjunctive keyword search and its extension to a multi-user system. International Conference on Theory of Cryptography. Springer, pp 2–22

  19. Lee C C, Hsu S T, Hwang M S (2013) A study of conjunctive keyword searchable schemes. I J Network Security 15(5):321–330

    Google Scholar 

  20. Li H W, Yang Y, Luan T H, Liang X H, Zhou l, Shen X M (2015) Enabling Fine-Grained Multi-keyword Search Supporting Classified Subdictionaries over Encrypted Cloud Data. IEEE Transactions on Dependable and Secure Computing. doi:10.1009/tdsc.2015.2406704

  21. Golle P, Staddon J, Waters B (2004) Secure conjunctive keyword search over encrypted data. IEEE International Conference on Applied Cryptography and Network Security. IEEE:31–45

  22. Zheng Q J, Xu S H, Ateniese G (2014) VABKS: Verifiable Attribute-based keyword search over outsourced encrypted data. IEEE International Conference on Computer Communications. IEEE:522–530

  23. Sun W H, Yu S C, Lou W J, Hou Y T, Li H (2016) Protecting your right: verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. IEEE Trans Parallel Distrib Syst 27(4):1187–1198

    Article  Google Scholar 

  24. Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. ACM Conference on Computer and Communications Security. ACM:89–98

  25. Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. IEEE Symposium on Security and Privacy. IEEE:321–334

  26. Waters B (2011) Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. International Conference on Practice and Theory in Public Key Cryptography. Springer, pp 53–70

  27. Sun W H, Liu X F, Lou W J, Hou Y T, Li H (2015) Catch you if you lie to me: efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data. IEEE International Conference on Computer Communications. IEEE:2110–2118

  28. Miao Y B, Ma J F, Wei F S, Liu Z Q, Wang X A, Lu C B (2016) VCSE: Verfiable Conjunctive Keywords Search over Encrypted Data without Secure-channel. Peer-to-Peer Networking and Applications. doi:10.1007/s12083-016-0458-z

  29. Shao J, Cao Z F, Liang X H, Lin H (2010) Proxy re-encryption with keyword search. Inf Sci 180 (13):2576–2587

    Article  MathSciNet  MATH  Google Scholar 

  30. Fang L M, Susilo W, Ge C P, Wang J D (2012) Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search. Theor Comput Sci 462:39–58

    Article  MathSciNet  MATH  Google Scholar 

  31. Wang X A, Huang X Y, Yang X Y, Liu L F, Wu X G (2012) Further observation on proxy re-encryption with keyword search. J Syst Softw 85(3):643–654

    Article  Google Scholar 

  32. Guo L F, Lu B, Li X Y, Xu H (2013) A verifiable proxy re-encryption with keyword search without random oracle. IEEE International Conference on Computational Intelligence and Security. IEEE:474–478

  33. Yang Y, Ma M D (2016) Conjunctive keyword search with designated tester and timing enabled proxy re-encryption function for e-health clouds. IEEE Trans Inf Forensics Secur 11(4):746–759

    Google Scholar 

  34. Hu C Y, Liu P T (2011) A secure searchable public key encryption scheme with a designated tester against keyword guessing attacks and its extension. IEEE International Conference on Advances in Computer Science, Environment, Ecoinformatics, and Education. IEEE:131–136

  35. Rhee H S, Park J H, Lee D H (2012) Generic construction of designated tester public-key encryption with keyword search. Inf Sci 205:93–109

    Article  MathSciNet  MATH  Google Scholar 

  36. Yau W C, Phan R C, Heng S H, Goi B M (2013) Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester. Int J Comput Math 90(12):2581–2587

    Article  MATH  Google Scholar 

  37. Yang Y (2012) A communication efficient group key distribution scheme for mANETs. IEEE International Conference on Network and System Security. IEEE:361–372

  38. Wang B Y, Li B C, Li H (2014) Oruta: privacy-preserving public auditingfor shared data in the cloud. IEEE Trans Cloud Computing 2(1):43–56

    Article  Google Scholar 

Download references

Acknowledgments

This work was supported by the National High Technology Research and Development Program (863 Program) (No. 2015AA016007, No. 2015AA017203), the Key Program of NSFC (No. U1405255, No. U1135002), the Changjiang Scholars and Innovation Research Team in University (No. IRT1078), the Fundamental Research Funds for the Center Universities (No. JY10000903001) and the Major Nature Science Foundation of China (No. 61370078, No. 61309016).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jianfeng Ma.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Miao, Y., Ma, J., Liu, X. et al. VMKDO: Verifiable multi-keyword search over encrypted cloud data for dynamic data-owner. Peer-to-Peer Netw. Appl. 11, 287–297 (2018). https://doi.org/10.1007/s12083-016-0487-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-016-0487-7

Keywords

Navigation