Advertisement

A Multi-client Dynamic Searchable Symmetric Encryption System with Physical Deletion

  • Lei Xu
  • Chungen Xu
  • Joseph K. Liu
  • Cong Zuo
  • Peng Zhang
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10631)

Abstract

Dynamic Searchable Symmetric Encryption (DSSE) provides a simple and fast storage as well as retrieval method for encrypted profiles which stored in cloud. However, due to the nature of the symmetric encryption algorithm, it allows only one client to access the data. To make the scheme more practical, this paper propose a multi client dynamic symmetric searchable encryption scheme that could allow multi-client to search the privacy data with the delegation search token and dynamic delete expected files with delete token. Compared with similar works, our construction achieves a balance in network security and practical performance. We also demonstrate that the proposed scheme has same IND-CKA2 security property against adaptive adversary.

Keywords

Searchable symmetric encryption Cloud storage Multi-client RSA function 

Notes

Acknowledgments

This work is partially supported by the Fundamental Research Funds for the Central Universities (No. 30916011328), the National Natural Science Foundation of China (61702342), and Shenzhen Science and Technology Program (JCYJ20170302151321095, JCYJ20170302145623566). The authors also gratefully acknowledge the helpful comments and suggestions of the reviewers, which have improved the presentation.

References

  1. 1.
    Liu, J.K., Au, M.H., Susilo, W., et al.: Secure sharing and searching for real-time video data in mobile cloud. IEEE Netw. 29(2), 46–50 (2015)CrossRefGoogle Scholar
  2. 2.
    Baek, J., Vu, Q.H., Liu, J.K., et al.: A secure cloud computing based framework for big data information management of smart grid. IEEE Trans. Cloud Comput. 3(2), 233–244 (2015)CrossRefGoogle Scholar
  3. 3.
    Wang, S., Zhou, J., Liu, J.K., et al.: An efficient file hierarchy attribute-based encryption scheme in cloud computing. IEEE TIFS 11(6), 1265–1277 (2016)Google Scholar
  4. 4.
    Wang, S., Liang, K., Liu, J.K., et al.: Attribute-based data sharing scheme revisited in cloud computing. IEEE TIFS 11(8), 1661–1673 (2016)Google Scholar
  5. 5.
    Chor, B., Kushilevitz, E., Goldreich, O., et al.: Private information retrieval. J. ACM 45, 965–981 (1998)MathSciNetCrossRefGoogle Scholar
  6. 6.
    Golle, P., Staddon, J., Waters, B.: Secure conjunctive keyword search over encrypted data. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol. 3089, pp. 31–45. Springer, Heidelberg (2004).  https://doi.org/10.1007/978-3-540-24852-1_3CrossRefGoogle Scholar
  7. 7.
    Liu, C., Zhu, L., Wang, M., et al.: Search pattern leakage in searchable encryption: attacks and new construction. Inf. Sci. 265, 176–188 (2014)CrossRefGoogle Scholar
  8. 8.
    Liu, J., Lai, J., Huang, X.: Dual trapdoor identity-based encryption with keyword search. Soft. Comput. 21(10), 2599–2607 (2015)CrossRefGoogle Scholar
  9. 9.
    Cash, D., Jarecki, S., Jutla, C., Krawczyk, H., Roşu, M.-C., Steiner, M.: Highly-scalable searchable symmetric encryption with support for boolean queries. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013. LNCS, vol. 8042, pp. 353–373. Springer, Heidelberg (2013).  https://doi.org/10.1007/978-3-642-40041-4_20CrossRefGoogle Scholar
  10. 10.
    Jarecki, S., Jutla, C., Krawczyk, H., et al.: Outsourced symmetric private information retrieval. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, pp. 875–888. ACM, Berlin (2013)Google Scholar
  11. 11.
    Liang, K., Huang, X., Guo, F., Liu, J.K.: Privacy-preserving and regular language search over encrypted cloud data. IEEE TIFS 11(10), 2365–2376 (2016)Google Scholar
  12. 12.
    Kasra Kermanshahi, S., Liu, J.K., Steinfeld, R.: Multi-user cloud-based secure keyword search. In: Pieprzyk, J., Suriadi, S. (eds.) ACISP 2017. LNCS, vol. 10342, pp. 227–247. Springer, Cham (2017).  https://doi.org/10.1007/978-3-319-60055-0_12CrossRefGoogle Scholar
  13. 13.
    Yang, X., Lee, T.T., Liu, J.K., et al.: Trust enhancement over range search for encrypted data. In: Trustcom, pp. 66–73. IEEE, New York (2016)Google Scholar
  14. 14.
    Zuo, C., Macindoe, J., Yang, S., et al.: Trusted Boolean search on cloud using searchable symmetric encryption. In: Trustcom, pp. 113–120. IEEE, New York (2016)Google Scholar
  15. 15.
    Liang, K., Su, C., Chen, J., Liu, J.K.: Efficient multi-function data sharing and searching mechanism for cloud-based encrypted data. In: Proceedings of the 11th ACM on Asia CCS, pp. 83–94. ACM (2016)Google Scholar
  16. 16.
    Curtmola, R., Garay, J., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. In: CCS 2006, pp. 79–88. ACM, New York (2006)Google Scholar
  17. 17.
    Bao, F., Deng, R.H., Ding, X., Yang, Y.: Private query on encrypted data in multi-user settings. In: Chen, L., Mu, Y., Susilo, W. (eds.) ISPEC 2008. LNCS, vol. 4991, pp. 71–85. Springer, Heidelberg (2008).  https://doi.org/10.1007/978-3-540-79104-1_6CrossRefGoogle Scholar
  18. 18.
    Dong, C., Russello, G., Dulay, N.: Shared and searchable encrypted data for untrusted servers. In: Atluri, V. (ed.) DBSec 2008. LNCS, vol. 5094, pp. 127–143. Springer, Heidelberg (2008).  https://doi.org/10.1007/978-3-540-70567-3_10CrossRefGoogle Scholar
  19. 19.
    Wang, Q., Zhu, Y., Luo, X.: Multi-user searchable encryption with fine-grained access control without key sharing. In: International Conference on Advanced Computer Science Applications and Technologies, pp. 119–125. IEEE (2014)Google Scholar
  20. 20.
    Wang, S., Zhang, X., Zhang, Y.: Efficiently multi-user searchable encryption scheme with attribute revocation and grant for cloud storage. PLoS ONE 11(11), e0167157 (2016)CrossRefGoogle Scholar
  21. 21.
    Wang, Y., Wang, J., Sun, S.-F., Liu, J.K., Susilo, W., Chen, X.: Towards multi-user searchable encryption supporting Boolean query and fast decryption. In: Okamoto, T., Yu, Y., Au, M.H., Li, Y. (eds.) ProvSec 2017. LNCS, vol. 10592, pp. 24–38. Springer, Cham (2017).  https://doi.org/10.1007/978-3-319-68637-0_2CrossRefGoogle Scholar
  22. 22.
    Cui, H., Deng, R.H., Liu, J.K., Li, Y.: Attribute-based encryption with expressive and authorized keyword search. In: Pieprzyk, J., Suriadi, S. (eds.) ACISP 2017. LNCS, vol. 10342, pp. 106–126. Springer, Cham (2017).  https://doi.org/10.1007/978-3-319-60055-0_6CrossRefGoogle Scholar
  23. 23.
    Van Rompay, C., Molva, R., Önen, M.: Multi-user searchable encryption in the cloud. In: Lopez, J., Mitchell, C.J. (eds.) ISC 2015. LNCS, vol. 9290, pp. 299–316. Springer, Cham (2015).  https://doi.org/10.1007/978-3-319-23318-5_17CrossRefGoogle Scholar
  24. 24.
    Xu, P., Liang, S., Wang, W., Susilo, W., Wu, Q., Jin, H.: Dynamic searchable symmetric encryption with physical deletion and small leakage. In: Pieprzyk, J., Suriadi, S. (eds.) ACISP 2017. LNCS, vol. 10342, pp. 207–226. Springer, Cham (2017).  https://doi.org/10.1007/978-3-319-60055-0_11CrossRefGoogle Scholar
  25. 25.
    Sun, S.-F., Liu, J.K., Sakzad, A., Steinfeld, R., Yuen, T.H.: An efficient non-interactive multi-client searchable encryption with support for Boolean queries. In: Askoxylakis, I., Ioannidis, S., Katsikas, S., Meadows, C. (eds.) ESORICS 2016. LNCS, vol. 9878, pp. 154–172. Springer, Cham (2016).  https://doi.org/10.1007/978-3-319-45744-4_8CrossRefGoogle Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  1. 1.School of ScienceNanjing University of Science and TechnologyNanjingChina
  2. 2.Faculty of Information TechnologyMonash UniversityMelbourneAustralia
  3. 3.ATR Key Laboratory of National Defense Technology, College of Information EngineeringShenzhen UniversityShenzhenChina

Personalised recommendations