Skip to main content
Log in

A dynamic and verifiable multi-keyword ranked search scheme in the P2P networking environment

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

With the rapid development of the Internet, Peer to Peer(P2P) network has been applied in various fields. Users in P2P network also have a large amount of data, but users cannot provide enough storage space locally. More and more users choose to upload their own data to cloud server in order to save overhead and facilitate sharing their own data with other users. In order to ensure data security, researchers have proposed searchable encryption(SE) technology, and searchable encryption has been widely used. In this paper, a dynamic verifiable multi-keyword ranked search scheme is proposed under the background of P2P network and cloud storage service(CSS). On the basis of using secure kNN algorithm to encrypt index and traditional inner product algorithm to obtain ranked results, the scheme in this paper realizes forward and backward security by changing the structure of file vector and using modular residual computation. Meanwhile, the integrity and freshness of search results are verified by combining timestamp chain and Merkle tree. Finally, the security of this scheme under two threat models is analyzed, and the performance evaluation experiment is carried out on the document set.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Bellare M, Goldreich O, Goldwasser S (1994) Incremental cryptography: the case of hashing and signing. Lecture Notes in Computer Science 839:216–233

    Article  Google Scholar 

  2. Bing W, Wei S, Lou W, Hou YT (2015) Inverted index based multi-keyword public-key searchable encryption with strong privacy guarantee. In: Computer communications

  3. Dai H, Ji Y, Yang G, Huang H, Yi X (2019) A privacy-preserving multi-keyword ranked search over encrypted data in hybrid clouds. IEEE Access

  4. Dan B, Crescenzo GD, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. Eurocrypt 3027(16):506– 522

    MathSciNet  MATH  Google Scholar 

  5. Dan B, Waters B (2007) Conjunctive, subset, and range queries on encrypted data. Tcc 4392:535–554

    MathSciNet  MATH  Google Scholar 

  6. Du L, Li K, Liu Q, Wu Z, Zhang S (2020) Dynamic multi-client searchable symmetric encryption with support for boolean queries. Inform Sci 506:234–257

    Article  Google Scholar 

  7. Fan K, Xu H, Gao L, Li H, Yang Y (2019) Efficient and privacy preserving access control scheme for fog-enabled iot. Future Gen Comput Sys 99:134–142

    Article  Google Scholar 

  8. Fu Z, Wu X, Guan C, Sun X, Ren K (2017) Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Trans Inform Forensics Secur 11(12):2706–2716

    Article  Google Scholar 

  9. Goh E-J (2003) Secure indexes. Cryptology ePrint Archive, Report 2003/216. https://eprint.iacr.org/2003/216

  10. Golle P, Staddon J, Waters B (2004) Secure conjunctive keyword search over encrypted data. In: Proceedings applied cryptography & network security conference

  11. Hao M, Li H, Luo X, Xu G, Yang H, Liu S (2019) Efficient and privacy-enhanced federated learning for industrial artificial intelligence. IEEE Transactions on Industrial Informatics

  12. Jiang W, Li H, Xu G, Wen M, Dong G, Lin X (2019) Ptas: privacy-preserving thin-client authentication scheme in blockchain-based pki. Future Gen Comput Sys 96:185–195

    Article  Google Scholar 

  13. Kamara S, Papamanthou C, Roeder T (2011) Cs2: a semantic cryptographic cloud storage system. Technical report, Tech. Rep. MSR-TR-2011-58, Microsoft Technical Report (May 2011) http...

  14. Kamara S, Papamanthou C, Roeder T (2012) Dynamic searchable symmetric encryption. In: ACM conference on computer & communications security

  15. Li H, Liu D, Dai Y, Luan TH, Yu S (2018) Personalized search over encrypted data with efficient and secure updates in mobile clouds. IEEE Trans Emerging Topics Comput 6(1):97– 109

    Article  Google Scholar 

  16. Li H, Yang Y, Dai Y, Yu S, Xiang Y Achieving secure and efficient dynamic searchable symmetric encryption over medical cloud data. IEEE Transactions on Cloud Computing, pp 1–1, accepted 2017, to appear. https://doi.org/10.1109/TCC.2017.2769645

  17. Liu L, De Vel O, Han Q-L, Zhang J, Xiang Y (2018) Detecting and preventing cyber insider threats: a survey. IEEE Communications Surveys & Tutorials 20(2):1397–1417

    Article  Google Scholar 

  18. Merkle RC (1987) A digital signature based on a conventional encryption function. In: Conference on the theory and application of cryptographic techniques. Springer, Berlin, pp 369– 378

  19. Ning C, Cong W, Ming L, Ren K, Lou W (2011) Privacy-preserving multi-keyword ranked search over encrypted cloud data. In: Infocom. IEEE

  20. Ren H, Li H, Dai Y, Yang K, Lin X (2018) Querying in internet of things with privacy preserving: challenges, solutions and opportunities. IEEE Network 32(6):144–151

    Article  Google Scholar 

  21. Song DX, Wagner D, Perrig A (2002) Practical techniques for searches on encrypted data. In: IEEE symposium on security & privacy, pp 44–55

  22. Sun W, Wang B, Cao N, Li M, Li H (2014) Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. IEEE Trans Parallel Distrib Syst 25(11):3025–3035

    Article  Google Scholar 

  23. Wan Z, Deng RH (2016) Vpsearch: achieving verifiability for privacy-preserving multi-keyword search over encrypted cloud data. IEEE Trans Dependable Secure Comput PP(99):1–1

    Google Scholar 

  24. Wang C, Cao N, Li J, Ren K, Lou W (2010) Secure ranked keyword search over encrypted cloud data. In: IEEE international conference on distributed computing systems

  25. Wang Q, He M, Du M, Chow SSM, Zou Q (2018) Searchable encryption over feature-rich data. IEEE Trans Dependable Secure Comput PP(99):1–1

    Google Scholar 

  26. Wang X, Cheng X, Yu X (2019) Efficient verifiable key-aggregate keyword searchable encryption for data sharing in outsourcing storage. IEEE Access 8:11732–11742

    Article  Google Scholar 

  27. Wu DN, Gan QQ, Wang X (2018) Verifiable public key encryption with keyword search based on homomorphic encryption in multi-user setting. IEEE Access 6:42445–42453

    Article  Google Scholar 

  28. Xu G, Li H, Dai Y, Yang K, Lin X (2019) Enabling efficient and geometric range query with access control over encrypted spatial data. IEEE Trans Inform Forensics Secur 14(4):870– 885

    Article  Google Scholar 

  29. Xu G, Li H, Liu S, Wen M, Lu R (2019) Efficient and privacy-preserving truth discovery in mobile crowd sensing systems. IEEE Trans Vehicular Technol 68(4):3854–3865

    Article  Google Scholar 

  30. Xu G, Li H, Liu S, Yang K, Lin X (2020) Verifynet: secure and verifiable federated learning. IEEE Trans Inform Forensics Secur 15(1):911–926

    Article  Google Scholar 

  31. Xu G, Li H, Ren H, Yang K, Deng RH (2019) Data security issues in deep learning: attacks, countermeasures and opportunities. IEEE Communications Magazine 57(11):116–122

    Article  Google Scholar 

  32. Zhang J, Xiang Y, Wang Y, Zhou W, Xiang Y, Guan Y (2012) Network traffic classification using correlation information. IEEE Transactions on Parallel and Distributed systems 24(1):104–117

    Article  Google Scholar 

  33. Zhang Q, Fu S, Jia N, Xu M (2018) A verifiable and dynamic multi-keyword ranked search scheme over encrypted cloud data with accuracy improvement. In: International conference on security and privacy in communication systems

Download references

Acknowledgments

This work is supported by the National Key R&D Program of China (No. 2017YFB0802300), the National Natural Science Foundation of China (No. 61772403 and No. U1836203), the Natural Science Foundation of Shaanxi Province(No.2019ZDLGY12-02), the Shaanxi Innovation Team Project(No.2018TD-007), the Xi’an Science and technology innovation plan(No.201809168CX9JC10) and National 111 Program of China B16037.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kai Fan.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article is part of the Topical Collection: Special Issue on Security and Privacy in Machine Learning Assisted P2P Networks

Guest Editors: Hongwei Li, Rongxing Lu and Mohamed Mahmoud

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, H., Fan, K., Li, H. et al. A dynamic and verifiable multi-keyword ranked search scheme in the P2P networking environment. Peer-to-Peer Netw. Appl. 13, 2342–2355 (2020). https://doi.org/10.1007/s12083-020-00912-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-020-00912-7

Keywords

Navigation