Abstract
With the rapid development of the Internet, Peer to Peer(P2P) network has been applied in various fields. Users in P2P network also have a large amount of data, but users cannot provide enough storage space locally. More and more users choose to upload their own data to cloud server in order to save overhead and facilitate sharing their own data with other users. In order to ensure data security, researchers have proposed searchable encryption(SE) technology, and searchable encryption has been widely used. In this paper, a dynamic verifiable multi-keyword ranked search scheme is proposed under the background of P2P network and cloud storage service(CSS). On the basis of using secure kNN algorithm to encrypt index and traditional inner product algorithm to obtain ranked results, the scheme in this paper realizes forward and backward security by changing the structure of file vector and using modular residual computation. Meanwhile, the integrity and freshness of search results are verified by combining timestamp chain and Merkle tree. Finally, the security of this scheme under two threat models is analyzed, and the performance evaluation experiment is carried out on the document set.
Similar content being viewed by others
References
Bellare M, Goldreich O, Goldwasser S (1994) Incremental cryptography: the case of hashing and signing. Lecture Notes in Computer Science 839:216–233
Bing W, Wei S, Lou W, Hou YT (2015) Inverted index based multi-keyword public-key searchable encryption with strong privacy guarantee. In: Computer communications
Dai H, Ji Y, Yang G, Huang H, Yi X (2019) A privacy-preserving multi-keyword ranked search over encrypted data in hybrid clouds. IEEE Access
Dan B, Crescenzo GD, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. Eurocrypt 3027(16):506– 522
Dan B, Waters B (2007) Conjunctive, subset, and range queries on encrypted data. Tcc 4392:535–554
Du L, Li K, Liu Q, Wu Z, Zhang S (2020) Dynamic multi-client searchable symmetric encryption with support for boolean queries. Inform Sci 506:234–257
Fan K, Xu H, Gao L, Li H, Yang Y (2019) Efficient and privacy preserving access control scheme for fog-enabled iot. Future Gen Comput Sys 99:134–142
Fu Z, Wu X, Guan C, Sun X, Ren K (2017) Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Trans Inform Forensics Secur 11(12):2706–2716
Goh E-J (2003) Secure indexes. Cryptology ePrint Archive, Report 2003/216. https://eprint.iacr.org/2003/216
Golle P, Staddon J, Waters B (2004) Secure conjunctive keyword search over encrypted data. In: Proceedings applied cryptography & network security conference
Hao M, Li H, Luo X, Xu G, Yang H, Liu S (2019) Efficient and privacy-enhanced federated learning for industrial artificial intelligence. IEEE Transactions on Industrial Informatics
Jiang W, Li H, Xu G, Wen M, Dong G, Lin X (2019) Ptas: privacy-preserving thin-client authentication scheme in blockchain-based pki. Future Gen Comput Sys 96:185–195
Kamara S, Papamanthou C, Roeder T (2011) Cs2: a semantic cryptographic cloud storage system. Technical report, Tech. Rep. MSR-TR-2011-58, Microsoft Technical Report (May 2011) http...
Kamara S, Papamanthou C, Roeder T (2012) Dynamic searchable symmetric encryption. In: ACM conference on computer & communications security
Li H, Liu D, Dai Y, Luan TH, Yu S (2018) Personalized search over encrypted data with efficient and secure updates in mobile clouds. IEEE Trans Emerging Topics Comput 6(1):97– 109
Li H, Yang Y, Dai Y, Yu S, Xiang Y Achieving secure and efficient dynamic searchable symmetric encryption over medical cloud data. IEEE Transactions on Cloud Computing, pp 1–1, accepted 2017, to appear. https://doi.org/10.1109/TCC.2017.2769645
Liu L, De Vel O, Han Q-L, Zhang J, Xiang Y (2018) Detecting and preventing cyber insider threats: a survey. IEEE Communications Surveys & Tutorials 20(2):1397–1417
Merkle RC (1987) A digital signature based on a conventional encryption function. In: Conference on the theory and application of cryptographic techniques. Springer, Berlin, pp 369– 378
Ning C, Cong W, Ming L, Ren K, Lou W (2011) Privacy-preserving multi-keyword ranked search over encrypted cloud data. In: Infocom. IEEE
Ren H, Li H, Dai Y, Yang K, Lin X (2018) Querying in internet of things with privacy preserving: challenges, solutions and opportunities. IEEE Network 32(6):144–151
Song DX, Wagner D, Perrig A (2002) Practical techniques for searches on encrypted data. In: IEEE symposium on security & privacy, pp 44–55
Sun W, Wang B, Cao N, Li M, Li H (2014) Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. IEEE Trans Parallel Distrib Syst 25(11):3025–3035
Wan Z, Deng RH (2016) Vpsearch: achieving verifiability for privacy-preserving multi-keyword search over encrypted cloud data. IEEE Trans Dependable Secure Comput PP(99):1–1
Wang C, Cao N, Li J, Ren K, Lou W (2010) Secure ranked keyword search over encrypted cloud data. In: IEEE international conference on distributed computing systems
Wang Q, He M, Du M, Chow SSM, Zou Q (2018) Searchable encryption over feature-rich data. IEEE Trans Dependable Secure Comput PP(99):1–1
Wang X, Cheng X, Yu X (2019) Efficient verifiable key-aggregate keyword searchable encryption for data sharing in outsourcing storage. IEEE Access 8:11732–11742
Wu DN, Gan QQ, Wang X (2018) Verifiable public key encryption with keyword search based on homomorphic encryption in multi-user setting. IEEE Access 6:42445–42453
Xu G, Li H, Dai Y, Yang K, Lin X (2019) Enabling efficient and geometric range query with access control over encrypted spatial data. IEEE Trans Inform Forensics Secur 14(4):870– 885
Xu G, Li H, Liu S, Wen M, Lu R (2019) Efficient and privacy-preserving truth discovery in mobile crowd sensing systems. IEEE Trans Vehicular Technol 68(4):3854–3865
Xu G, Li H, Liu S, Yang K, Lin X (2020) Verifynet: secure and verifiable federated learning. IEEE Trans Inform Forensics Secur 15(1):911–926
Xu G, Li H, Ren H, Yang K, Deng RH (2019) Data security issues in deep learning: attacks, countermeasures and opportunities. IEEE Communications Magazine 57(11):116–122
Zhang J, Xiang Y, Wang Y, Zhou W, Xiang Y, Guan Y (2012) Network traffic classification using correlation information. IEEE Transactions on Parallel and Distributed systems 24(1):104–117
Zhang Q, Fu S, Jia N, Xu M (2018) A verifiable and dynamic multi-keyword ranked search scheme over encrypted cloud data with accuracy improvement. In: International conference on security and privacy in communication systems
Acknowledgments
This work is supported by the National Key R&D Program of China (No. 2017YFB0802300), the National Natural Science Foundation of China (No. 61772403 and No. U1836203), the Natural Science Foundation of Shaanxi Province(No.2019ZDLGY12-02), the Shaanxi Innovation Team Project(No.2018TD-007), the Xi’an Science and technology innovation plan(No.201809168CX9JC10) and National 111 Program of China B16037.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This article is part of the Topical Collection: Special Issue on Security and Privacy in Machine Learning Assisted P2P Networks
Guest Editors: Hongwei Li, Rongxing Lu and Mohamed Mahmoud
Rights and permissions
About this article
Cite this article
Wang, H., Fan, K., Li, H. et al. A dynamic and verifiable multi-keyword ranked search scheme in the P2P networking environment. Peer-to-Peer Netw. Appl. 13, 2342–2355 (2020). https://doi.org/10.1007/s12083-020-00912-7
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-020-00912-7