Skip to main content
Log in

Efficient and dynamic verifiable multi-keyword searchable symmetric encryption with full security

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Increasing the popularity of cloud computing raises the importance of efforts to improve the services of this paradigm. Searching over encrypted data is a requirement for cloud storage to provide, in addition to privacy-preserving, convenient and low-cost access to some of the outsourced data. Security and functionality along with efficiency are important characteristics of searchable encryption schemes that improve them make this schemes more applicable to the real world. There are proposed structures for symmetric searchable encryption (SSE) in this paper, by adding functionalities to randomized SSE schemes, to provide a optimal scheme. We design a rFSMSE scheme that allows searching by multiple keywords. This scheme is fully secure and its search time complexity is logarithmic. Then we upgrad this scheme to the verifiable rFSMSE scheme called rFSVMSE, without increasing the complexity of search time, storage, and communication. We demonstrate that the proposed schemes are upgradable to dynamic ones. Simulations show the time taken to search for multi-keywords in the rFSMSE and rFSVMSE schemes is less than that in the previous randomized SSE.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. In: International conference on the theory and applications of cryptographic techniques. Springer, pp 506–522

  2. Bost R, Fouque PA, Pointcheval D (2016) Verifiable dynamic symmetric searchable encryption: Optimality and forward security. IACR Cryptology ePrint Archive 2016:62

    Google Scholar 

  3. Byun JW, Rhee HS, Park HA, Lee DH (2006) Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. In: Workshop on secure data management. Springer, pp 75–83

  4. Cao N, Wang C, Li M, Ren K, Lou W (2013) Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans Parallel Distrib Syst 25(1):222–233

    Article  Google Scholar 

  5. Cash D, Jaeger J, Jarecki S, Jutla CS, Krawczyk H, Rosu MC, Steiner M (2014) Dynamic searchable encryption in very-large databases: Data structures and implementation. In: NDSS, vol 14. Citeseer, pp 23–26

  6. Cash D, Jarecki S, Jutla C, Krawczyk H, Roşu MC, Steiner M (2013) Highly-scalable searchable symmetric encryption with support for boolean queries. In: Advances in cryptology–CRYPTO 2013. Springer, pp 353–373

  7. Chai Q, Gong G (2012) Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers. In: 2012 IEEE International conference on communications (ICC). IEEE, pp 917–922

  8. Chang YC, Mitzenmacher M (2005) Privacy preserving keyword searches on remote encrypted data. In: International conference on applied cryptography and network security. Springer, pp 442–455

  9. Chen R, Mu Y, Yang G, Guo F, Huang X, Wang X, Wang Y (2016) Server-aided public key encryption with keyword search. IEEE Trans Inform Forens Secur 11(12):2833–2842

    Article  Google Scholar 

  10. Coppersmith D (1994) The data encryption standard (des) and its strength against attacks. IBM J Res Develop 38(3):243–250

    Article  Google Scholar 

  11. Curtmola R, Garay J, Kamara S, Ostrovsky R (2011) Searchable symmetric encryption: Improved definitions and efficient constructions. J Comput Secur 19(5):895–934

    Article  Google Scholar 

  12. Fu Z, Ren K, Shu J, Sun X, Huang F (2015) Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans Parallel Distrib Syst 27(9):2546–2559

    Article  Google Scholar 

  13. Fu Z, Wu X, Wang Q, Ren K (2017) Enabling central keyword-based semantic extension search over encrypted outsourced data. IEEE Trans Inform Forensics Secur 12(12):2986–2997

    Article  Google Scholar 

  14. Goh EJ, et al. (2003) Secure indexes. IACR Cryptology ePrint Archive 2003:216

    Google Scholar 

  15. Golle P, Staddon J, Waters B (2004) Secure conjunctive keyword search over encrypted data. In: International conference on applied cryptography and network security. Springer, pp 31–45

  16. Ishai Y, Kushilevitz E, Lu S, Ostrovsky R (2016) Private large-scale databases with distributed searchable symmetric encryption. In: Cryptographers’ track at the RSA conference. Springer, pp 90–107

  17. Jiang X, Yu J, Yan J, Hao R (2017) Enabling efficient and verifiable multi-keyword ranked search over encrypted cloud data. Inf Sci 403:22–41

    Article  Google Scholar 

  18. Kamara S, Papamanthou C, Roeder T (2012) Dynamic searchable symmetric encryption. In: Proceedings of the 2012 ACM conference on Computer and communications security. ACM, pp 965–976

  19. Kurosawa K, Ohtaki Y (2012) Uc-secure searchable symmetric encryption. In: International conference on financial cryptography and data security. Springer, pp 285–298

  20. Li H, Yang Y, Luan TH, Liang X, Zhou L, Shen XS (2016) Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data. IEEE Trans Depend Secure Comput 13(3):312–325

    Article  Google Scholar 

  21. Li Y, Zhou F, Xu Z, Ge Y (2020) An efficient two-server ranked dynamic searchable encryption scheme. IEEE Access 8:86328–86344

    Article  Google Scholar 

  22. Liao X, Li K, Yin J (2017) Separable data hiding in encrypted image based on compressive sensing and discrete fourier transform. Multimed Tools Appl 76(20):20739–20753

    Article  Google Scholar 

  23. Liao X, Yu Y, Li B, Li Z, Qin Z (2019) A new payload partition strategy in color image steganography. IEEE Trans Circ Syst Video Technol 30 (3):685–696

    Article  Google Scholar 

  24. Liu Q, Tian Y, Wu J, Peng T, Wang G (2019) Enabling verifiable and dynamic ranked search over outsourced data. IEEE Trans Serv Comput

  25. Lu CC, Tseng SY (2002) Integrated design of aes (advanced encryption standard) encrypter and decrypter. In: Proceedings IEEE International Conference on Application-Specific Systems, Architectures, and Processors. IEEE, pp 277–285

  26. Najafi A, Javadi HHS, Bayat M (2019) Verifiable ranked search over encrypted data with forward and backward privacy. Future Generation Computer Systems

  27. Ramasamy R, Vivek SS, George P, Kshatriya BSR (2017) Dynamic verifiable encrypted keyword search using bitmap index and homomorphic mac. In: 2017 IEEE 4Th international conference on cyber security and cloud computing (CSCloud). IEEE, pp 357–362

  28. Rizomiliotis P, Gritzalis S (2015) Oram based forward privacy preserving dynamic searchable symmetric encryption schemes. In: Proceedings of the 2015 ACM workshop on cloud computing security workshop. ACM, pp 65–76

  29. Shen E, Shi E, Waters B (2009) Predicate privacy in encryption systems. In: Theory of cryptography conference. Springer, pp 457–473

  30. Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE symposium on security and privacy. S&P 2000. IEEE, pp 44–55

  31. Stefanov E, Papamanthou C, Shi E (2014) Practical dynamic searchable encryption with small leakage. In: NDSS, vol 71, pp 72–75

  32. Sun W, Liu X, Lou W, Hou YT, Li H (2015) Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data. In: Computer communications (INFOCOM), 2015 IEEE conference on. IEEE, pp 2110–2118

  33. Sun W, Wang B, Cao N, Li M, Lou W, Hou YT, Li H (2013) Verifiable privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. IEEE Trans Parallel Distrib Syst 25(11):3025–3035

    Article  Google Scholar 

  34. Vivek SS, Ramasamy R, George P, Kshatriya BSR (2018) Dynamic verifiable encrypted keyword search. J Signal Process Syst 90(8-9):1151–1165

    Article  Google Scholar 

  35. Wang P, Wang H, Pieprzyk J (2008) Keyword field-free conjunctive keyword searches on encrypted data and extension for dynamic groups. In: International conference on cryptology and network security. Springer, pp 178–195

  36. Wang S, Zhou J, Liu JK, Yu J, Chen J, Xie W (2016) An efficient file hierarchy attribute-based encryption scheme in cloud computing. IEEE Trans Inform Forens Secur 11(6):1265–1277

    Article  Google Scholar 

  37. Wong WK, Cheung DWL, Kao B, Mamoulis N (2009) Secure knn computation on encrypted databases. In: Proceedings of the 2009 ACM SIGMOD international conference on management of data. ACM, pp 139–152

  38. Xia Z, Wang X, Sun X, Wang Q (2015) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distribut Syst 27(2):340–352

    Article  Google Scholar 

  39. Xu P, Jin H, Wu Q, Wang W (2012) Public-key encryption with fuzzy keyword search: A provably secure scheme under keyword guessing attack. IEEE Trans Comput 62(11):2266–2277

    Article  MathSciNet  Google Scholar 

  40. Yoshino M, Kunihiro N, Naganuma K, Sato H (2012) Symmetric inner-product predicate encryption based on three groups. In: International conference on provable security. Springer, pp 215–234

  41. Zhang R, Xue R, Yu T, Liu L (2016) Dynamic and efficient private keyword search over inverted index–based encrypted data. ACM Trans Int Technol (TOIT) 16(3):21

    Google Scholar 

Download references

Acknowledgements

The authors thank the editors and the anonymous reviewers for their valuable comments.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hamid Haj Seyyed Javadi.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Najafi, A., Javadi, H.H.S. & Bayat, M. Efficient and dynamic verifiable multi-keyword searchable symmetric encryption with full security. Multimed Tools Appl 80, 26049–26068 (2021). https://doi.org/10.1007/s11042-021-10844-w

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-021-10844-w

Keywords

Navigation