Skip to main content
Log in

Enabling privacy-preserving data validation from multi-writer encryption with aggregated keywords search

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

Public key encryption with keyword search (PEKS) has long been a promising way for secure data validation, which tells one whether the coming entry contains the designated keyword without decryption. Despite the visible confidentiality benefits, existing PEKS schemes suffer serious performance issues while deployed in real-world applications. Specifically, when multiple keys/keywords are suggested, each coming datum should be tested repeatedly until all trapdoors have been verified. In this paper, we propose a new cryptographic primitive called multi-writer searchable encryption with aggregated keywords search that supports subset encrypted data validation. Specifically, one can perform fewer operations to identify all suggested keywords, thereby reducing the verifying cost. To demonstrate the advantages of the proposed scheme, extensive experiments are conducted on synthetic datasets, and the results show that our solution achieves considerable performance improvements with prior works.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Song, X., Guo, Y., Li, N., & Zhang, L. (2021). Online traffic flow prediction for edge computing-enhanced autonomous and connected vehicles. IEEE Transactions on Vehicular Technology, 70(3), 2101–2111.

    Article  Google Scholar 

  2. Ma, Z., Ma, J., Miao, Y., Liu, X., Choo, K.-K.R., Yang, R., & Wang, X. (2022). Lightweight privacy-preserving medical diagnosis in edge computing. IEEE Transactions on Services Computing, 15(3), 1606–1618.

    Article  Google Scholar 

  3. Fu, W., Wan, Y., Qin, J., Kang, Y., & Li, L. (2022). Privacy-preserving optimal energy management for smart grid with cloud-edge computing. IEEE Transactions on Industrial Informatics, 18(6), 4029–4038.

    Article  Google Scholar 

  4. Jovanovic, B. Internet of things statistics for 2022—taking things apart. Available: https://dataprot.net/statistics/iot-statistics/

  5. Statista Research Department. Volume of data/information created, captured, copied, and consumed worldwide from 2010 to 2025. Available: https://www.statista.com/statistics/871513/worldwide-data-created/#:~:text=The%20total%20amount%20of%20data,replicated%20reached%20a%20new%20high

  6. Boneh, D., Crescenzo, G. D., Ostrovsky, R., & Persiano, G. (2004). Public key encryption with keyword search. In Proceedings of EUROCRYPT (pp. 506–522).

  7. Kumar, C., Chowdary, C. R., & Shukla, D. (2022). Automatically detecting groups using locality-sensitive hashing in group recommendations. Information Sciences, 601, 207–223.

    Article  Google Scholar 

  8. Boneh, D., & Waters, B. (2007). Conjunctive, subset, and range queries on encrypted data. In Proceedings of TCC (pp 535–554).

  9. Zhang, Y., Xu, C., Ni, J., Li, H., & Shen, X. S. (2021). Blockchain-assisted public-key encryption with keyword search against keyword guessing attacks for cloud storage. IEEE Transactions on Cloud Computing, 9(4), 1335–1348.

    Article  Google Scholar 

  10. Lei, X., Duan, H., Zhou, A., Yuan, X., & Wang, C. (2021). Interpreting and mitigating leakage-abuse attacks in searchable symmetric encryption. IEEE Transactions on Information Forensics and Security, 16, 5310–5325.

    Article  Google Scholar 

  11. Xu, L., Yuan, X., Wang, C., Wang, Q., & Xu, C. (2019). Hardening database padding for searchable encryption. In Proceedings of IEEE INFOCOM (pp. 2503–2511).

  12. De Caro, A., Iovino, V. (2011). JPBC: Java pairing based cryptography. In Proceedings of IEEE ISCC (pp. 850–855).

  13. Song, D. X., Wagner, D. A., & Perrig, A. (2000). Practical techniques for searches on encrypted data. In Proceedings of S &P (pp. 44–55).

  14. Khader, D. (2006). Public key encryption with keyword search based on k-resilient IBE. In Proceedings of ICCSA (pp. 298–308).

  15. Di Crescenzo, G., & Saraswat, V. (2007). Public key encryption with searchable keywords based on Jacobi symbols. In Proceedings of INDOCRYPT (pp. 282–296).

  16. Park, D. J., Kim, K., & Lee, P. J. (2004). Public key encryption with conjunctive field keyword search. In Proceedings of WISA (pp. 73–86).

  17. Byun, J W., Lee, D H., & Lim, J. (2006). Efficient conjunctive keyword search on encrypted data storage system. In Proceedings of EuroPKI (pp. 184–196).

  18. Hwang, Y. H., & Lee, P. J. (2007). Public key encryption with conjunctive keyword search and its extension to a multi-user system. In Proceedings of PBC (pp. 2–22).

  19. Shi, E., Bethencourt, J., Hubert Chan, T.-H., Song, D. X., & Perrig, A. (2007). Multi-dimensional range query over encrypted data. In Proceedings of IEEE S &P (pp. 350–364).

  20. Lv, Z., Hong, C., Zhang, M., & Feng, D. (2014). Expressive and secure searchable encryption in the public key setting. In Proceedings of ISC, vol. 8783 (pp. 364–376).

  21. Li, J., Wang, Q., Wang, C., Cao, N., Ren, K., & Lou, W. (2010). Fuzzy keyword search over encrypted data in cloud computing. In Proceedings of INFOCOM (pp. 441–445).

  22. Peng, X., Jin, H., Qianhong, W., & Wang, W. (2013). Public-key encryption with fuzzy keyword search: A provably secure scheme under keyword guessing attack. IEEE Transactions on Computers, 62(11), 2266–2277.

    Article  MathSciNet  Google Scholar 

  23. Cui, H., Wan, Z., Deng, R. H., Wang, G., & Li, Y. (2018). Efficient and expressive keyword search over encrypted data in cloud. IEEE Transactions on Dependable and Secure Computing, 15, 409–422.

    Article  Google Scholar 

  24. Wang, J., Zhang, R., Li, J., & Xiao, Y. (2022). Owner-enabled secure authorized keyword search over encrypted data with flexible metadata. IEEE Transactions on Information Forensics and Security.

  25. Jiang, P., Qiu, B., & Zhu, L. (2022). Report when malicious: Deniable and accountable searchable message-moderation system. IEEE Transactions on Information Forensics and Security, 17, 1597–1609.

    Article  Google Scholar 

  26. Li, H., Huang, Q., & Susilo, W. (2022). A secure cloud data sharing protocol for enterprise supporting hierarchical keyword search. IEEE Transactions on Dependable and Secure Computing, 19, 1532–1543.

    Article  Google Scholar 

  27. Zheng, Q., Xu, S., & Ateniese, G. (2014). VABKS: Verifiable attribute-based keyword search over outsourced encrypted data. In Proceedings of INFOCOM (pp. 522–530).

  28. Ge, C., Susilo, W., Liu, Z., Xia, J., Szalachowski, P., & Fang, L. (2021). Secure keyword search and data sharing mechanism for cloud computing. IEEE Transactions on Dependable and Secure Computing, 18, 2787–2800.

    Google Scholar 

  29. Miao, Y., Liu, X., Choo, K.-K.R., Deng, R. H., Li, J., Li, H., & Ma, J.-F. (2021). Privacy-preserving attribute-based keyword search in shared multi-owner setting. IEEE Transactions on Dependable and Secure Computing, 18, 1080–1094.

    Article  Google Scholar 

  30. Zhang, K., Jiang, Z., Ning, J., & Huang, X. (2022). Subversion-resistant and consistent attribute-based keyword search for secure cloud storage. IEEE Transactions on Information Forensics and Security, 17, 1771–1784.

    Article  Google Scholar 

  31. Byun, J. W., Rhee, H. S., Park, H.-A., & Lee, D. H. (2006). Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. In Proceedings of SDM (pp. 75–83).

  32. Yau, W.-C., Heng, S.-H., & Goi, B.-M. (2008). Off-line keyword guessing attacks on recent public key encryption with keyword search schemes. In Proceedings of ATC, vol. 5060 (pp. 100–105).

  33. Chen, R., Yi, M., Yang, G., Guo, F., & Wang, X. (2016). Dual-server public-key encryption with keyword search for secure cloud storage. IEEE Transactions on Information Forensics and Security, 11(4), 789–798.

    Google Scholar 

  34. Huang, Q., & Li, H. (2017). An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks. Information Sciences, 403, 1–14.

    Article  Google Scholar 

  35. Behnia, R., Ozmen, M. O., & Yavuz, A. A. (2020). Lattice-based public key searchable encryption from experimental perspectives. IEEE Transactions on Dependable and Secure Computing, 17, 1269–1282.

    Article  Google Scholar 

  36. Xu, L., Yuan, X., Steinfeld, R., Wang, C., & Xu, C. (2019). Multi-writer searchable encryption: An LWE-based realization and implementation. In Proceedings ACM AsiaCCS (pp. 122–133).

  37. Zhang, X., Xu, C., Wang, H., Zhang, Y., & Wang, S. (2019). FS-PEKS: Lattice-based forward secure public-key encryption with keyword search for cloud-assisted industrial internet of things. IEEE Transactions on Dependable and Secure Computing.

  38. Ma, M., He, D., Kumar, N., Choo, K.-K.R., & Chen, J. (2018). Certificateless searchable public key encryption scheme for industrial internet of things. IEEE Transactions on Industrial Informatics, 14, 759–767.

    Article  Google Scholar 

  39. Bader, J., & Michala, A. L. (2021). Searchable encryption with access control in industrial internet of things (IIoT). Wireless Communications and Mobile Computing, 2021, 5555362:1-5555362:10.

    Article  Google Scholar 

  40. Zhang, Y., Xu, C., Ni, J., Li, H., & Shen, X. S. (2019). Blockchain-assisted public-key encryption with keyword search against keyword guessing attacks for cloud storage. IEEE Transactions on Cloud Computing.

  41. Jiang, P., Guo, F., Liang, K., Lai, J., & Wen, Q. (2020). Searchain: Blockchain-based private keyword search in decentralized storage. Future Generation Computer Systems, 107, 781–792.

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported in part by the Natural Science Foundation of Jiangsu Province under Grant BK20210330, BK20220935, by the National Natural Science Foundation of China under Grant 62072240, by the National Key Research and Development Program of China under Grant 2020YFB1804604, by the Fundamental Research Funds for the Central Universities under Grant 30922010917.

Funding

Funding was provided by Natural Science Foundation of Jiangsu Province (Grand no. BK20210330).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lei Xu.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Xu, L., Xu, C., Liu, J. et al. Enabling privacy-preserving data validation from multi-writer encryption with aggregated keywords search. Wireless Netw (2022). https://doi.org/10.1007/s11276-022-03117-3

Download citation

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11276-022-03117-3

Keywords

Navigation