Secure and verifiable multi-keyword searchable encryption scheme in cloud
Due to the advantages of cloud computing, such as virtualization and high scalability, individuals and enterprises are willing to outsource local data storage and computing to cloud servers.However, encryption breaks the linkability between the data.Although searchable encryption (SE) enables cloud...
Saved in:
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2021-04-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2021054/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841539283124486144 |
---|---|
author | Jianhong ZHANG Menglong WU Jing WANG Pei LIU Zhengtao JIANG Changgen PENG |
author_facet | Jianhong ZHANG Menglong WU Jing WANG Pei LIU Zhengtao JIANG Changgen PENG |
author_sort | Jianhong ZHANG |
collection | DOAJ |
description | Due to the advantages of cloud computing, such as virtualization and high scalability, individuals and enterprises are willing to outsource local data storage and computing to cloud servers.However, encryption breaks the linkability between the data.Although searchable encryption (SE) enables cloud servers to provide retrieval services of the encrypted data for data owners, cloud servers who are untrusted, may tamper and delete data, or learn information of the newly added encrypted files with previous trapdoors.Besides, single-keyword search inevitably incurs many unrelated results, resulting in a waste of bandwidth and computing resources.To address the problems above, an efficient and verifiable multi-keyword search encryption scheme was proposed, which could not only supported multiple-keyword search, but also realized the privacy of search pattern and forward security of the outsourced files.In the meanwhile, it also ensured the integrity check of the outsourced data.Through rigorous security verification, the proposed scheme was proved to be secure under the standard mode, and could resist offline keyword guesswork attack (KGA) on untrusted cloud servers.Finally, by comparing the efficiency and performance with the recent three searchable encryption schemes, the experimental results show that the proposed scheme has the best comprehensive performance in terms of function and efficiency among the four schemes. |
format | Article |
id | doaj-art-7b2e06356f1047cfa4b41692e976e593 |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2021-04-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-7b2e06356f1047cfa4b41692e976e5932025-01-14T07:22:00ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2021-04-014213914959741538Secure and verifiable multi-keyword searchable encryption scheme in cloudJianhong ZHANGMenglong WUJing WANGPei LIUZhengtao JIANGChanggen PENGDue to the advantages of cloud computing, such as virtualization and high scalability, individuals and enterprises are willing to outsource local data storage and computing to cloud servers.However, encryption breaks the linkability between the data.Although searchable encryption (SE) enables cloud servers to provide retrieval services of the encrypted data for data owners, cloud servers who are untrusted, may tamper and delete data, or learn information of the newly added encrypted files with previous trapdoors.Besides, single-keyword search inevitably incurs many unrelated results, resulting in a waste of bandwidth and computing resources.To address the problems above, an efficient and verifiable multi-keyword search encryption scheme was proposed, which could not only supported multiple-keyword search, but also realized the privacy of search pattern and forward security of the outsourced files.In the meanwhile, it also ensured the integrity check of the outsourced data.Through rigorous security verification, the proposed scheme was proved to be secure under the standard mode, and could resist offline keyword guesswork attack (KGA) on untrusted cloud servers.Finally, by comparing the efficiency and performance with the recent three searchable encryption schemes, the experimental results show that the proposed scheme has the best comprehensive performance in terms of function and efficiency among the four schemes.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2021054/cloud computingq-ABDHE security assumptionmulti-keyword searchsecurity proof |
spellingShingle | Jianhong ZHANG Menglong WU Jing WANG Pei LIU Zhengtao JIANG Changgen PENG Secure and verifiable multi-keyword searchable encryption scheme in cloud Tongxin xuebao cloud computing q-ABDHE security assumption multi-keyword search security proof |
title | Secure and verifiable multi-keyword searchable encryption scheme in cloud |
title_full | Secure and verifiable multi-keyword searchable encryption scheme in cloud |
title_fullStr | Secure and verifiable multi-keyword searchable encryption scheme in cloud |
title_full_unstemmed | Secure and verifiable multi-keyword searchable encryption scheme in cloud |
title_short | Secure and verifiable multi-keyword searchable encryption scheme in cloud |
title_sort | secure and verifiable multi keyword searchable encryption scheme in cloud |
topic | cloud computing q-ABDHE security assumption multi-keyword search security proof |
url | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2021054/ |
work_keys_str_mv | AT jianhongzhang secureandverifiablemultikeywordsearchableencryptionschemeincloud AT menglongwu secureandverifiablemultikeywordsearchableencryptionschemeincloud AT jingwang secureandverifiablemultikeywordsearchableencryptionschemeincloud AT peiliu secureandverifiablemultikeywordsearchableencryptionschemeincloud AT zhengtaojiang secureandverifiablemultikeywordsearchableencryptionschemeincloud AT changgenpeng secureandverifiablemultikeywordsearchableencryptionschemeincloud |