Secure and verifiable multi-keyword searchable encryption scheme in cloud

Due to the advantages of cloud computing, such as virtualization and high scalability, individuals and enterprises are willing to outsource local data storage and computing to cloud servers.However, encryption breaks the linkability between the data.Although searchable encryption (SE) enables cloud...

Full description

Saved in:
Bibliographic Details
Main Authors: Jianhong ZHANG, Menglong WU, Jing WANG, Pei LIU, Zhengtao JIANG, Changgen PENG
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2021-04-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2021054/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539283124486144
author Jianhong ZHANG
Menglong WU
Jing WANG
Pei LIU
Zhengtao JIANG
Changgen PENG
author_facet Jianhong ZHANG
Menglong WU
Jing WANG
Pei LIU
Zhengtao JIANG
Changgen PENG
author_sort Jianhong ZHANG
collection DOAJ
description Due to the advantages of cloud computing, such as virtualization and high scalability, individuals and enterprises are willing to outsource local data storage and computing to cloud servers.However, encryption breaks the linkability between the data.Although searchable encryption (SE) enables cloud servers to provide retrieval services of the encrypted data for data owners, cloud servers who are untrusted, may tamper and delete data, or learn information of the newly added encrypted files with previous trapdoors.Besides, single-keyword search inevitably incurs many unrelated results, resulting in a waste of bandwidth and computing resources.To address the problems above, an efficient and verifiable multi-keyword search encryption scheme was proposed, which could not only supported multiple-keyword search, but also realized the privacy of search pattern and forward security of the outsourced files.In the meanwhile, it also ensured the integrity check of the outsourced data.Through rigorous security verification, the proposed scheme was proved to be secure under the standard mode, and could resist offline keyword guesswork attack (KGA) on untrusted cloud servers.Finally, by comparing the efficiency and performance with the recent three searchable encryption schemes, the experimental results show that the proposed scheme has the best comprehensive performance in terms of function and efficiency among the four schemes.
format Article
id doaj-art-7b2e06356f1047cfa4b41692e976e593
institution Kabale University
issn 1000-436X
language zho
publishDate 2021-04-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-7b2e06356f1047cfa4b41692e976e5932025-01-14T07:22:00ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2021-04-014213914959741538Secure and verifiable multi-keyword searchable encryption scheme in cloudJianhong ZHANGMenglong WUJing WANGPei LIUZhengtao JIANGChanggen PENGDue to the advantages of cloud computing, such as virtualization and high scalability, individuals and enterprises are willing to outsource local data storage and computing to cloud servers.However, encryption breaks the linkability between the data.Although searchable encryption (SE) enables cloud servers to provide retrieval services of the encrypted data for data owners, cloud servers who are untrusted, may tamper and delete data, or learn information of the newly added encrypted files with previous trapdoors.Besides, single-keyword search inevitably incurs many unrelated results, resulting in a waste of bandwidth and computing resources.To address the problems above, an efficient and verifiable multi-keyword search encryption scheme was proposed, which could not only supported multiple-keyword search, but also realized the privacy of search pattern and forward security of the outsourced files.In the meanwhile, it also ensured the integrity check of the outsourced data.Through rigorous security verification, the proposed scheme was proved to be secure under the standard mode, and could resist offline keyword guesswork attack (KGA) on untrusted cloud servers.Finally, by comparing the efficiency and performance with the recent three searchable encryption schemes, the experimental results show that the proposed scheme has the best comprehensive performance in terms of function and efficiency among the four schemes.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2021054/cloud computingq-ABDHE security assumptionmulti-keyword searchsecurity proof
spellingShingle Jianhong ZHANG
Menglong WU
Jing WANG
Pei LIU
Zhengtao JIANG
Changgen PENG
Secure and verifiable multi-keyword searchable encryption scheme in cloud
Tongxin xuebao
cloud computing
q-ABDHE security assumption
multi-keyword search
security proof
title Secure and verifiable multi-keyword searchable encryption scheme in cloud
title_full Secure and verifiable multi-keyword searchable encryption scheme in cloud
title_fullStr Secure and verifiable multi-keyword searchable encryption scheme in cloud
title_full_unstemmed Secure and verifiable multi-keyword searchable encryption scheme in cloud
title_short Secure and verifiable multi-keyword searchable encryption scheme in cloud
title_sort secure and verifiable multi keyword searchable encryption scheme in cloud
topic cloud computing
q-ABDHE security assumption
multi-keyword search
security proof
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2021054/
work_keys_str_mv AT jianhongzhang secureandverifiablemultikeywordsearchableencryptionschemeincloud
AT menglongwu secureandverifiablemultikeywordsearchableencryptionschemeincloud
AT jingwang secureandverifiablemultikeywordsearchableencryptionschemeincloud
AT peiliu secureandverifiablemultikeywordsearchableencryptionschemeincloud
AT zhengtaojiang secureandverifiablemultikeywordsearchableencryptionschemeincloud
AT changgenpeng secureandverifiablemultikeywordsearchableencryptionschemeincloud