Lightweight and Privacy-Preserving Multi-Keyword Search over Outsourced Data
Abstract
:1. Introduction
1.1. Our Contributions
1.2. Related Works
1.3. Paper Organization
2. System Model and Security Requirements
2.1. System Model
2.2. Security Requirements
- Data privacy: The documents should be outsourced in ciphertext format, so that the cloud server cannot infer any sensitive information about outsourced documents.
- Keyword privacy: The cloud server should not be able to determine whether a specific keyword is relevant to an outsourced document according to encrypted document, encrypted index and search trapdoors.
- Trapdoor unlinkability: The cloud server should not be able to identify whether two search trapdoors are generated from the same query.
- Multiple types of keywords: Each document can be associated with multiple types of keywords, and can be searched according to each type of keywords.
- Efficiency: Due to the limited computation capability of data owner and data user, the data processing and query generation phases cannot contain resource-intensive computations.
2.3. Framework
- Setup (): With input security parameters , data owner generate public parameter and secret key S.
- Index (): For each document , data owner generates ciphertext document , constructs plaintext index vector , and produces ciphertext index vector . Data owner uploads the ciphertext document set and ciphertext index vector set to the cloud server.
- Trapdoor (): From the given search keyword set W, data user generates encrypted search trapdoor , and sets a search threshold . The search trapdoor and search threshold are sent to the cloud server.
- Search (): With the received search trapdoor , the cloud server compute similarity score with each ciphertext index vector in and return the document if the similarity score is larger than .
3. Basic PRMS Construction
- System setup: With input security parameters , the data owner constructs a dictionary D, which contains n keywords. The data owner randomly picks a large prime p such that , an element , and a cryptographic one-way hash function . Thus, the system public parameters are . The data owner keeps D and s secret.
- Index generation: For each document F, the data owner encrypts it as ciphertext document using some secure symmetric encryption algorithm, randomly picks a unique file name N, and calculates the length d of document F. The data owner computes and constructs the index vector such that if the document F contains the ith keyword in the dictionary D, then , otherwise . The data owner further sets , chooses random number such that for , and encrypts each as follows:Then for document F, the data owner outsources the ciphertext index vector and the processed file to the cloud server, and keeps at local.
- Trapdoor generation: Data user picks a large random number such that , and computes . From the query keyword set W, data user constructs query vector , where if the query keyword set W contains the i-th keyword in the dictionary D, otherwise . The data user then sets , and randomly chooses numbers such that for . The data user constructs the search trapdoor , whereThe data user sets the search threshold, , and submits the search trapdoor and to the cloud server.
- Search: Once received, the encrypted search trapdoor , the cloud server computes the similarity score with each of outsourced documents as follows. The cloud server computesThen, the cloud server computesIf the following search condition is satisfied
4. Extension
- System setup: With input security parameters , the data owner constructs a dictionary set , where represents a dictionary of some type of keywords. Without loss of generality, it is assumed that each dictionary contains n keywords. The data owner randomly picks a large prime p such that , z elements , and a cryptographic one-way hash function . Thus, the public parameters are , and the data owner keeps and secret.
- Index generation: For each document F, the data owner encrypts it as ciphertext document using some secure symmetric encryption algorithm, randomly picks a unique file name N, and calculates the length d of document F.For each dictionary , the document F is processed as follows. The data owner computes and constructs an index vector such that if the document F contains the i-th keyword in dictionary , then , otherwise . The data owner further sets and , chooses random number such that for , and encrypts each as follows:At last, the data owner outsources the ciphertext index set and the processed document to the cloud server, where is a ciphertext index vector corresponding to dictionary , and keeps at local.
- Trapdoor generation: Suppose the data user would like to search the outsourced documents with the keywords in dictionary . Data user picks a large random number such that , and computes . From the query keyword set W, data user constructs query vector , where if the query keyword set W contains the i-th keyword in the dictionary , otherwise . Data user then sets , and randomly chooses numbers such that for . Data user constructs the search trapdoor , whereData user sets the search threshold , and submits the search trapdoor and to the cloud server, where ℓ denotes the type of keywords in searching documents.
- Search: Once received the encrypted search trapdoor , the cloud server computes the similarity score with the ciphertext index vector of each outsourced document as follows. The cloud server computesBy properly choosing the elements under the given security parameters , it is assumed that both the following conditionsNote that these similarity scores can be sorted according to their values. If the following search condition is satisfied
5. Analysis and Comparison
5.1. Security Analysis
5.2. Theoretical Analysis
5.3. Performance Evaluation
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Kumar, P.; Kumar, R. Issues and Challenges of Load Balancing Techniques in Cloud Computing: A Survey. ACM Comput. Surv. 2019, 51, 120. [Google Scholar] [CrossRef]
- Tabrizchi, H.; Rafsanjani, M.K. A survey on security challenges in cloud computing: Issues, threats, and solutions. J. Supercomput. 2020, 76, 9493–9532. [Google Scholar] [CrossRef]
- Zhao, M.; Ding, Y.; Wang, Y.; Wang, H.; Han, B. Verifiable and Privacy-Preserving Outsourcing of Matrix Multiplications. In Proceedings of the 2020 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), Chongqing, China, 29–30 October 2020; pp. 72–75. [Google Scholar] [CrossRef]
- Mei, T.; Rui, Y.; Li, S.; Tian, Q. Multimedia Search Reranking: A Literature Survey. ACM Comput. Surv. 2014, 46, 38. [Google Scholar] [CrossRef]
- Kuang, N.L.; Leung, C.H.C. Performance Effectiveness of Multimedia Information Search Using the Epsilon-Greedy Algorithm. In Proceedings of the 2019 18th IEEE International Conference On Machine Learning Furthermore, Applications (ICMLA), Boca Raton, FL, USA, 6–19 December 2019; pp. 929–936. [Google Scholar] [CrossRef] [Green Version]
- Oliveira, A.; Rocha, A. Score-based Learning for Relevance Prediction in Image Similarity Search. In Proceedings of the ICASSP 2019—2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Brighton, UK, 12–17 May 2019; pp. 2087–2091. [Google Scholar] [CrossRef]
- Oliveira, A.; Oakley, E.; da Silva Torres, R.; Rocha, A. Relevance prediction in similarity-search systems using extreme value theory. J. Vis. Commun. Image Represent. 2019, 60, 236–249. [Google Scholar] [CrossRef]
- Liu, Q.; Nie, X.; Liu, X.; Peng, T.; Wu, J. Verifiable Ranked Search over dynamic encrypted data in cloud computing. In Proceedings of the 2017 IEEE/ACM 25th International Symposium on Quality of Service (IWQoS), Vilanova i la Geltru, Spain, 14–16 June 2017; pp. 1–6. [Google Scholar] [CrossRef]
- Ding, X.; Liu, P.; Jin, H. Privacy-Preserving Multi-Keyword Top-k k Similarity Search Over Encrypted Data. IEEE Trans. Dependable Secur. Comput. 2019, 16, 344–357. [Google Scholar] [CrossRef] [Green Version]
- Zhang, L.; Zhang, Y.; Ma, H. Privacy-Preserving and Dynamic Multi-Attribute Conjunctive Keyword Search Over Encrypted Cloud Data. IEEE Access 2018, 6, 34214–34225. [Google Scholar] [CrossRef]
- Fu, Z.; Xia, L.; Sun, X.; Liu, A.X.; Xie, G. Semantic-Aware Searching Over Encrypted Data for Cloud Computing. IEEE Trans. Inf. Forensics Secur. 2018, 13, 2359–2371. [Google Scholar] [CrossRef]
- Cao, N.; Wang, C.; Li, M.; Ren, K.; Lou, W. Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data. IEEE Trans. Parallel Distrib. Syst. 2014, 25, 222–233. [Google Scholar] [CrossRef] [Green Version]
- Boneh, D.; Di Crescenzo, G.; Ostrovsky, R.; Persiano, G. Public Key Encryption with Keyword Search. In Proceedings of the Advances in Cryptology—EUROCRYPT 2004, Interlaken, Switzerland, 2–6 May 2004; Cachin, C., Camenisch, J.L., Eds.; Springer: Berlin/Heidelberg, Germany, 2004; pp. 506–522. [Google Scholar] [CrossRef] [Green Version]
- Ren, Y.; Chen, Y.; Yang, J.; Xie, B. Privacy-preserving ranked multi-keyword search leveraging polynomial function in cloud computing. In Proceedings of the 2014 IEEE Global Communications Conference, Austin, TX, USA, 8–12 December 2014; pp. 594–600. [Google Scholar] [CrossRef] [Green Version]
- Liu, L.G.; Zhao, M.; Ding, Y.; Wang, Y.; Deng, H.; Wang, H. Privacy-Preserving Multi-keyword Search over Outsourced Data for Resource-Constrained Devices. In Proceedings of the Blockchain and Trustworthy Systems, Dali, China, 6–7 August 2020; Zheng, Z., Dai, H.N., Fu, X., Chen, B., Eds.; Springer: Singapore, 2020; pp. 282–294. [Google Scholar] [CrossRef]
- Song, D.X.; Wagner, D.; Perrig, A. Practical techniques for searches on encrypted data. In Proceedings of the 2000 IEEE Symposium on Security and Privacy, SP 2000, Berkeley, CA, USA, 14–17 May 2000; pp. 44–55. [Google Scholar] [CrossRef] [Green Version]
- Chang, Y.C.; Mitzenmacher, M. Privacy Preserving Keyword Searches on Remote Encrypted Data. In Proceedings of the Applied Cryptography and Network Security, New York, NY, USA, 7–10 June 2005; Ioannidis, J., Keromytis, A., Yung, M., Eds.; Springer: Berlin/Heidelberg, Germany, 2005; pp. 442–455. [Google Scholar] [CrossRef]
- Bellare, M.; Boldyreva, A.; O’Neill, A. Deterministic and Efficiently Searchable Encryption. In Proceedings of the Advances in Cryptology—CRYPTO 2007, Santa Barbara, CA, USA, 19–23 August 2007; Menezes, A., Ed.; Springer: Berlin/Heidelberg, Germany, 2007; pp. 535–552. [Google Scholar] [CrossRef] [Green Version]
- Li, J.; Wang, Q.; Wang, C.; Cao, N.; Ren, K.; Lou, W. Fuzzy Keyword Search over Encrypted Data in Cloud Computing. In Proceedings of the 2010 Proceedings IEEE INFOCOM, San Diego, CA, USA, 14–19 March 2010; pp. 1–5. [Google Scholar] [CrossRef]
- Wang, C.; Cao, N.; Li, J.; Ren, K.; Lou, W. Secure Ranked Keyword Search over Encrypted Cloud Data. In Proceedings of the 2010 IEEE 30th International Conference on Distributed Computing Systems, Genoa, Italy, 21–25 June 2010; pp. 253–262. [Google Scholar] [CrossRef]
- Cash, D.; Jarecki, S.; Jutla, C.; Krawczyk, H.; Roşu, M.C.; Steiner, M. Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries. In Proceedings of the Advances in Cryptology—CRYPTO 2013, Santa Barbara, CA, USA, 18–22 August 2013; Canetti, R., Garay, J.A., Eds.; Springer: Berlin/Heidelberg, Germany, 2013; pp. 353–373. [Google Scholar] [CrossRef] [Green Version]
- Golle, P.; Staddon, J.; Waters, B. Secure Conjunctive Keyword Search over Encrypted Data. In Proceedings of the Applied Cryptography and Network Security, Yellow Mountain, China, 8–11 June 2004; Jakobsson, M., Yung, M., Zhou, J., Eds.; Springer: Berlin/Heidelberg, Germany, 2004; pp. 31–45. [Google Scholar] [CrossRef]
- Hwang, Y.H.; Lee, P.J. Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-user System. In Proceedings of the Pairing-Based Cryptography—Pairing 2007, Tokyo, Japan, 2–4 July 2007; Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T., Eds.; Springer: Berlin/Heidelberg, Germany, 2007; pp. 2–22. [Google Scholar] [CrossRef]
- Fu, Z.; Wu, X.; Guan, C.; Sun, X.; Ren, K. Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data with Accuracy Improvement. IEEE Trans. Inf. Forensics Secur. 2016, 11, 2706–2716. [Google Scholar] [CrossRef]
- Liu, J.; Han, J.; Wang, Z. Searchable Encryption Scheme on the Cloud via Fully Homomorphic Encryption. In Proceedings of the 2016 Sixth International Conference on Instrumentation Measurement, Computer, Communication and Control (IMCCC), Harbin, China, 21–23 July 2016; pp. 108–111. [Google Scholar] [CrossRef]
- Anand, V.; Satapathy, S.C. Homomorphic encryption for secure information retrieval from the cloud. In Proceedings of the 2016 International Conference on Emerging Trends in Engineering, Technology and Science (ICETETS), Pudukkottai, India, 24–26 February 2016; pp. 1–5. [Google Scholar] [CrossRef]
- Chenam, V.B.; Ali, S.T. A designated tester-based certificateless public key encryption with conjunctive keyword search for cloud-based MIoT in dynamic multi-user environment. J. Inf. Secur. Appl. 2023, 72, 103377. [Google Scholar] [CrossRef]
- Xu, P.; Wu, Q.; Wang, W.; Susilo, W.; Domingo-Ferrer, J.; Jin, H. Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search. IEEE Trans. Inf. Forensics Secur. 2015, 10, 1993–2006. [Google Scholar] [CrossRef] [Green Version]
- Hu, C.; Liu, P.; Yang, R.; Xu, Y. Public-Key Encryption with Keyword Search via Obfuscation. IEEE Access 2019, 7, 37394–37405. [Google Scholar] [CrossRef]
- Xu, P.; Tang, S.; Xu, P.; Wu, Q.; Hu, H.; Susilo, W. Practical Multi-Keyword and Boolean Search Over Encrypted E-mail in Cloud Server. IEEE Trans. Serv. Comput. 2019, 14, 1877–1889. [Google Scholar] [CrossRef]
- Wang, B.; Hou, Y.; Li, M.; Wang, H.; Li, H. Maple: Scalable multi-dimensional range search over encrypted cloud data with tree-based index. In Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, ASIA CCS ’14, Kyoto, Japan, 4–6 June 2014. [Google Scholar] [CrossRef]
- Olakanmi, O.O.; Odeyemi, K.O. A certificateless keyword searchable encryption scheme in multi-user setting for fog-enhanced Industrial Internet of Things. Trans. Emerg. Telecommun. Technol. 2022, 33, e4257. [Google Scholar] [CrossRef]
- He, T.; Ma, W. An Effective Fuzzy Keyword Search Scheme in Cloud Computing. In Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, Xi’an, China, 9–11 September 2013; pp. 786–789. [Google Scholar] [CrossRef]
- Zhang, Q.; Fu, S.; Jia, N.; Tang, J.; Xu, M. Secure Multi-keyword Fuzzy Search Supporting Logic Query over Encrypted Cloud Data. In Proceedings of the Security and Privacy in New Computing Environments, Tianjin, China, 13–14 April 2019; Li, J., Liu, Z., Peng, H., Eds.; Springer International Publishing: Cham, Switzerland, 2019; pp. 210–225. [Google Scholar] [CrossRef]
- Yang, Y.; Liu, X.; Deng, R.H. Multi-User Multi-Keyword Rank Search Over Encrypted Data in Arbitrary Language. IEEE Trans. Dependable Secur. Comput. 2020, 17, 320–334. [Google Scholar] [CrossRef]
- Ding, Y.; Xu, H.; Wang, Y.; Yuan, F.; Liang, H. Secure Multi-Keyword Search and Access Control over Electronic Health Records in Wireless Body Area Networks. Secur. Commun. Netw. 2021, 2021, 9520941. [Google Scholar] [CrossRef]
- Deebak, B.D.; Memon, F.H.; Dev, K.; Khowaja, S.A.; Qureshi, N.M.F. AI-enabled privacy-preservation phrase with multi-keyword ranked searching for sustainable edge-cloud networks in the era of industrial IoT. Ad Hoc Netw. 2022, 125, 102740. [Google Scholar] [CrossRef]
- Raghavendra, S.; Girish, S.; Geeta C, M.; Buyya, R.; Venugopal K, R.; Iyengar, S.S.; Patnaik, L.M. IGSK: Index Generation on Split Keyword for search over cloud data. In Proceedings of the 2015 International Conference on Computing and Network Communications (CoCoNet), Trivandrum, India, 16–19 December 2015; pp. 374–380. [Google Scholar] [CrossRef] [Green Version]
- Ding, S.; Li, Y.; Zhang, J.; Chen, L.; Wang, Z.; Xu, Q. An efficient and privacy-preserving ranked fuzzy keywords search over encrypted cloud data. In Proceedings of the 2016 International Conference on Behavioral, Economic and Socio-cultural Computing (BESC), Durham, NC, USA, 11–13 November 2016; pp. 1–6. [Google Scholar] [CrossRef]
- Zhao, M.; Liu, L.G.; Ding, Y.; Wang, Y.; Liang, H.; Tang, S.; Wen, B.; Liang, W. Verifiable and Privacy-Preserving Ranked Multi-Keyword Search over Outsourced Data in Clouds. In Proceedings of the 2021 IEEE 15th International Conference on Big Data Science and Engineering (BigDataSE), Shenyang, China, 20–22 October 2021; pp. 95–102. [Google Scholar] [CrossRef]
- Lu, R.; Zhu, H.; Liu, X.; Liu, J.K.; Shao, J. Toward efficient and privacy-preserving computing in big data era. IEEE Netw. 2014, 28, 46–50. [Google Scholar] [CrossRef]
- Xia, Z.; Wang, X.; Sun, X.; Wang, Q. A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data. IEEE Trans. Parallel Distrib. Syst. 2016, 27, 340–352. [Google Scholar] [CrossRef]
Scheme | Search Mechanism | Setting | Application | Advantage |
---|---|---|---|---|
Cao et al. [12] | Multi-keyword | Private key | Cloud computing | Ranked search; coordinate matching |
Boneh et al. [13] | Single keyword | Public key | Email gateway | Semantically secure |
Ren et al. [14] | Multi-keyword | Private key | Cloud computing | Ranked search; lightweight |
Liu et al. [15] | Multi-keyword | Private key | Cloud computing; IoT | Ranked search; lightweight |
Song et al. [16] | Single keyword | Private key | Cloud storage | Provably secure; controlled searching; hidden queries |
Chang and Mitzenmacher [17] | Single keyword | Private key | Distributed file system | File update |
Bellare, Boldyreva and O’Neil [18] | Single keyword | Public key | Database | Deterministic; CCA security |
Li et al. [19] | Multi-keyword | Private key | Cloud computing | Fuzzy keyword search |
Wang et al. [20] | Multi-keyword | Private key | Cloud computing | Ranked search |
Cash et al. [21] | Single keyword | Private key | Large database; arbitrarily-structured data | conjunctive search; general Boolean queries |
Golle, Staddon and Waters [22] | Multi-keyword | Private key | Email system | Conjunctive keyword search |
Hwang and Lee [23] | Multi-keyword | Public key | Remote storage system | Conjunctive keyword search; Multi-user |
Fu et al. [24] | Multi-keyword | Private key | Cloud computing | Fuzzy search; ranked search |
Liu, Han and Wang [25] | Multi-keyword | Multikey | Cloud computing | Multiple data source |
Anand and Satapath [26] | Single keyword | Public key | Cloud computing | Ranked search |
Chenam and Ali [27] | Single keyword | Public key | Medical Internet of Things | Designated tester; conjunctive keyword search; certificateless; dynamical |
Xu et al. [28] | Single keyword | Public key | Large-scale databases | Hidden structures; semantic security |
Hu et al. [29] | Single keyword | Public key | Cloud computing | Resist of off-line keyword guessing attacks |
Xu et al. [30] | Multi-keyword | Public key | Large encrypted email database | Boolean search |
Wang et al. [31] | Multi-keyword | Private key | Cloud computing | Scalable; multi-dimensional range search |
Olakanmi and Odeyemi [32] | Single keyword | Public key | Industrial Internet of Things | Certificateless; resist inside keyword guessing attacks |
Zhang et al. [34] | Multi-keyword | Private key | Cloud storage | Fuzzy search; resist sparse non-negative matrix factorization based attacks |
Yang, Liu and Deng [35] | Multi-keyword | Public key | Cloud storage | Ranked search; multi-user; time-controlled revocation |
Deebak et al. [37] | Multi-keyword | Private key | Sustainable edge-cloud networks | Ranked search; conjunctive search |
Raghavendra et al. [38] | Multi-keyword | Private key | Cloud computing | Fuzzy search; synonym based search |
Zhao et al. [40] | Multi-keyword | Private key | Cloud computing | Ranked search; verifiability |
Notations | Descriptions |
---|---|
Security parameters | |
s | Secret key of data owner |
p | Large prime |
H | One-way hash function |
N | The filename of document F |
d | The size of document F |
F | Document |
Encrypted document | |
D | Keyword dictionary |
n | Number of keywords in D |
Dictionary set | |
W | A set of search keywords |
A plaintext index vector | |
A ciphertext index vector | |
Query vector constructed from W | |
Search trapdoor in ciphertext format | |
The hash value with regard to document F | |
Random numbers for | |
Random number | |
Search threshold |
Scheme | Setup | Index | Trapdoor | Search | Setting |
---|---|---|---|---|---|
— | Generation | Generation | Process | ||
Cao et al.’s scheme [12] | — | Private key | |||
Ding et al.’s scheme [9] | — | Private key | |||
Xia et al.’s scheme [42] | — | Private key | |||
Boneh et al.’s scheme [13] | 1 | Public key | |||
Basic PRMS scheme (Section 3 and [15]) | — | Private key | |||
Extended PRMS scheme (Section 4) | — | Private key |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Zhao, M.; Liu, L.; Ding, Y.; Deng, H.; Liang, H.; Wang, H.; Wang, Y. Lightweight and Privacy-Preserving Multi-Keyword Search over Outsourced Data. Appl. Sci. 2023, 13, 2847. https://doi.org/10.3390/app13052847
Zhao M, Liu L, Ding Y, Deng H, Liang H, Wang H, Wang Y. Lightweight and Privacy-Preserving Multi-Keyword Search over Outsourced Data. Applied Sciences. 2023; 13(5):2847. https://doi.org/10.3390/app13052847
Chicago/Turabian StyleZhao, Meng, Lingang Liu, Yong Ding, Hua Deng, Hai Liang, Huiyong Wang, and Yujue Wang. 2023. "Lightweight and Privacy-Preserving Multi-Keyword Search over Outsourced Data" Applied Sciences 13, no. 5: 2847. https://doi.org/10.3390/app13052847
APA StyleZhao, M., Liu, L., Ding, Y., Deng, H., Liang, H., Wang, H., & Wang, Y. (2023). Lightweight and Privacy-Preserving Multi-Keyword Search over Outsourced Data. Applied Sciences, 13(5), 2847. https://doi.org/10.3390/app13052847