Verifiable Dynamic Searchable Symmetric Encryption Based on Blockchain

被引:0
|
作者
Xu W.-S. [1 ,2 ]
Zhang J.-B. [1 ,2 ]
Yuan Y.-L. [1 ,2 ]
机构
[1] School of Computer Science and Technology, Faculty of Information Technology, Beijing University of Technology, Beijing
[2] Beijing Key Laboratory of Trusted Computing, Beijing University of Technology, Beijing
来源
Ruan Jian Xue Bao/Journal of Software | 2023年 / 34卷 / 11期
关键词
blockchain; dynamic update; symmetric searchable encryption (SSE); verifiable;
D O I
10.13328/j.cnki.jos.006685
中图分类号
学科分类号
摘要
Symmetric searchable encryption (SSE) can retrieve encrypted data without disclosing user privacy and has been widely studied and applied in cloud storage. However, in SSE schemes, semi-honest or dishonest servers may tamper with the data in files and return the untrusted files to users, so it is necessary to verify these files. Most existing verifiable SSE schemes are verified by the users locally, and malicious users may forge verification results, which cannot ensure verification fairness. To this end, this study proposes a verifiable dynamic symmetric searchable encryption scheme based on blockchain, VDSSE). VDSSE employs symmetric encryption to achieve forward security in the dynamic updating, and on this basis, the blockchain is utilized to verify the search results. During the verification, a new verification tag, Vtag, is proposed. The accumulation of Vtag is leveraged to compress the verification information, reduce the storage cost of verification information on the blockchain, and effectively support the dynamic verification of SSE schemes. Finally, experimental evaluation and security analysis are conducted on VDSSE to verify the feasibility and security of the scheme. © 2023 Chinese Academy of Sciences. All rights reserved.
引用
收藏
页码:5392 / 5407
页数:15
相关论文
共 30 条
  • [1] Song DX, Wagner D, Perrig A., Practical techniques for searches on encrypted data, Proc. of the 2000 IEEE Symp. on Security and Privacy, pp. 44-55, (2000)
  • [2] Kamara S, Papamanthou C, Roeder T., Dynamic searchable symmetric encryption, Proc. of the 2012 ACM Conf. on Computer and Communications Security, pp. 965-976, (2012)
  • [3] Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G., Public key encryption with keyword search, Proc. of the 2004 Int’l Conf. on the Theory and Applications of Cryptographic Techniques, pp. 506-522, (2004)
  • [4] Tahir S, Ruj S, Rahulamathavan Y, Rajarajan M, Glackin C., A new secure and lightweight searchable encryption scheme over encrypted cloud data, IEEE Trans. on Emerging Topics in Computing, 7, 4, pp. 530-544, (2019)
  • [5] Li HW, Yang Y, Dai YS, Yu S, Xiang Y., Achieving secure and efficient dynamic searchable symmetric encryption over medical cloud data, IEEE Trans. on Cloud Computing, 8, 2, pp. 484-494, (2020)
  • [6] Sun SF, Zuo C, Liu JK, Sakzad A, Steinfeld R, Yuen TH, Yuan XL, Gu DW., Non-interactive multi-client searchable encryption: Realization and implementation, IEEE Trans. on Dependable and Secure Computing, 19, 1, pp. 452-467, (2022)
  • [7] Zhang MW, Chen Y, Huang JJ., SE-PPFM: A searchable encryption scheme supporting privacy-preserving fuzzy multikeyword in cloud systems, IEEE Systems Journal, 15, 2, pp. 2980-2988, (2021)
  • [8] Goh EJ., Secure indexes, (2003)
  • [9] Curtmola R, Garay J, Kamara S, Ostrovsky R., Searchable symmetric encryption: Improved definitions and efficient constructions, Proc. of the 13th ACM Conf. on Computer and Communications Security, pp. 79-88, (2006)
  • [10] Cash D, Grubbs P, Perry J, Ristenpart T., Leakage-abuse attacks against searchable encryption, Proc. of the 22nd ACM SIGSAC Conf. on Computer and Communications Security, pp. 668-679, (2015)