Efficient Strong Privacy-Preserving Conjunctive Keyword Search Over Encrypted Cloud Data

被引:5
|
作者
Xu, Chang [1 ]
Wang, Ruijuan [2 ]
Zhu, Liehuang [1 ]
Zhang, Chuan [1 ]
Lu, Rongxing [3 ]
Sharif, Kashif [2 ]
机构
[1] Beijing Inst Technol, Sch Cyberspace Sci & Technol, Beijing 100081, Peoples R China
[2] Beijing Inst Technol, Sch Comp Scienceand Technol, Beijing 100081, Peoples R China
[3] Univ New Brunswick, Fac Comp Sci, Fredericton, NB E3B 5A3, Canada
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
Servers; Privacy; Keyword search; Cryptography; Databases; Encryption; Data privacy; Strong privacy-preserving; DSSE; conjunctive keyword search; SYMMETRIC-ENCRYPTION;
D O I
10.1109/TBDATA.2022.3205668
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Searchable symmetric encryption (SSE) supports keyword search over outsourced symmetrically encrypted data. Dynamic searchable symmetric encryption (DSSE), a variant of SSE, further enables data updating. Most DSSE works with conjunctive keyword search primarily consider forward and backward privacy. Ideally, the server should only learn the result sets involving all keywords in the conjunction. However, existing schemes suffer from keyword pair result pattern (KPRP) leakage, revealing the partial result sets containing two of query keywords. We propose the first DSSE scheme to address aforementioned concerns that achieves strong privacy-preserving conjunctive keyword search. Specifically, our scheme can maintain forward and backward privacy and eliminate KPRP leakage, offering a higher level of security. The search complexity scales with the number of documents stored in the database in several existing schemes. However, the complexity of our scheme scales with the update frequency of the least frequent keyword in the conjunction, which is much smaller than the size of the entire database. Besides, we devise a least frequent keyword acquisition protocol to reduce frequent interactions between clients. Finally, we analyze the security of our scheme and evaluate its performance theoretically and experimentally. The results show that our scheme has strong privacy preservation and efficiency.
引用
收藏
页码:805 / 817
页数:13
相关论文
共 50 条
  • [1] Privacy-Preserving and Dynamic Multi-Attribute Conjunctive Keyword Search Over Encrypted Cloud Data
    Zhang, Lili
    Zhang, Yuqing
    Ma, Hua
    [J]. IEEE ACCESS, 2018, 6 : 34214 - 34225
  • [2] An efficient privacy-preserving multi-keyword search over encrypted cloud data with ranking
    Cengiz Örencik
    Erkay Savaş
    [J]. Distributed and Parallel Databases, 2014, 32 : 119 - 160
  • [3] An efficient privacy-preserving multi-keyword search over encrypted cloud data with ranking
    Orencik, Cengiz
    Savas, Erkay
    [J]. DISTRIBUTED AND PARALLEL DATABASES, 2014, 32 (01) : 119 - 160
  • [4] Privacy-Preserving Ranked Fuzzy Keyword Search over Encrypted Cloud Data
    Xu, Qunqun
    Shen, Hong
    Sang, Yingpeng
    Tian, Hui
    [J]. 2013 INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES (PDCAT), 2013, : 239 - 245
  • [5] A Privacy-preserving Fuzzy Keyword Search Scheme over Encrypted Cloud Data
    Wang, Dongsheng
    Fu, Shaojing
    Xu, Ming
    [J]. 2013 IEEE FIFTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), VOL 1, 2013, : 663 - 670
  • [6] Time Efficient Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
    Jivane, Anjali Baburao
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON POWER, CONTROL, SIGNALS AND INSTRUMENTATION ENGINEERING (ICPCSI), 2017, : 497 - 503
  • [7] An Efficient Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Data in Cloud Computing
    Ahmad, Shadab
    Kurnar, Pasupuleti Syam
    [J]. 2016 IEEE ANNUAL INDIA CONFERENCE (INDICON), 2016,
  • [8] Privacy Preserving Keyword Search over Encrypted Cloud Data
    Ananthi, S.
    Sendil, M. Sadish
    Karthik, S.
    [J]. ADVANCES IN COMPUTING AND COMMUNICATIONS, PT I, 2011, 190 : 480 - 487
  • [9] An Efficient and Privacy-Preserving Semantic Multi-Keyword Ranked Search over Encrypted Cloud Data
    Chen, Li
    Sun, Xingming
    Xia, Zhihua
    Liu, Qi
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (02): : 323 - 332
  • [10] Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
    Cao, Ning
    Wang, Cong
    Li, Ming
    Ren, Kui
    Lou, Wenjing
    [J]. 2011 PROCEEDINGS IEEE INFOCOM, 2011, : 829 - 837