Fast Multi-User Searchable Encryption with Forward and Backward Private Access Control

被引:0
|
作者
Bulbul, Salim Sabah [1 ]
Abduljabbar, Zaid Ameen [2 ]
Najem, Duaa Fadhel [3 ]
Nyangaresi, Vincent Omollo [4 ]
Ma, Junchao [5 ]
Aldarwish, Abdulla J. Y. [2 ]
机构
[1] Minist Educ, Directorate Gen Educ Basra, Basra 61004, Iraq
[2] Univ Basrah, Coll Educ Pure Sci, Dept Comp Sci, Basrah 61004, Iraq
[3] Univ Basrah, Coll Comp Sci & Informat Technol, Dept Cyber Secur, Basrah 61004, Iraq
[4] Jaram Oginga Odinga Univ Sci & Technol, Dept Comp Sci & Software Engn, Bondo 40601, Kenya
[5] Shenzhen Technol Univ, Coll Big Data & Internet, Shenzhen 518118, Peoples R China
关键词
symmetric encryption; cloud computing; access control; multiple user; backward privacy; SYMMETRIC-ENCRYPTION; SUPPORT;
D O I
10.3390/jsan13010012
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Untrusted servers are servers or storage entities lacking complete trust from the data owner or users. This characterization implies that the server hosting encrypted data may not enjoy full trust from data owners or users, stemming from apprehensions related to potential security breaches, unauthorized access, or other security risks. The security of searchable encryption has been put into question by several recent attacks. Currently, users can search for encrypted documents on untrusted cloud servers using searchable symmetric encryption (SSE). This study delves deeply into two pivotal concepts of privacy within dynamic searchable symmetric encryption (DSSE) schemes: forward privacy and backward privacy. The former serves as a safeguard against the linkage of recently added documents to previously conducted search queries, whereas the latter guarantees the irretrievability of deleted documents in subsequent search inquiries. However, the provision of fine-grained access control is complex in existing multi-user SSE schemes. SSE schemes may also incur high computation costs due to the need for fine-grained access control, and it is essential to support document updates and forward privacy. In response to these issues, this paper suggests a searchable encryption scheme that uses simple primitive tools. We present a multi-user SSE scheme that efficiently controls access to dynamically encrypted documents to resolve these issues, using an innovative approach that readily enhances previous findings. Rather than employing asymmetric encryption as in comparable systems, we harness low-complexity primitive encryption tools and inverted index-based DSSE to handle retrieving encrypted files, resulting in a notably faster system. Furthermore, we ensure heightened security by refreshing the encryption key after each search, meaning that users are unable to conduct subsequent searches with the same key and must obtain a fresh key from the data owner. An experimental evaluation shows that our scheme achieves forward and Type II backward privacy and has much faster search performance than other schemes. Our scheme can be considered secure, as proven in a random oracle model.
引用
收藏
页数:18
相关论文
共 50 条
  • [21] Multi-user Boolean searchable encryption supporting fast ranking in mobile clouds
    Chen, Zehong
    Zhang, Fangguo
    Zhang, Peng
    Zhao, Hanbang
    COMPUTER COMMUNICATIONS, 2020, 164 (164) : 100 - 113
  • [22] Fine-grained search and access control in multi-user searchable encryption without shared keys
    Nair, Manju S.
    Rajasree, M. S.
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 41 : 124 - 133
  • [23] Enabling Traceable and Verifiable Multi-User Forward Secure Searchable Encryption in Hybrid Cloud
    Wu, Axin
    Yang, Anjia
    Luo, Weiqi
    Wen, Jinghang
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (02) : 1886 - 1898
  • [24] A discretionary searchable encryption scheme in multi-user settings
    Li, Zhen
    Jiang, Han
    Zhao, Minghao
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2015, 52 (10): : 2313 - 2322
  • [25] Revocable and anonymous searchable encryption in multi-user setting
    Miao, Yinbin
    Ma, Jianfeng
    Liu, Zhiquan
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016, 28 (04): : 1204 - 1218
  • [26] Certificateless Searchable Encryption Scheme in Multi-User Environment
    Feng, Tao
    Si, Jiewen
    CRYPTOGRAPHY, 2022, 6 (04)
  • [27] Certificateless Authentication Searchable Encryption Scheme for Multi-user
    Zhang Yulei
    Wen Long
    Wang Haohao
    Zhang Yongjie
    Wang Caifen
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2020, 42 (05) : 1094 - 1101
  • [28] Anonymous Searchable Encryption Scheme for Multi-User Databases
    Varadharajan, Vijayaraghavan
    Mani, Raghubansh
    Nallusamy, Rajarathnam
    PROCEEDINGS OF THE 2013 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E 2013), 2013, : 225 - 232
  • [29] Blockchain searchable encryption scheme for multi-user environment
    Zhai, Sheping
    Zhang, Ruiting
    Yang, Rui
    Cao, Yongqiang
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2024, 51 (04): : 151 - 169
  • [30] Accelerating Forward and Backward Private Searchable Encryption Using Trusted Execution
    Vo, Viet
    Lai, Shangqi
    Yuan, Xingliang
    Sun, Shi-Feng
    Nepal, Surya
    Liu, Joseph K.
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2020), PT II, 2020, 12147 : 83 - 103