Fast Multi-User Searchable Encryption with Forward and Backward Private Access Control

被引:0
|
作者
Bulbul, Salim Sabah [1 ]
Abduljabbar, Zaid Ameen [2 ]
Najem, Duaa Fadhel [3 ]
Nyangaresi, Vincent Omollo [4 ]
Ma, Junchao [5 ]
Aldarwish, Abdulla J. Y. [2 ]
机构
[1] Minist Educ, Directorate Gen Educ Basra, Basra 61004, Iraq
[2] Univ Basrah, Coll Educ Pure Sci, Dept Comp Sci, Basrah 61004, Iraq
[3] Univ Basrah, Coll Comp Sci & Informat Technol, Dept Cyber Secur, Basrah 61004, Iraq
[4] Jaram Oginga Odinga Univ Sci & Technol, Dept Comp Sci & Software Engn, Bondo 40601, Kenya
[5] Shenzhen Technol Univ, Coll Big Data & Internet, Shenzhen 518118, Peoples R China
关键词
symmetric encryption; cloud computing; access control; multiple user; backward privacy; SYMMETRIC-ENCRYPTION; SUPPORT;
D O I
10.3390/jsan13010012
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Untrusted servers are servers or storage entities lacking complete trust from the data owner or users. This characterization implies that the server hosting encrypted data may not enjoy full trust from data owners or users, stemming from apprehensions related to potential security breaches, unauthorized access, or other security risks. The security of searchable encryption has been put into question by several recent attacks. Currently, users can search for encrypted documents on untrusted cloud servers using searchable symmetric encryption (SSE). This study delves deeply into two pivotal concepts of privacy within dynamic searchable symmetric encryption (DSSE) schemes: forward privacy and backward privacy. The former serves as a safeguard against the linkage of recently added documents to previously conducted search queries, whereas the latter guarantees the irretrievability of deleted documents in subsequent search inquiries. However, the provision of fine-grained access control is complex in existing multi-user SSE schemes. SSE schemes may also incur high computation costs due to the need for fine-grained access control, and it is essential to support document updates and forward privacy. In response to these issues, this paper suggests a searchable encryption scheme that uses simple primitive tools. We present a multi-user SSE scheme that efficiently controls access to dynamically encrypted documents to resolve these issues, using an innovative approach that readily enhances previous findings. Rather than employing asymmetric encryption as in comparable systems, we harness low-complexity primitive encryption tools and inverted index-based DSSE to handle retrieving encrypted files, resulting in a notably faster system. Furthermore, we ensure heightened security by refreshing the encryption key after each search, meaning that users are unable to conduct subsequent searches with the same key and must obtain a fresh key from the data owner. An experimental evaluation shows that our scheme achieves forward and Type II backward privacy and has much faster search performance than other schemes. Our scheme can be considered secure, as proven in a random oracle model.
引用
收藏
页数:18
相关论文
共 50 条
  • [31] Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives
    Bost, Raphael
    Minaud, Brice
    Ohrimenko, Olga
    CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 1465 - 1482
  • [32] Nowhere to Leak: A Multi-client Forward and Backward Private Symmetric Searchable Encryption Scheme
    Bakas, Alexandros
    Michalas, Antonis
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXXV, 2021, 12840 : 84 - 95
  • [33] Efficient backward private searchable encryption
    Chatterjee, Sanjit
    Puria, Shravan Kumar Parshuram
    Shah, Akash
    JOURNAL OF COMPUTER SECURITY, 2020, 28 (02) : 229 - 267
  • [34] Multi-user and Keyword-based Searchable Encryption Scheme
    Zhang, Ya-ling
    Liu, Li-jun
    Wang, Shang-ping
    PROCEEDINGS OF 2016 12TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2016, : 223 - 227
  • [35] Multi-user searchable encryption voice in home IoT system
    Li, Wei
    Xiao, Yazhou
    Tang, Chao
    Huang, Xujing
    Xue, Jianwu
    INTERNET OF THINGS, 2020, 11
  • [36] Fine-grained searchable encryption in multi-user setting
    Jun Ye
    Jianfeng Wang
    Jiaolian Zhao
    Jian Shen
    Kuan-Ching Li
    Soft Computing, 2017, 21 : 6201 - 6212
  • [37] Server-aided searchable encryption in multi-user setting
    Sun, Lixue
    Xu, Chunxiang
    Li, Chuang
    Li, Yuhui
    COMPUTER COMMUNICATIONS, 2020, 164 (164) : 25 - 30
  • [38] Fine-grained searchable encryption in multi-user setting
    Ye, Jun
    Wang, Jianfeng
    Zhao, Jiaolian
    Shen, Jian
    Li, Kuan-Ching
    SOFT COMPUTING, 2017, 21 (20) : 6201 - 6212
  • [39] Multi-User Dynamic Searchable Symmetric Encryption With Corrupted Participants
    Chamani, Javad Ghareh
    Wang, Yun
    Papadopoulos, Dimitrios
    Zhang, Mingyang
    Jalili, Rasool
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (01) : 114 - 130
  • [40] Multi-User Verifiable Searchable Symmetric Encryption for Cloud Storage
    Liu, Xueqiao
    Yang, Guomin
    Mu, Yi
    Deng, Robert H.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (06) : 1322 - 1332