Achieving Secure, Universal, and Fine-Grained Query Results Verification for Secure Search Scheme Over Encrypted Cloud Data

被引:19
|
作者
Yin, Hui [1 ,2 ]
Qin, Zheng [1 ]
Zhang, Jixin [1 ]
Ou, Lu [1 ]
Li, Keqin [3 ]
机构
[1] Hunan Univ, Coll Comp Sci & Elect Engn, Changsha 410082, Peoples R China
[2] Changsha Univ, Dept Math & Comp Sci, Changsha 410022, Peoples R China
[3] SUNY Coll New Paltz, Dept Comp Sci, New Paltz, NY 12561 USA
基金
中国国家自然科学基金;
关键词
Cloud computing; query results verification; secure query; verification object; KEYWORD RANKED SEARCH;
D O I
10.1109/TCC.2017.2709318
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secure search techniques over encrypted cloud data allow an authorized user to query data files of interest by submitting encrypted query keywords to the cloud server in a privacy-preserving manner. However, in practice, the returned query results may be incorrect or incomplete in the dishonest cloud environment. For example, the cloud server may intentionally omit some qualified results to save computational resources and communication overhead. Thus, a well-functioning secure query system should provide a query results verification mechanism that allows the data user to verify results. In this paper, we design a secure, easily integrated, and fine-grained query results verification mechanism, by which, given an encrypted query results set, the query user not only can verify the correctness of each data file in the set but also can further check how many or which qualified data files are not returned if the set is incomplete before decryption. The verification scheme is loose-coupling to concrete secure search techniques and can be very easily integrated into any secure query scheme. We achieve the goal by constructing secure verification object for encrypted cloud data. Furthermore, a short signature technique with extremely small storage cost is proposed to guarantee the authenticity of verification object and a verification object request technique is presented to allow the query user to securely obtain the desired verification object. Performance evaluation shows that the proposed schemes are practical and efficient.
引用
收藏
页码:27 / 39
页数:13
相关论文
共 50 条
  • [1] Comment on "Achieving Secure, Universal, and Fine-Grained Query Results Verification for Secure Search Scheme Over Encrypted Cloud Data"
    Qin, Zhiguang
    Wu, Yan
    Xiong, Hu
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2021, 9 (04) : 1675 - 1677
  • [2] Secure Fine-Grained Encrypted Keyword Search for E-Healthcare Cloud
    Wang, Haijiang
    Ning, Jianting
    Huang, Xinyi
    Wei, Guiyi
    Poh, Geong Sen
    Liu, Ximeng
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (03) : 1307 - 1319
  • [3] Fine-Grained Query Authorization With Integrity Verification Over Encrypted Spatial Data in Cloud Storage
    Tian, Feng
    Wu, Zhenqiang
    Gui, Xiaolin
    Ni, Jianbing
    Shen, Xuemin
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (03) : 1831 - 1847
  • [4] A Secure and Efficient Fine-Grained Deletion Approach over Encrypted Data
    Lavania, Kushagra
    Gupta, Gaurang
    Kumar, D. V. N. Siva
    [J]. 2022 IEEE 46TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2022), 2022, : 1123 - 1128
  • [5] A Fine-Grained Authorized Keyword Secure Search Scheme in the Cloud Computing
    Wang, Fan
    Qin, Zheng
    Yin, Hui
    [J]. CYBERSPACE SAFETY AND SECURITY, PT II, 2019, 11983 : 432 - 447
  • [6] A query privacy-enhanced and secure search scheme over encrypted data in cloud computing
    Yin, Hui
    Qin, Zheng
    Ou, Lu
    Li, Keqin
    [J]. JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2017, 90 : 14 - 27
  • [7] Secure search scheme for encrypted data in the VANET cloud with random query trapdoor
    Hegde, Nayana
    Manvi, Sunilkumar S.
    Lallie, Harjinder Singh
    [J]. INFORMATION SECURITY JOURNAL, 2023, 32 (05): : 383 - 400
  • [8] Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing
    Yu, Shucheng
    Wang, Cong
    Ren, Kui
    Lou, Wenjing
    [J]. 2010 PROCEEDINGS IEEE INFOCOM, 2010,
  • [9] Achieving fine-grained access control for secure data sharing on cloud servers
    Wang, Guojun
    Liu, Qin
    Wu, Jie
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2011, 23 (12): : 1443 - 1464
  • [10] Evaluable Secure Ranked Keyword Search Scheme over Encrypted Cloud Data
    Jia Zhi-peng
    Zhang Ya-ling
    Wang Shang-ping
    Sun Qin-dong
    [J]. 2013 9TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2013, : 697 - 701