Searching an Encrypted Cloud Meets Blockchain: A Decentralized, Reliable and Fair Realization

被引:0
|
作者
Hu, Shengshan [1 ,3 ]
Cai, Chengjun [3 ]
Wang, Qian [1 ,2 ]
Wang, Cong [3 ]
Luo, Xiangyang [4 ]
Ren, Kaili [5 ,6 ]
机构
[1] Wuhan Univ, Sch Cyber Sci & Engn, Sch Comp Sci, Wuhan, Peoples R China
[2] Collaborat Innovat Ctr Geospatial Technol, Wuhan, Peoples R China
[3] City Univ Hong Kong, Dept Comp Sci, Hong Kong, Peoples R China
[4] Zhengzhou Informat Sci & Technol Inst, Zhengzhou, Peoples R China
[5] Zhejiang Univ, Inst Cyber Secur Res, Hangzhou, Peoples R China
[6] Zhejiang Univ, Sch Comp Sci & Engn, Hangzhou, Peoples R China
来源
IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2018) | 2018年
基金
中国国家自然科学基金;
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Enabling search directly over encrypted data is a desirable technique to allow users to effectively utilize encrypted data outsourced to a remote server like cloud service provider. So far, most existing solutions focus on an honest-but-curious server, while security designs against a malicious server have not drawn enough attention. It is not until recently that a few works address the issue of verifiable designs that enable the data owner to verify the integrity of search results. Unfortunately, these verification mechanisms are highly dependent on the specific encrypted search index structures, and fail to support complex queries. There is a lack of a general verification mechanism that can be applied to all search schemes. Moreover, no effective countermeasures (e g., punishing the cheater) are available when an unfaithful server is detected. In this work, we explore the potential of smart contract in Ethereum, an emerging blockchain-based decentralized technology that provides a new paradigm for trusted and transparent computing. By replacing the central server with a carefully designed smart contract, we construct a decentralized privacy preserving search scheme where the data owner can receive correct search results with assurance and without worrying about potential wrongdoings of a malicious server. To better support practical applications, we introduce fairness to our scheme by designing a new smart contract for a financially-fair search construction, in which every participant (especially in the multiuser setting) is treated equally and incentivized to conform to correct computations. In this way, an honest party can always gain what he deserves while a malicious one gets nothing. Finally, we implement a prototype of our construction and deploy it to a locally simulated network and an official Ethereum test network, respectively. The extensive experiments and evaluations demonstrate the practicability of our decentralized search scheme over encrypted data.
引用
收藏
页码:792 / 800
页数:9
相关论文
共 50 条
  • [21] Blockchain based consensus checking in decentralized cloud storage
    Zhu, Zhiqin
    Qi, Guanqiu
    Zheng, Mingyao
    Sun, Jian
    Chai, Yi
    SIMULATION MODELLING PRACTICE AND THEORY, 2020, 102
  • [22] FileInsurer: A Scalable and Reliable Protocol for Decentralized File Storage in Blockchain
    Chen, Hongyin
    Lu, Yuxuan
    Cheng, Yukun
    2022 IEEE 42ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2022), 2022, : 168 - 179
  • [23] Concealed Policy and Ciphertext Cryptography of Attributes with Keyword Searching for Searching and Filtering Encrypted Cloud Email
    Alhumaidi, Hind
    Alsuwat, Hatim
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2022, 22 (06): : 212 - 222
  • [24] Blockchain-Based Encrypted Image Storage and Search in Cloud Computing
    Li, Yingying
    Ma, Jianfeng
    Miao, Yinbin
    Liu, Ximeng
    Jiang, Qi
    DATABASE SYSTEMS FOR ADVANCED APPLICATIONS, DASFAA 2022, PT I, 2022, : 413 - 421
  • [25] Blockchain-Aided Keyword Search over Encrypted Data in Cloud
    Varri, Uma Sankararao
    ADVANCED NETWORK TECHNOLOGIES AND INTELLIGENT COMPUTING, ANTIC 2022, PT I, 2023, 1797 : 331 - 348
  • [26] Encrypted Searching with Adaptive Symmetric Searchable Encryption Security in Cloud Storage
    Li, Mingchu
    Jia, Wei
    Guo, Cheng
    Zhang, Lieran
    PROCEEDINGS OF THE 2015 INTERNATIONAL SYMPOSIUM ON COMPUTERS & INFORMATICS, 2015, 13 : 806 - 813
  • [27] CloudDBGuard: Enabling Sorting and Searching on Encrypted Data in NoSQL Cloud Databases
    Waage, Tim
    Wiese, Lena
    BIG DATA ANALYTICS AND KNOWLEDGE DISCOVERY (DAWAK 2018), 2018, 11031 : 261 - 270
  • [28] Contextual Oblivious Similarity Searching for Encrypted Data on Cloud Storage Services
    Lavnis, Sneha Umesh
    Elango, Divyaa Manimaran
    Gonzalez-Velez, Horacio
    2018 IEEE 8TH INTERNATIONAL SYMPOSIUM ON CLOUD AND SERVICE COMPUTING (SC2), 2018, : 77 - 82
  • [29] Semantic-Aware Searching Over Encrypted Data for Cloud Computing
    Fu, Zhangjie
    Xia, Lili
    Sun, Xingming
    Liu, Alex X.
    Xie, Guowu
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (09) : 2359 - 2371
  • [30] Verifiable Search Meets Blockchain: A Privacy-Preserving Framework for Outsourced Encrypted Data
    Jiang, Shunrong
    Liu, Jianqing
    Wang, Liangmin
    Yoo, Seong-Moo
    ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2019,