Enabling Generic, Verifiable, and Secure Data Search in Cloud Services

被引:76
|
作者
Zhu, Jie [1 ,2 ]
Li, Qi [1 ,2 ]
Wang, Cong [3 ]
Yuan, Xingliang [4 ]
Wang, Qian [5 ]
Ren, Kui [6 ]
机构
[1] Grad Sch Shenzhen, Tsinghua Univ, Shenzhen 518055, Guangdong, Peoples R China
[2] Tsinghua Univ, Dept Comp Sci, Beijing 100084, Peoples R China
[3] City Univ Hong Kong, Dept Comp Sci, Hong Kong, Hong Kong, Peoples R China
[4] Monash Univ, Fac Informat Technol, Clayton, Vic 3800, Australia
[5] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan 430072, Hubei, Peoples R China
[6] Univ Buffalo State Univ New York, Dept Comp Sci & Engn, Buffalo, NY USA
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Cloud; secure data search; verifiable data search; CLOCK SYNCHRONIZATION; ENCRYPTION;
D O I
10.1109/TPDS.2018.2808283
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Searchable Symmetric Encryption (SSE) has been widely studied in cloud storage, which allows cloud services to directly search over encrypted data. Most SSE schemes only work with honest-but-curious cloud services that do not deviate from the prescribed protocols. However, this assumption does not always hold in practice due to the untrusted nature in storage outsourcing. To alleviate the issue, there have been studies on Verifiable Searchable Symmetric Encryption (VSSE), which functions against malicious cloud services by enabling results verification. But to our best knowledge, existing VSSE schemes exhibit very limited applicability, such as only supporting static database, demanding specific SSE constructions, or only working in the single-user model. In this paper, we propose GSSE, the first generic verifiable SSE scheme in the single-owner multiple-user model, which provides verifiability for any SSE schemes and further supports data updates. To generically support result verification, we first decouple the proof index in GSSE from SSE. We then leverage Merkle Patricia Tree (MPT) and Incremental Hash to build the proof index with data update support. We also develop a timestamp-chain for data freshness maintenance across multiple users. Rigorous analysis and experimental evaluations show that GSSE is secure and introduces small overhead for result verification.
引用
收藏
页码:1721 / 1735
页数:15
相关论文
共 50 条
  • [21] Enabling Traceable and Verifiable Multi-User Forward Secure Searchable Encryption in Hybrid Cloud
    Wu, Axin
    Yang, Anjia
    Luo, Weiqi
    Wen, Jinghang
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (02) : 1886 - 1898
  • [22] Secure data stream outsourcing with publicly verifiable integrity in cloud storage
    Wu, Qiyu
    Zhou, Fucai
    Xu, Jian
    Wang, Qiang
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 49
  • [23] Achieving Secure and Effective Search Services in Cloud Computing
    Liu, Qin
    Pei, Shuyu
    Xie, Kang
    Wu, Jie
    Peng, Tao
    Wang, Guojun
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 1386 - 1391
  • [24] Enabling Verifiable and Secure Range Query in Multi-User Setting Under Cloud Environments
    Cui N.
    Wang D.
    Zhu H.
    Li J.
    Xu J.
    Yang X.
    IEEE Transactions on Knowledge and Data Engineering, 2024, 36 (12) : 1 - 15
  • [25] Enabling Generic Verifiable Aggregate Query on Blockchain Systems
    Zhu, Yanchao
    Zhang, Zhao
    Jin, Cheqing
    Zhou, Aoying
    2020 IEEE 26TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS), 2020, : 456 - 465
  • [26] Secure and Verifiable Multi-owner Ranked-Keyword Search in Cloud Computing
    Li, Jinguo
    Lin, Yaping
    Wen, Mi
    Gu, Chunhua
    Yin, Bo
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, 2015, 9204 : 325 - 334
  • [27] Publicly Verifiable and Secure SVM Classification for Cloud-Based Health Monitoring Services
    Lei, Dian
    Liang, Jinwen
    Zhang, Chuan
    Liu, Ximeng
    He, Daojing
    Zhu, Liehuang
    Guo, Song
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (06) : 9829 - 9842
  • [28] A verifiable fully homomorphic encryption scheme to secure big data in cloud computing
    El-Yahyaoui, Ahmed
    Ech-Chrif El Kettani, Mohamed Dafir
    2017 INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE COMMUNICATIONS (WINCOM), 2017, : 250 - 254
  • [29] Digital provenance: Enabling secure data forensics in cloud computing
    Li, Jin
    Chen, Xiaofeng
    Huang, Qiong
    Wong, Duncan S.
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2014, 37 : 259 - 266
  • [30] Enabling Generic Keyword Search over Raw XML Data
    Agarwal, Manoj K.
    Ramamritham, Krithi
    2015 IEEE 31ST INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE), 2015, : 1496 - 1499