Substring Position Search over Encrypted Cloud Data Supporting Efficient Multi-User Setup

被引:12
|
作者
Strizhov, Mikhail [1 ]
Osman, Zachary [1 ]
Ray, Indrajit [1 ]
机构
[1] Colorado State Univ, Dept Comp Sci, Ft Collins, CO 80523 USA
来源
FUTURE INTERNET | 2016年 / 8卷 / 03期
基金
美国国家科学基金会;
关键词
substring position search; searchable symmetric encryption; cloud computing; position heap tree;
D O I
10.3390/fi8030028
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Existing Searchable Encryption (SE) solutions are able to handle simple Boolean search queries, such as single or multi-keyword queries, but cannot handle substring search queries over encrypted data that also involve identifying the position of the substring within the document. These types of queries are relevant in areas such as searching DNA data. In this paper, we propose a tree-based Substring Position Searchable Symmetric Encryption (SSP-SSE) to overcome the existing gap. Our solution efficiently finds occurrences of a given substring over encrypted cloud data. Specifically, our construction uses the position heap tree data structure and achieves asymptotic efficiency comparable to that of an unencrypted position heap tree. Our encryption takes O(kn) time, and the resulting ciphertext is of size O (kn), where k is a security parameter and n is the size of stored data. The search takes O(m(2) + occ) time and three rounds of communication, where m is the length of the queried substring and occ is the number of occurrences of the substring in the document collection. We prove that the proposed scheme is secure against chosen-query attacks that involve an adaptive adversary. Finally, we extend SSP-SSE to the multi-user setting where an arbitrary group of cloud users can submit substring queries to search the encrypted data.
引用
收藏
页数:26
相关论文
共 50 条
  • [1] Secure Multi-keyword Similarity Search Over Encrypted Cloud Data Supporting Efficient Multi-user Setup
    Strizhov, Mikhail
    Ray, Indrajit
    [J]. TRANSACTIONS ON DATA PRIVACY, 2016, 9 (02) : 131 - 159
  • [3] Efficient Multi-user Similarity Search Over Encrypted Data in Cloud Storage
    Changhee Hahn
    Hyung June Shin
    Hyunsoo Kwon
    Junbeom Hur
    [J]. Wireless Personal Communications, 2019, 107 : 1337 - 1353
  • [4] Efficient Multi-user Similarity Search Over Encrypted Data in Cloud Storage
    Hahn, Changhee
    Shin, Hyung June
    Kwon, Hyunsoo
    Hur, Junbeom
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2019, 107 (03) : 1337 - 1353
  • [5] EFFICIENT MULTI-USER KEYWORD SEARCH OVER ENCRYPTED DATA IN CLOUD COMPUTING
    Li, Jin
    Chen, Xiaofeng
    [J]. COMPUTING AND INFORMATICS, 2013, 32 (04) : 723 - 738
  • [6] Efficient Encrypted Keyword Search for Multi-user Data Sharing
    Kiayias, Aggelos
    Oksuz, Ozgur
    Russell, Alexander
    Tang, Qiang
    Wang, Bing
    [J]. COMPUTER SECURITY - ESORICS 2016, PT I, 2016, 9878 : 173 - 195
  • [7] Multi-user noisy keyword search over encrypted data
    [J]. Yang, B. (byang@snnu.edu.cn), 1973, Binary Information Press, P.O. Box 162, Bethel, CT 06801-0162, United States (09):
  • [8] Centralized Multi-user and Dynamic Multi-keywords Search Scheme over Encrypted Cloud Data
    Seema, S.
    Harshitha, Y.
    Apoorva, P.
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMMUNICATION AND SIGNAL PROCESSING (ICCSP), 2017, : 913 - 917
  • [9] Substring Position Search over Encrypted Cloud Data using Tree-based Index
    Strizhov, Mikhail
    Ray, Indrajit
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E 2015), 2015, : 165 - 174
  • [10] Secure and efficient encrypted keyword search for multi-user setting in cloud computing
    Haijiang Wang
    Xiaolei Dong
    Zhenfu Cao
    [J]. Peer-to-Peer Networking and Applications, 2019, 12 : 32 - 42