JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2019, Vol. 54 ›› Issue (1): 67-78.doi: 10.6040/j.issn.1671-9352.0.2018.133

Previous Articles    

Searchable encryption with data integrity verification in cloud storage

YAO Ke1,2, YANG Hai-ning1, QIN Jing1,3*   

  1. 1. School of Mathematics, Shandong University, Jinan 250100, Shandong, China;
    2. The 28th Research Institute of China Electronic Technology Group Corporation, Nanjing 210007, Jiangsu, China;
    3. State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China
  • Published:2019-01-23

Abstract: In order to improve the practicability of the searchable encryption, a searchable encryption(SE)system which can verify the integrity of the searched data in the cloud is constructed. And a secure protocol uses multi-file proofs of retrievability as the building block to achieve the verifiable integrity of searchable encryption on multi-type files. Compared with the existing work, the proposed protocol improves the security and reduces the computational overhead.

Key words: searchable encryption, cloud storage, proof of integrity

CLC Number: 

  • TP309
[1] KAMARA S, LAUTER K. Cryptographic cloud storage[C] // International Conference on Financial Cryptography and Data Security. Berlin: Springer, 2010: 136-149.
[2] SONG D X, WAGNER D, PERRRIG A. Practical techniques for searches on encrypted data[C] // Security and Privacy, 2000.[S.l.] : IEEE, 2000: 44-55.
[3] GOH E J. Secure indexes[EB/OL].https:// eprint.iacr.org/2003/216.pdf
[4] CHANG Y C, MITZENMACHER M. Privacy preserving keyword searches on remote encrypted data[C] // International Conference on Applied Cryptography and Network Security. Berlin: Springer, 2005: 442-455.
[5] CURTMOLA R, GARAYJ, KAMARA S, et al. Searchable symmetric encryption: improved definitions and efficient constructions[J]. Journal of Computer Security, 2011, 19(5): 895-934.
[6] BONEH D, CRESCENZO D G, OSTROVSKY R, et al. Public key encryption with keyword search[C] // International Conference on the Theory and Applications of Cryptographic Techniques. Berlin: Springer, 2004: 506-522.
[7] ABDALLA M, BELLARE M, CATALANO D, et al. Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extensions[C] // Annual International Cryptology Conference. Berlin: Springer, 2005: 205-222.
[8] BONEH D, FRANKLIN M. Identity-based encryption from the Weil pairing[C] // Annual International Cryptology Conference. Berlin: Springer, 2001: 213-229.
[9] SAHAI A, WATERS B. Fuzzy identity-based encryption[J]. Lecture Notes in Computer Science, 2004, 3494:457-473.
[10] WANG H, ZHENG Z, WU L, et al. New directly revocable attribute-based encryption scheme and its application in cloud storage environment[J]. Cluster Computing, 2017, 20(3):2385-2392.
[11] LI J, ZHANG Y, CHEN X, et al. Secure attribute-based data sharing for resource-limited users in cloud computing[J]. Computers & Security, 2018, 72:1-12.
[12] ZHU B, SUN J, QIN J, et al. Fuzzy matching: multi-authority attribute searchable encryption without central authority[J]. Soft Computing, 2017: 1-10.
[13] HAN F, QIN J, ZHAO H, et al. A general transformation from KP-ABE to searchable encryption[J]. Future Generation Computer Systems, 2014, 30:107-115.
[14] 韩斐. 基于属性的可搜索加密协议研究[D]. 济南:山东大学, 2015. HAN Fei. Research on attribute based searchable encryption[D]. Jinan: Shandong University, 2015.
[15] HAN F, QIN J, HU J. Secure searches in the cloud: a survey[J]. Future Generation Computer Systems, 2016, 62:66-75.
[16] MENG R, ZHOU Y, NING J, et al. An efficient key-policy attribute-based searchable encryption in prime-order groups[C] // International Conference on Provable Security. Cham: Springer, 2017: 39-56.
[17] CHAUDHARI P, DAS M L. On the security of a searchable anonymous attribute based encryption[C] // International Conference on Mathematics and Computing. Singapore: Springer, 2017: 16-25.
[18] LI F, WU C, YUAN X, et al. Multi-keyword ranked fuzzy search over encrypted data in cloud supporting dynamic update[J]. Journal of Computational and Theoretical Nanoscience, 2016, 13(12):9705-9709.
[19] LI X, CUI Y, ZHOU M, et al. Efficient multi-keyword fuzzy search on encrypted data in cloud storage[C] // Information Science and Control Engineering(ICISCE)[S.l.] : IEEE, 2017: 288-294.
[20] CHAI Q, GONG G. Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers[C] // Communications(ICC)[S.l.] : IEEE, 2012: 917-922.
[21] ZHENG Q, XU S, ATENIESE G. VABKS: verifiable attribute-based keyword search over outsourced encrypted data[C] // Infocom, 2014 proceedings IEEE.[S.l.] : IEEE, 2014: 522-530.
[22] ATENIESE G, BURNS R, CURTMOLA R, et al. Provable data possession at untrusted stores[C] // Proceedings of the 14th ACM conference on Computer and Communications Security.[S.l.] : ACM, 2007: 598-609.
[23] ATENIESE G, DI PIETRO R, MANCINI L V, et al. Scalable and efficient provable data possession[C] // Proceedings of the 4th International Conference on Security and Privacy in Communication Netowrks.[S.l.] : ACM, 2008: 9.
[24] CURTMOLA R,KHAN O, BURNS R. Robust remote data checking[C] // Proceedings of the 4th ACM International Workshop on Storage Security and Survivability.[S.l.] : ACM, 2008: 63-68.
[25] ERWAY C C, KÜPCÜ A, PAPAMANTHOU C, et al. Dynamic provable data possession[C] //ACM Coference on Computer and Communications Security. New York: ACM, 2009: 213-222.
[26] WANG C, WANG Q, REN K, et al. Privacy-preserving public auditing for data storage security in cloud computing[C] // Infocom, 2010 Proceedings Ieee.[S.l.] : IEEE, 2010: 1-9.
[27] WANG B, LI B, LI H. Oruta: Privacy-preserving public auditing for shared data in the cloud[J]. IEEE Transactions on Cloud Computing, 2014, 2(1):43-56.
[28] WU Y, JIANG Z L, WANG X, et al. Dynamic data operations with deduplication in privacy-preserving public auditing for secure cloud storage[C] // 2017 IEEE International Conference on Computational Science and Engineering(CSE)and IEEE International Conference on Embedded and Ubiquitous Computing(EUC).[S.l.] : IEEE, 2017, 1: 562-567.
[29] SUGUAN M, SHALINIE S M. Privacy preserving auditing protocol for remote data storage[J]. Cluster Computing, 2018: 1-8.
[30] WANG Q, WANG C, LI J, et al. Enabling public verifiability and data dynamics for storage security in cloud computing[C] // European Symposium on Research in Computer Security. Berlin: Springer, 2009: 355-370.
[31] DANIEL E, VASANTHI N A. A cost effective dynamic auditing scheme for outsourced data storage in cloud environment[C] // Innovations in Green Energy and Healthcare Technologies(IGEHT)[S.l.] : IEEE, 2017: 1-5.
[32] XIANG T, LI X, CHEN F, et al. Achieving verifiable, dynamic and efficient auditing for outsourced database in cloud[J]. Journal of Parallel and Distributed Computing, 2018, 112:97-107.
[33] GRITTI C, SUSILO W, PLANTARD T. Efficient dynamic provable data possession with public verifiability and data privacy[C] // Australasian Conference on Information Security and Privacy. Cham:Springer, 2015: 395-412.
[34] JUELS A, KALISKI JR B S. PORs: proofs of retrievability for large files[C] // Proceedings of the 14th ACM Conference on Computer and Communications Security.[S.l.] : ACM, 2007: 584-597.
[35] SHACHAM H, WATERS B. Compact proofs of retrievability[C] // International Conference on the Theory and Application of Cryptology and Information Security. Berlin: Springer, 2008: 90-107.
[36] BOWERS K D, JUELS A, OPREA A. HAIL: a high-availability and integrity layer for cloud storage[C] // Proceedings of the 16th ACM Conference on Computer and Communications Security.[S.l.] : ACM, 2008: 187-198.
[37] WANG Q, WANG C, LI J, et al. Enabling public verifiability and data dynamics for storage security in cloud computing[C] // European Symposium on Research in Computer Security. Berlin: Springer, 2009: 355-370.
[38] WANG B, HONG X. Multi-file proofs of retrievability for cloud storage auditing[EB/OL]. https:// eprint.iacr.org/2013/348.pdf
[39] GOLDWASSER S, MICALI S, RIVEST R L. A digital signature scheme secure against adaptive chosen-message attacks[J]. SIAM Journal on Computing, 1988, 17(2):281-308.
[40] SUN W, WANG B, CAO N, et al. Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking[C] // Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security. [S.l.] : ACM, 2013: 71-82.
[41] ZHANG R, XUE R, YU T, et al. PVSAE: a public verifiable searchable encryption service framework for outsourced encrypted data[C] // Web Services(ICWS), 2016 IEEE International Conference on.[S.l.] : IEEE, 2016: 428-435.
[1] YAO Ke, ZHU Bin-rui, QIN Jing. Verifiable public key searchable encryption protocol based on biometrics [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(11): 11-22.
[2] ZHU Bin-rui, QIN Jing, HAN Fei. Searchable encryption scheme based on biometrics [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(5): 78-86.
[3] LIU Wen-zhuo, CAO Tian-jie, HUANG Shi. An efficient multiple-replica data possession checking scheme [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2014, 49(09): 160-165.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!