Abstract
Nowadays outsourcing data to cloud servers is a popular data management way for many users. But how to ensure the security and the usability of the outsourced data is a very challenge problem. Usually encryption of the outsourced data is a good way to protect the privacy. But after encryption, the usability always loses, such as how to search over the outsourced data. Aiming at solving this problem, recently Zhang et al. proposed a privacy preserving ranked multi-keyword search scheme for multiple data owners in cloud computing [IEEE Transactions on Computers, 65(5), 1566–1577, 2018]. However, in this short paper we find their scheme is not secure. Concrete, the adversary can forge the search trapdoor for any keyword, which invalidates the security goal of their original design.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Wang, X.A., Huang, X., Yang, X., Liu, L., Wu, X.: Further observation on proxy re-encryption with keyword search. J. Syst. Softw. 85, 643–654 (2011). https://doi.org/10.1016/j.jss.2011.09.035
Zhang, W., Lin, Y., Xiao, S., Wu, J., Zhou, S.: Privacy preserving ranked multi-keyword search for multiple data owners in cloud computing. IEEE Trans. Comput. 65, 1566–1577 (2015). https://doi.org/10.1109/TC.2015.2448099
Katz, J., Sahai, A., Waters, B.: Predicate encryption supporting disjunctions, polynomial equations, and inner products. In: EUROCRYPT 2008. LNCS 4965, pp. 146–162 (2008)
Boneh, D., Waters, B.: Conjunctive, subset, and range queries on encrypted data. In: TCC 2007. LNCS 4392, pp. 535–554 (2007)
Boneh, D., Crescenzo, G.D., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Eurocrypt 2004. LNCS 3027. Springer, pp. 506–522 (2004)
Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., Malone-Lee, J., Neven, G., Paillier, P., Shi, H.: Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extensions. In: Crypto 2005. LNCS 3621. Springer, pp. 205–222 (2005)
Golle, P., Staddon, J., Waters, B.: Secure conjunctive search over encrypted data. In: ACNS 2004. LNCS 3089, pp. 31–45 (2004)
Baek, J., Safiavi-Naini, R., Susilo, W.: Public key encryption with keyword search revisited. Cryptology ePrint Archive, Report 2005/119 (2005)
Li, J., Wang, Q., Wang, C., Cao, N., Ren, K., Lou, W.: Enabling efficient fuzzy keyword search over encrypted data in cloud computating. In: Infocom 2010, pp. 441–445. Cryptology ePrint Achieve. https://eprint.iacr.org/2009/593.pdf
Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy preserving multi-keyword text search in the cloud supporting similarly-based ranking. IEEE Trans. Parallel Distrib. Syst. 25(1), 222–233 (2014)
Zheng, Q., Xu, S., Ateniese, G.: VABKS: verifiable attribute-based keyword search over outsourced encrypted data. Cryptology ePrint Achieve. https://eprint.iacr.org/2013/462.pdf
Xia, Z., Wang, X., Sun, X., Wang, Q.: A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. (2015). https://doi.org/10.1109/TPDS.2015.2401003
Acknowledgements
This work is supported by National Key Research and Development Program of China Under Grants No. 2017YFB0802000, National Nature Science Foundation of China (Grant Nos. 61572521, U1636114), National Cryptography Development Fund of China Under Grants No. MMJJ20170112, Natural Science Basic Research Plan in Shaanxi Province of china (Grant Nos. 2018JM6028), and an Open Project from Guizhou Provincial Key Laboratory of Public Big Data under Grant No. 2019BDKFJJ008. This work is also supported by Engineering University of PAP’s Funding for Scientific Research Innovation Team (No. KYTD201805), Engineering University of PAP’s Funding for Key Researcher (No. KYGG202011).
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Wang, X.A. (2021). Cryptanalysis of a Privacy Preserving Ranked Multi-keyword Search Scheme in Cloud Computing. In: Barolli, L., Woungang, I., Enokido, T. (eds) Advanced Information Networking and Applications. AINA 2021. Lecture Notes in Networks and Systems, vol 227. Springer, Cham. https://doi.org/10.1007/978-3-030-75078-7_37
Download citation
DOI: https://doi.org/10.1007/978-3-030-75078-7_37
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-75077-0
Online ISBN: 978-3-030-75078-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)