Abstract
Cloud storage services allow a data owner to share their data with each other as a group. Typically, the data owner outsources files to the cloud server, and some authorized users can access and edit the files subsequently. In reality, the most widely-used format of files in such a cloud-based collaboration system is attribute-value type one, e.g., an excel spreadsheet, where each file corresponds to an item and multiple attribute values. Each attribute value can be considered as a keyword, and a type of attribute values “describes” an attribute. The database generated by such files is called the attribute-value type database. Authorized users can search outsourced files by either keywords or attributes such that they can access the files flexibly. However, due to the sensitivity of the outsourced files, the data owner always encrypts the file before outsourcing, which precludes users from searching target files. This problem could be mitigated by utilizing DSSE, but it only supports searching over ciphertexts by keywords, and thereby is unsatisfactory for the attribute-value database. Furthermore, DSSE schemes built on a single-user setting are out of alignment with the practical applications. In this paper, we propose a multi-user DSSE scheme for attribute-value type database based on blind storage, dubbed MDSSE, such that authorized users can search over files by either keywords or attributes, while the confidentiality of the files is ensured. We analyze MDSSE in terms of security and efficiency, which proves that MDSSE is secure against various attacks with high efficiency in terms of communication and computation costs.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Lei, Z., Anmin, F., Shui, Y., Mang, S., Boyu, K.: Data integrity verification of the outsourced big data in the cloud environment: a survey. J. Network Comput. Appl. 122, 1–15 (2018)
Zhang, Y., Xu, C., Li, H., Yang, K., Cheng, N., Shen, X.S.: PROTECT: Efficient password-based threshold single-sign-on authentication for mobile users against perpetual leakage. IEEE Trans. Mobile Comput. (2020)
Shui, Y.: Big privacy: challenges and opportunities of privacy study in the age of big data. IEEE Access 4, 2751–2763 (2016)
Yu, S., Liu, M., Dou, W., Liu, X., Zhou, S.: Networking for big data: a survey. IEEE Commun. Surv. Tutorials 19(1), 531–549 (2017)
Zhang, Y., Xu, C., Cheng, N., Li, H., Shen, X.S.: Chronos\(^{{\mathbf{+}}}\)+: an accurate blockchain-based time-stamping scheme for cloud storage. IEEE Trans. Serv. Comput. 13(2), 216–229 (2020)
Kamara, S., Lauter, K.: Cryptographic cloud storage. In: Sion, R., et al. (eds.) FC 2010. LNCS, vol. 6054, pp. 136–149. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-14992-4_13
Shanshan, L., Chunxiang, X., Yuan, Z.: CSED: client-side encrypted deduplication scheme based on proofs of ownership for cloud storage. J. Inf. Secur. Appl. 46, 250–258 (2019)
Yuan, Z., Chunxiang, X., Hongwei, L., Kan, Y., Jianying, Z., Xiaodong, L.: HealthDep: an efficient and secure deduplication scheme for cloud-assisted eHealth systems. IEEE Trans. Industr. Inf. 14(9), 4101–4112 (2018)
Yuan, Z., Chunxiang, X., Jining, Z., Xiaojun, Z., Junwei, W.: Cryptanalysis of an integrity checking scheme for cloud data sharing. J. Inf. Secur. Appl. 23, 68–73 (2015)
Zhang, Y., Xu, C., Ni, J., Li, H., Shen, X.S.: Blockchain-assisted public-key encryption with keyword search against keyword guessing attacks for cloud storage. IEEE Trans. Cloud Comput. (2019)
Google doc. www.google.cn/intl/zh-cnall/docs/about/
Nadkarni, P.M., Brandt, C.M., Marenco, L.: WebEAV: automatic metadata-driven generation of web interfaces to entity-attribute-value databases. J. Am. Med. Inf. Assoc. 7(4), 343–356 (2000)
Nadkarni, P.M., Brandt, C.: Data extraction and ad hoc query of an entity-attribute-value database. J. Am. Med. Inf. Assoc. 5(6), 511–527 (1998)
Böjosep, A.D., Katz, R., Konwinski, A., Gunho, L., Patterson, D., Rabkin, A.: A view of cloud computing. Commun. ACM 53(4), 50–58 (2010)
Zhang, Y., Xu, C., Lin, X., Shen, X.S.: Blockchain-based public integrity verification for cloud storage against procrastinating auditors. IEEE Trans. Cloud Comput. (2019)
Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: 21th International Proceedings on S and P, Berkeley, CA, USA, pp. 44–55. IEEE (2000)
Goh, E.-J.: Secure indexes. GIACR Cryptol. ePrint Archive 2003, 216 (2003)
Reza, C., Juan, G., Seny, K., Rafail, O.: Searchable symmetric encryption: improved definitions and efficient constructions. J. Comput. Secur. 19(5), 895–934 (2011)
Chang, Y.-C., Mitzenmacher, M.: Privacy preserving keyword searches on remote encrypted data. In: Ioannidis, J., Keromytis, A., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 442–455. Springer, Heidelberg (2005). https://doi.org/10.1007/11496137_30
Kamara, S., Papamanthou, C., Roeder, T.: Dynamic searchable symmetric encryption. In: International Proceedings on CCS, Raleigh, North Carolina, USA, pp. 965–976. ACM (2012)
Kamara, S., Papamanthou, C.: Parallel and dynamic searchable symmetric encryption. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 258–274. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-39884-1_22
Cash, D., Grubbs, P., Perry, J., Ristenpart, T.: Leakage-abuse attacks against searchable encryption. In: 22th International Proceedings on CCS, Denver, Colorado, USA, pp. 668–679. ACM (2015)
Islam, M.S., Kuzu, M., Kantarcioglu, M.: Access pattern disclosure on searchable encryption: ramification, attack and mitigation. In: 19th International Proceedings on NDSS, San Diego, CA, USA, pp. 1–12. ISOC (2012)
Zhang, Y., Katz, J., Papamanthou, C.: All your queries are belong to us: the power of file-injection attacks on searchable encryption. In: 25th International Proceedings on USENIX Security, Vancouver, BC, Canada, pp. 707–720. USENIX Association (2016)
Emil, C., Papamanthou, C., Shi, E.: Practical dynamic searchable encryption with small leakage. In: 21th International Proceedings on NDSS, San Diego, CA, USA, pp. 72–75. ISOC (2014)
Kim, K.S., Kim, M., Lee, D., Park, J.H., Kim, W.-H.: Forward secure dynamic searchable symmetric encryption with efficient updates. In: 24th International Proceedings on CCS, New York, NY, USA, pp. 1449–1463. ACM (2017)
Ghareh Chamani, J., Papadopoulos, D., Papamanthou, C., Jalili, R.: New constructions for forward and backward private symmetric searchable encryption. In: 25th International Proceedings on CCS, New York, NY, USA, pp. 1038–1055. ACM (2018)
Bost, R.: \(\varphi \)o\(\varsigma \): Forward secure searchable encryption. In: 23th International Proceedings on CCS, New York, NY, USA, pp. 1143–1154. ACM (2016)
Naveed, M., Prabhakaran, M., Gunter, C.A.: Dynamic searchable encryption via blind storage. In: 35th International Proceedings on S and P, San Jose, CA, USA, pp. 639–654. IEEE (2014)
Hahn, F., Kerschbaum, F.: Searchable encryption with secure and efficient updates. In: 21th International Proceedings on CCS, New York, NY, USA, pp. 310–320. ACM (2014)
Acknowledgements
This work is supported by the National Key R&D Program of China under Grant 2017YFB0802000, the National Nature Science Foundation of China under Grant 61872060, and the National Natural Science Foundation of China under Grant 61830203.
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Li, S., Xu, C., Zhang, Y., Wen, X. (2020). Multi-user Dynamic Symmetric Searchable Encryption for Attribute-Value Type Database in Cloud Storage. In: Yu, S., Mueller, P., Qian, J. (eds) Security and Privacy in Digital Economy. SPDE 2020. Communications in Computer and Information Science, vol 1268. Springer, Singapore. https://doi.org/10.1007/978-981-15-9129-7_25
Download citation
DOI: https://doi.org/10.1007/978-981-15-9129-7_25
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-9128-0
Online ISBN: 978-981-15-9129-7
eBook Packages: Computer ScienceComputer Science (R0)