ABSTRACT
With the development of cloud data, searchable encryption has been getting more attention. Searchable encryption with forward and backward privacy can better meet people’s security needs, for it leaks less information. However, only forward and backward is not enough to deal with the situation where the server returns less search results than it should. This paper will focus on this question. Since the consensus mechanism in the blockchain can well ensure honesty, this paper proposes a symmetric searchable encryption with forward and backward privacy based on blockchain smart contracts. We propose a one-to-one scheme SCSSEFB that can be easily extended to one-to-many and extended to the asymmetric case. According to our calculations and evaluations, this scheme has O(n · m) + O(s) + O(s · log2(s)) time update overhead and O(m) + O(m · log2(s′)) search time overhead, where n keywords are updated each time on average, each w corresponds to m identifiers, s documents are updated each time, and a total of s′ documents when searching. Specifically, our scheme takes 103 seconds in the update phase when the test data set is 16,000 bytes and the amount of keyword pairs is 50, and 142.5 seconds in the search phase when the number of keywords is 5 and the amount of leaves in the Merkle tree is 8388608.
- Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikant, and Yirong Xu. 2004. Order Preserving Encryption for Numeric Data. In Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data(SIGMOD ’04). Association for Computing Machinery, New York, NY, USA, 563–574. https://doi.org/10.1145/1007568.1007632Google ScholarDigital Library
- Alexandra Boldyreva, Nathan Chenette, Younho Lee, and Adam O’Neill. 2009. Order-Preserving Symmetric Encryption. In Advances in Cryptology - EUROCRYPT 2009(Lecture Notes in Computer Science), Antoine Joux (Ed.). Springer, Berlin, Heidelberg, 224–241. https://doi.org/10.1007/978-3-642-01001-9_13Google Scholar
- Dan Boneh, Giovanni Di Crescenzo, Rafail Ostrovsky, and Giuseppe Persiano. 2004. Public Key Encryption with Keyword Search. In Advances in Cryptology - EUROCRYPT 2004(Lecture Notes in Computer Science), Christian Cachin and Jan L. Camenisch (Eds.). Springer, Berlin, Heidelberg, 506–522. https://doi.org/10.1007/978-3-540-24676-3_30Google Scholar
- Raphael Bost. 2016. ∑ oφ oς : Forward Secure Searchable Encryption. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security(CCS ’16). Association for Computing Machinery, New York, NY, USA, 1143–1154. https://doi.org/10.1145/2976749.2978303Google ScholarDigital Library
- Raphaël Bost, Brice Minaud, and Olga Ohrimenko. 2017. Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. ACM, Dallas Texas USA, 1465–1482. https://doi.org/10.1145/3133956.3133980Google ScholarDigital Library
- Ning Cao, Cong Wang, Ming Li, Kui Ren, and Wenjing Lou. 2014. Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data. IEEE Transactions on Parallel and Distributed Systems 25, 1 (Jan. 2014), 222–233. https://doi.org/10.1109/TPDS.2013.45Google ScholarDigital Library
- David Cash, Paul Grubbs, Jason Perry, and Thomas Ristenpart. 2015. Leakage-Abuse Attacks Against Searchable Encryption. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security(CCS ’15). Association for Computing Machinery, New York, NY, USA, 668–679. https://doi.org/10.1145/2810103.2813700Google ScholarDigital Library
- David Cash, Joseph Jaeger, Stanislaw Jarecki, Charanjit Jutla, Hugo Krawczyk, Marcel-Cătălin Roşu, and Michael Steiner. 2014. Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation.Google Scholar
- Qi Chai and Guang Gong. 2012. Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers. In Proceedings of IEEE International Conference on Communications. IEEE, Ottawa, ON, Canada, 917–922. https://doi.org/10.1109/ICC.2012.6364125Google ScholarCross Ref
- Biwen Chen, Libing Wu, Huaqun Wang, Lu Zhou, and Debiao He. 2020. A Blockchain-Based Searchable Public-Key Encryption With Forward and Backward Privacy for Cloud-Assisted Vehicular Social Networks. IEEE Transactions on Vehicular Technology 69, 6 (June 2020), 5813–5825. https://doi.org/10.1109/TVT.2019.2959383Google Scholar
- Biwen Chen, Libing Wu, Sherali Zeadally, and Debiao He. 2022. Dual-Server Public-Key Authenticated Encryption with Keyword Search. IEEE Transactions on Cloud Computing 10, 1 (Jan. 2022), 322–333. https://doi.org/10.1109/TCC.2019.2945714Google ScholarCross Ref
- Lanxiang Chen, Wai-Kong Lee, Chin-Chen Chang, Kim-Kwang Raymond Choo, and Nan Zhang. 2019. Blockchain Based Searchable Encryption for Electronic Health Record Sharing. Future Generation Computer Systems 95 (June 2019), 420–429. https://doi.org/10.1016/j.future.2019.01.018Google ScholarDigital Library
- Yang Chen, Wenmin Li, Fei Gao, Qiaoyan Wen, Hua Zhang, and Huawei Wang. 2022. Practical Attribute-Based Multi-Keyword Ranked Search Scheme in Cloud Computing. IEEE Trans. Serv. Comput. 15, 2 (2022), 724–735. https://doi.org/10.1109/TSC.2019.2959306Google ScholarCross Ref
- Ruizhong Du and Yi Wang. 2020. Verifiable Blockchain-Based Searchable Encryption with Forward and Backward Privacy. In 2020 16th International Conference on Mobility, Sensing and Networking (MSN). IEEE, Tokyo, Japan, 630–635. https://doi.org/10.1109/MSN50589.2020.00105Google Scholar
- Oriol Farràs and Jordi Ribes-González. 2019. Provably Secure Public-Key Encryption with Conjunctive and Subset Keyword Search. International Journal of Information Security 18, 5 (Oct. 2019), 533–548. https://doi.org/10.1007/s10207-018-00426-7Google ScholarDigital Library
- Zhangjie Fu, Xinle Wu, Chaowen Guan, Xingming Sun, and Kui Ren. 2016. Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement. IEEE Trans. Inf. Forensics Secur. 11, 12 (2016), 2706–2716. https://doi.org/10.1109/TIFS.2016.2596138Google ScholarCross Ref
- Sanjam Garg, Payman Mohassel, and Charalampos Papamanthou. 2016. TWORAM: Efficient Oblivious RAM in Two Rounds with Applications to Searchable Encryption. In Advances in Cryptology – CRYPTO 2016(Lecture Notes in Computer Science), Matthew Robshaw and Jonathan Katz (Eds.). Springer, Berlin, Heidelberg, 563–592. https://doi.org/10.1007/978-3-662-53015-3_20Google ScholarDigital Library
- Javad Ghareh Chamani, Dimitrios Papadopoulos, Charalampos Papamanthou, and Rasool Jalili. 2018. New Constructions for Forward and Backward Private Symmetric Searchable Encryption. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. ACM, Toronto Canada, 1038–1055. https://doi.org/10.1145/3243734.3243833Google ScholarDigital Library
- Oded Goldreich and Rafail Ostrovsky. 1996. Software Protection and Simulation on Oblivious RAMs. J. ACM 43, 3 (1996), 431–473. https://doi.org/10.1145/233551.233553Google ScholarDigital Library
- Kai He, Jun Guo, Jian Weng, Jia-Si Weng, Joseph K. Liu, and Xun Yi. 2020. Attribute-Based Hybrid Boolean Keyword Search over Outsourced Encrypted Data. IEEE Trans. Dependable Secur. Comput. 17, 6 (2020), 1207–1217. https://doi.org/10.1109/TDSC.2018.2864186Google ScholarCross Ref
- Thang Hoang, Attila Altay Yavuz, and Jorge Guajardo. 2016. Practical and Secure Dynamic Searchable Encryption via Oblivious Access on Distributed Data Structure. In Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016, Stephen Schwab, William K. Robertson, and Davide Balzarotti (Eds.). ACM, Los Angeles, CA, USA, 302–313. https://doi.org/10.1145/2991079.2991088Google ScholarDigital Library
- Mohammad Saiful Islam, Mehmet Kuzu, and Murat Kantarcioglu. 2012. Access Pattern Disclosure on Searchable Encryption: Ramification, Attack and Mitigation. In 19th Annual Network and Distributed System Security Symposium. The Internet Society, San Diego, California, USA.Google Scholar
- Seny Kamara and Charalampos Papamanthou. 2013. Parallel and Dynamic Searchable Symmetric Encryption. In Financial Cryptography and Data Security(Lecture Notes in Computer Science), Ahmad-Reza Sadeghi (Ed.). Springer, Berlin, Heidelberg, 258–274. https://doi.org/10.1007/978-3-642-39884-1_22Google Scholar
- Seny Kamara, Charalampos Papamanthou, and Tom Roeder. 2012. Dynamic Searchable Symmetric Encryption. In Proceedings of the 2012 ACM Conference on Computer and Communications Security(CCS ’12). Association for Computing Machinery, New York, NY, USA, 965–976. https://doi.org/10.1145/2382196.2382298Google ScholarDigital Library
- Kee Sung Kim, Minkyu Kim, Dongsoo Lee, Je Hong Park, and Woo-Hwan Kim. 2017. Forward Secure Dynamic Searchable Symmetric Encryption with Efficient Updates. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security(CCS ’17). Association for Computing Machinery, New York, NY, USA, 1449–1463. https://doi.org/10.1145/3133956.3133970Google ScholarDigital Library
- Huige Li, Fangguo Zhang, Jiejie He, and Haibo Tian. 2017. A Searchable Symmetric Encryption Scheme Using BlockChain. arxiv:1711.01030 [cs]Google Scholar
- Zheli Liu, Yanyu Huang, Xiangfu Song, Bo Li, Jin Li, Yali Yuan, and Changyu Dong. 2022. Eurus: Towards an Efficient Searchable Symmetric Encryption With Size Pattern Protection. IEEE Trans. Dependable Secur. Comput. 19, 3 (2022), 2023–2037. https://doi.org/10.1109/TDSC.2020.3043754Google ScholarCross Ref
- Zheli Liu, Tong Li, Ping Li, Chunfu Jia, and Jin Li. 2018. Verifiable Searchable Encryption with Aggregate Keys for Data Sharing System. Future Generation Computer Systems 78 (Jan. 2018), 778–788. https://doi.org/10.1016/j.future.2017.02.024Google ScholarDigital Library
- Satoshi Nakamoto. 2008. Bitcoin: A Peer-to-Peer Electronic Cash System. https://bitcoin.org/bitcoin.pdf.Google Scholar
- Muhammad Naveed, Seny Kamara, and Charles V. Wright. 2015. Inference Attacks on Property-Preserving Encrypted Databases. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security(CCS ’15). Association for Computing Machinery, New York, NY, USA, 644–655. https://doi.org/10.1145/2810103.2813651Google ScholarDigital Library
- Muhammad Naveed, Manoj Prabhakaran, and Carl A. Gunter. 2014. Dynamic Searchable Encryption via Blind Storage.Google Scholar
- Dawn Xiaodong Song, David Wagner, and Adrian Perrig. 2000. Practical Techniques for Searches on Encrypted Data. In Proceedings of the 2000 IEEE Symposium on Security and Privacy(SP ’00). IEEE Computer Society, USA, 44.Google ScholarCross Ref
- Xiangfu Song, Changyu Dong, Dandan Yuan, Qiuliang Xu, and Minghao Zhao. 2020. Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency. IEEE Transactions on Dependable and Secure Computing 17, 5 (Sept. 2020), 912–927. https://doi.org/10.1109/TDSC.2018.2822294Google ScholarCross Ref
- Emil Stefanov, Charalampos Papamanthou, and Elaine Shi. 2013. Practical Dynamic Searchable Encryption with Small Leakage. Cryptology ePrint Archive, Paper 2013/832. https://eprint.iacr.org/2013/832 https://eprint.iacr.org/2013/832.Google Scholar
- Shi-Feng Sun, Ron Steinfeld, Shangqi Lai, Xingliang Yuan, Amin Sakzad, Joseph Liu, Surya Nepal, and Dawu Gu. 2021. Practical Non-Interactive Searchable Encryption with Forward and Backward Privacy. In Proceedings 2021 Network and Distributed System Security Symposium. Internet Society, Virtual. https://doi.org/10.14722/ndss.2021.24162Google ScholarCross Ref
- Shi-Feng Sun, Xingliang Yuan, Joseph K. Liu, Ron Steinfeld, Amin Sakzad, Viet Vo, and Surya Nepal. 2018. Practical Backward-Secure Searchable Encryption from Symmetric Puncturable Encryption. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security(CCS ’18). Association for Computing Machinery, New York, NY, USA, 763–780. https://doi.org/10.1145/3243734.3243782Google ScholarDigital Library
- Yu Wei, Siyi Lv, Xiaojie Guo, Zheli Liu, Yanyu Huang, and Bo Li. 2019. FSSE: Forward Secure Searchable Encryption with Keyed-Block Chains. Information Sciences: an International Journal 500, C (Oct. 2019), 113–126. https://doi.org/10.1016/j.ins.2019.05.059Google ScholarDigital Library
- Peng Xu, Hai Jin, Qianhong Wu, and Wei Wang. 2013. Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack. IEEE Trans. Comput. 62, 11 (Nov. 2013), 2266–2277. https://doi.org/10.1109/TC.2012.215Google ScholarDigital Library
- Yang Yang, Ximeng Liu, Xianghan Zheng, Chunming Rong, and Wenzhong Guo. 2020. Efficient Traceable Authorization Search System for Secure Cloud Storage. IEEE Transactions on Cloud Computing 8, 3 (July 2020), 819–832. https://doi.org/10.1109/TCC.2018.2820714Google Scholar
- Xu Yuan, Xingliang Yuan, Yihe Zhang, Baochun Li, and Cong Wang. 2020. Enabling Encrypted Boolean Queries in Geographically Distributed Databases. IEEE Trans. Parallel Distributed Syst. 31, 3 (2020), 634–646. https://doi.org/10.1109/TPDS.2019.2940945Google ScholarCross Ref
- Bo Zhang and Fangguo Zhang. 2011. An Efficient Public Key Encryption with Conjunctive-Subset Keywords Search. J. Netw. Comput. Appl. 34, 1 (2011), 262–267. https://doi.org/10.1016/j.jnca.2010.07.007Google ScholarDigital Library
- Xi Zhang, Ye Su, and Jing Qin. 2020. A Dynamic Searchable Symmetric Encryption Scheme for Multiuser with Forward and Backward Security. Security and Communication Networks 2020 (Oct. 2020), e8893016. https://doi.org/10.1155/2020/8893016Google Scholar
- Yupeng Zhang, Jonathan Katz, and Charalampos Papamanthou. 2016. All Your Queries Are Belong to Us: The Power of File-Injection Attacks on Searchable Encryption. In Proceedings of the 25th USENIX Conference on Security Symposium(SEC’16). USENIX Association, USA, 707–720.Google Scholar
- Cong Zuo, Shi-Feng Sun, Joseph K. Liu, Jun Shao, and Josef Pieprzyk. 2018. Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward and Backward) Security. In Computer Security(Lecture Notes in Computer Science), Javier Lopez, Jianying Zhou, and Miguel Soriano (Eds.). Springer International Publishing, Cham, 228–246. https://doi.org/10.1007/978-3-319-98989-1_12Google ScholarDigital Library
- Cong Zuo, Shi-Feng Sun, Joseph K. Liu, Jun Shao, and Josef Pieprzyk. 2019. Dynamic Searchable Symmetric Encryption with Forward and Stronger Backward Privacy. In Computer Security – ESORICS 2019(Lecture Notes in Computer Science), Kazue Sako, Steve Schneider, and Peter Y. A. Ryan (Eds.). Springer International Publishing, Cham, 283–303. https://doi.org/10.1007/978-3-030-29962-0_14Google ScholarDigital Library
Index Terms
- Blockchain-Empowered Search Over Encrypted Data With Forward and Backward Privacy
Recommendations
Dynamic Verifiable Encrypted Keyword Search
Outsourcing data storage to the cloud securely and retrieving the remote data in an efficient way is a very significant research topic, with high relevance to secure cloud deployment. With the ever growing security and privacy concerns, encrypting the ...
Backward private dynamic searchable encryption with update pattern
AbstractSymmetric Searchable Encryption (SSE) realizes to outsource data to an untrusted server privately. Dynamic SSE (DSSE) is a practical application which supports data addition and deletion. However, these update operations incur leakage ...
Leakage-Abuse Attacks Against Forward and Backward Private Searchable Symmetric Encryption
CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications SecurityDynamic searchable symmetric encryption (DSSE) enables a server to efficiently search and update over encrypted files. To minimize the leakage during updates, a security notion named forward and backward privacy is expected for newly proposed DSSE ...
Comments