skip to main content
10.1145/3594556.3594605acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

Blockchain-Empowered Search Over Encrypted Data With Forward and Backward Privacy

Published:12 September 2023Publication History

ABSTRACT

With the development of cloud data, searchable encryption has been getting more attention. Searchable encryption with forward and backward privacy can better meet people’s security needs, for it leaks less information. However, only forward and backward is not enough to deal with the situation where the server returns less search results than it should. This paper will focus on this question. Since the consensus mechanism in the blockchain can well ensure honesty, this paper proposes a symmetric searchable encryption with forward and backward privacy based on blockchain smart contracts. We propose a one-to-one scheme SCSSEFB that can be easily extended to one-to-many and extended to the asymmetric case. According to our calculations and evaluations, this scheme has O(n · m) + O(s) + O(s · log2(s)) time update overhead and O(m) + O(m · log2(s′)) search time overhead, where n keywords are updated each time on average, each w corresponds to m identifiers, s documents are updated each time, and a total of s′ documents when searching. Specifically, our scheme takes 103 seconds in the update phase when the test data set is 16,000 bytes and the amount of keyword pairs is 50, and 142.5 seconds in the search phase when the number of keywords is 5 and the amount of leaves in the Merkle tree is 8388608.

References

  1. Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikant, and Yirong Xu. 2004. Order Preserving Encryption for Numeric Data. In Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data(SIGMOD ’04). Association for Computing Machinery, New York, NY, USA, 563–574. https://doi.org/10.1145/1007568.1007632Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Alexandra Boldyreva, Nathan Chenette, Younho Lee, and Adam O’Neill. 2009. Order-Preserving Symmetric Encryption. In Advances in Cryptology - EUROCRYPT 2009(Lecture Notes in Computer Science), Antoine Joux (Ed.). Springer, Berlin, Heidelberg, 224–241. https://doi.org/10.1007/978-3-642-01001-9_13Google ScholarGoogle Scholar
  3. Dan Boneh, Giovanni Di Crescenzo, Rafail Ostrovsky, and Giuseppe Persiano. 2004. Public Key Encryption with Keyword Search. In Advances in Cryptology - EUROCRYPT 2004(Lecture Notes in Computer Science), Christian Cachin and Jan L. Camenisch (Eds.). Springer, Berlin, Heidelberg, 506–522. https://doi.org/10.1007/978-3-540-24676-3_30Google ScholarGoogle Scholar
  4. Raphael Bost. 2016. ∑ oφ oς : Forward Secure Searchable Encryption. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security(CCS ’16). Association for Computing Machinery, New York, NY, USA, 1143–1154. https://doi.org/10.1145/2976749.2978303Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Raphaël Bost, Brice Minaud, and Olga Ohrimenko. 2017. Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. ACM, Dallas Texas USA, 1465–1482. https://doi.org/10.1145/3133956.3133980Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Ning Cao, Cong Wang, Ming Li, Kui Ren, and Wenjing Lou. 2014. Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data. IEEE Transactions on Parallel and Distributed Systems 25, 1 (Jan. 2014), 222–233. https://doi.org/10.1109/TPDS.2013.45Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. David Cash, Paul Grubbs, Jason Perry, and Thomas Ristenpart. 2015. Leakage-Abuse Attacks Against Searchable Encryption. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security(CCS ’15). Association for Computing Machinery, New York, NY, USA, 668–679. https://doi.org/10.1145/2810103.2813700Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. David Cash, Joseph Jaeger, Stanislaw Jarecki, Charanjit Jutla, Hugo Krawczyk, Marcel-Cătălin Roşu, and Michael Steiner. 2014. Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation.Google ScholarGoogle Scholar
  9. Qi Chai and Guang Gong. 2012. Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers. In Proceedings of IEEE International Conference on Communications. IEEE, Ottawa, ON, Canada, 917–922. https://doi.org/10.1109/ICC.2012.6364125Google ScholarGoogle ScholarCross RefCross Ref
  10. Biwen Chen, Libing Wu, Huaqun Wang, Lu Zhou, and Debiao He. 2020. A Blockchain-Based Searchable Public-Key Encryption With Forward and Backward Privacy for Cloud-Assisted Vehicular Social Networks. IEEE Transactions on Vehicular Technology 69, 6 (June 2020), 5813–5825. https://doi.org/10.1109/TVT.2019.2959383Google ScholarGoogle Scholar
  11. Biwen Chen, Libing Wu, Sherali Zeadally, and Debiao He. 2022. Dual-Server Public-Key Authenticated Encryption with Keyword Search. IEEE Transactions on Cloud Computing 10, 1 (Jan. 2022), 322–333. https://doi.org/10.1109/TCC.2019.2945714Google ScholarGoogle ScholarCross RefCross Ref
  12. Lanxiang Chen, Wai-Kong Lee, Chin-Chen Chang, Kim-Kwang Raymond Choo, and Nan Zhang. 2019. Blockchain Based Searchable Encryption for Electronic Health Record Sharing. Future Generation Computer Systems 95 (June 2019), 420–429. https://doi.org/10.1016/j.future.2019.01.018Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Yang Chen, Wenmin Li, Fei Gao, Qiaoyan Wen, Hua Zhang, and Huawei Wang. 2022. Practical Attribute-Based Multi-Keyword Ranked Search Scheme in Cloud Computing. IEEE Trans. Serv. Comput. 15, 2 (2022), 724–735. https://doi.org/10.1109/TSC.2019.2959306Google ScholarGoogle ScholarCross RefCross Ref
  14. Ruizhong Du and Yi Wang. 2020. Verifiable Blockchain-Based Searchable Encryption with Forward and Backward Privacy. In 2020 16th International Conference on Mobility, Sensing and Networking (MSN). IEEE, Tokyo, Japan, 630–635. https://doi.org/10.1109/MSN50589.2020.00105Google ScholarGoogle Scholar
  15. Oriol Farràs and Jordi Ribes-González. 2019. Provably Secure Public-Key Encryption with Conjunctive and Subset Keyword Search. International Journal of Information Security 18, 5 (Oct. 2019), 533–548. https://doi.org/10.1007/s10207-018-00426-7Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Zhangjie Fu, Xinle Wu, Chaowen Guan, Xingming Sun, and Kui Ren. 2016. Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement. IEEE Trans. Inf. Forensics Secur. 11, 12 (2016), 2706–2716. https://doi.org/10.1109/TIFS.2016.2596138Google ScholarGoogle ScholarCross RefCross Ref
  17. Sanjam Garg, Payman Mohassel, and Charalampos Papamanthou. 2016. TWORAM: Efficient Oblivious RAM in Two Rounds with Applications to Searchable Encryption. In Advances in Cryptology – CRYPTO 2016(Lecture Notes in Computer Science), Matthew Robshaw and Jonathan Katz (Eds.). Springer, Berlin, Heidelberg, 563–592. https://doi.org/10.1007/978-3-662-53015-3_20Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Javad Ghareh Chamani, Dimitrios Papadopoulos, Charalampos Papamanthou, and Rasool Jalili. 2018. New Constructions for Forward and Backward Private Symmetric Searchable Encryption. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. ACM, Toronto Canada, 1038–1055. https://doi.org/10.1145/3243734.3243833Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Oded Goldreich and Rafail Ostrovsky. 1996. Software Protection and Simulation on Oblivious RAMs. J. ACM 43, 3 (1996), 431–473. https://doi.org/10.1145/233551.233553Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Kai He, Jun Guo, Jian Weng, Jia-Si Weng, Joseph K. Liu, and Xun Yi. 2020. Attribute-Based Hybrid Boolean Keyword Search over Outsourced Encrypted Data. IEEE Trans. Dependable Secur. Comput. 17, 6 (2020), 1207–1217. https://doi.org/10.1109/TDSC.2018.2864186Google ScholarGoogle ScholarCross RefCross Ref
  21. Thang Hoang, Attila Altay Yavuz, and Jorge Guajardo. 2016. Practical and Secure Dynamic Searchable Encryption via Oblivious Access on Distributed Data Structure. In Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016, Stephen Schwab, William K. Robertson, and Davide Balzarotti (Eds.). ACM, Los Angeles, CA, USA, 302–313. https://doi.org/10.1145/2991079.2991088Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Mohammad Saiful Islam, Mehmet Kuzu, and Murat Kantarcioglu. 2012. Access Pattern Disclosure on Searchable Encryption: Ramification, Attack and Mitigation. In 19th Annual Network and Distributed System Security Symposium. The Internet Society, San Diego, California, USA.Google ScholarGoogle Scholar
  23. Seny Kamara and Charalampos Papamanthou. 2013. Parallel and Dynamic Searchable Symmetric Encryption. In Financial Cryptography and Data Security(Lecture Notes in Computer Science), Ahmad-Reza Sadeghi (Ed.). Springer, Berlin, Heidelberg, 258–274. https://doi.org/10.1007/978-3-642-39884-1_22Google ScholarGoogle Scholar
  24. Seny Kamara, Charalampos Papamanthou, and Tom Roeder. 2012. Dynamic Searchable Symmetric Encryption. In Proceedings of the 2012 ACM Conference on Computer and Communications Security(CCS ’12). Association for Computing Machinery, New York, NY, USA, 965–976. https://doi.org/10.1145/2382196.2382298Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Kee Sung Kim, Minkyu Kim, Dongsoo Lee, Je Hong Park, and Woo-Hwan Kim. 2017. Forward Secure Dynamic Searchable Symmetric Encryption with Efficient Updates. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security(CCS ’17). Association for Computing Machinery, New York, NY, USA, 1449–1463. https://doi.org/10.1145/3133956.3133970Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Huige Li, Fangguo Zhang, Jiejie He, and Haibo Tian. 2017. A Searchable Symmetric Encryption Scheme Using BlockChain. arxiv:1711.01030 [cs]Google ScholarGoogle Scholar
  27. Zheli Liu, Yanyu Huang, Xiangfu Song, Bo Li, Jin Li, Yali Yuan, and Changyu Dong. 2022. Eurus: Towards an Efficient Searchable Symmetric Encryption With Size Pattern Protection. IEEE Trans. Dependable Secur. Comput. 19, 3 (2022), 2023–2037. https://doi.org/10.1109/TDSC.2020.3043754Google ScholarGoogle ScholarCross RefCross Ref
  28. Zheli Liu, Tong Li, Ping Li, Chunfu Jia, and Jin Li. 2018. Verifiable Searchable Encryption with Aggregate Keys for Data Sharing System. Future Generation Computer Systems 78 (Jan. 2018), 778–788. https://doi.org/10.1016/j.future.2017.02.024Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Satoshi Nakamoto. 2008. Bitcoin: A Peer-to-Peer Electronic Cash System. https://bitcoin.org/bitcoin.pdf.Google ScholarGoogle Scholar
  30. Muhammad Naveed, Seny Kamara, and Charles V. Wright. 2015. Inference Attacks on Property-Preserving Encrypted Databases. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security(CCS ’15). Association for Computing Machinery, New York, NY, USA, 644–655. https://doi.org/10.1145/2810103.2813651Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Muhammad Naveed, Manoj Prabhakaran, and Carl A. Gunter. 2014. Dynamic Searchable Encryption via Blind Storage.Google ScholarGoogle Scholar
  32. Dawn Xiaodong Song, David Wagner, and Adrian Perrig. 2000. Practical Techniques for Searches on Encrypted Data. In Proceedings of the 2000 IEEE Symposium on Security and Privacy(SP ’00). IEEE Computer Society, USA, 44.Google ScholarGoogle ScholarCross RefCross Ref
  33. Xiangfu Song, Changyu Dong, Dandan Yuan, Qiuliang Xu, and Minghao Zhao. 2020. Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency. IEEE Transactions on Dependable and Secure Computing 17, 5 (Sept. 2020), 912–927. https://doi.org/10.1109/TDSC.2018.2822294Google ScholarGoogle ScholarCross RefCross Ref
  34. Emil Stefanov, Charalampos Papamanthou, and Elaine Shi. 2013. Practical Dynamic Searchable Encryption with Small Leakage. Cryptology ePrint Archive, Paper 2013/832. https://eprint.iacr.org/2013/832 https://eprint.iacr.org/2013/832.Google ScholarGoogle Scholar
  35. Shi-Feng Sun, Ron Steinfeld, Shangqi Lai, Xingliang Yuan, Amin Sakzad, Joseph Liu, Surya Nepal, and Dawu Gu. 2021. Practical Non-Interactive Searchable Encryption with Forward and Backward Privacy. In Proceedings 2021 Network and Distributed System Security Symposium. Internet Society, Virtual. https://doi.org/10.14722/ndss.2021.24162Google ScholarGoogle ScholarCross RefCross Ref
  36. Shi-Feng Sun, Xingliang Yuan, Joseph K. Liu, Ron Steinfeld, Amin Sakzad, Viet Vo, and Surya Nepal. 2018. Practical Backward-Secure Searchable Encryption from Symmetric Puncturable Encryption. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security(CCS ’18). Association for Computing Machinery, New York, NY, USA, 763–780. https://doi.org/10.1145/3243734.3243782Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Yu Wei, Siyi Lv, Xiaojie Guo, Zheli Liu, Yanyu Huang, and Bo Li. 2019. FSSE: Forward Secure Searchable Encryption with Keyed-Block Chains. Information Sciences: an International Journal 500, C (Oct. 2019), 113–126. https://doi.org/10.1016/j.ins.2019.05.059Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Peng Xu, Hai Jin, Qianhong Wu, and Wei Wang. 2013. Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack. IEEE Trans. Comput. 62, 11 (Nov. 2013), 2266–2277. https://doi.org/10.1109/TC.2012.215Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Yang Yang, Ximeng Liu, Xianghan Zheng, Chunming Rong, and Wenzhong Guo. 2020. Efficient Traceable Authorization Search System for Secure Cloud Storage. IEEE Transactions on Cloud Computing 8, 3 (July 2020), 819–832. https://doi.org/10.1109/TCC.2018.2820714Google ScholarGoogle Scholar
  40. Xu Yuan, Xingliang Yuan, Yihe Zhang, Baochun Li, and Cong Wang. 2020. Enabling Encrypted Boolean Queries in Geographically Distributed Databases. IEEE Trans. Parallel Distributed Syst. 31, 3 (2020), 634–646. https://doi.org/10.1109/TPDS.2019.2940945Google ScholarGoogle ScholarCross RefCross Ref
  41. Bo Zhang and Fangguo Zhang. 2011. An Efficient Public Key Encryption with Conjunctive-Subset Keywords Search. J. Netw. Comput. Appl. 34, 1 (2011), 262–267. https://doi.org/10.1016/j.jnca.2010.07.007Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Xi Zhang, Ye Su, and Jing Qin. 2020. A Dynamic Searchable Symmetric Encryption Scheme for Multiuser with Forward and Backward Security. Security and Communication Networks 2020 (Oct. 2020), e8893016. https://doi.org/10.1155/2020/8893016Google ScholarGoogle Scholar
  43. Yupeng Zhang, Jonathan Katz, and Charalampos Papamanthou. 2016. All Your Queries Are Belong to Us: The Power of File-Injection Attacks on Searchable Encryption. In Proceedings of the 25th USENIX Conference on Security Symposium(SEC’16). USENIX Association, USA, 707–720.Google ScholarGoogle Scholar
  44. Cong Zuo, Shi-Feng Sun, Joseph K. Liu, Jun Shao, and Josef Pieprzyk. 2018. Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward and Backward) Security. In Computer Security(Lecture Notes in Computer Science), Javier Lopez, Jianying Zhou, and Miguel Soriano (Eds.). Springer International Publishing, Cham, 228–246. https://doi.org/10.1007/978-3-319-98989-1_12Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Cong Zuo, Shi-Feng Sun, Joseph K. Liu, Jun Shao, and Josef Pieprzyk. 2019. Dynamic Searchable Symmetric Encryption with Forward and Stronger Backward Privacy. In Computer Security – ESORICS 2019(Lecture Notes in Computer Science), Kazue Sako, Steve Schneider, and Peter Y. A. Ryan (Eds.). Springer International Publishing, Cham, 283–303. https://doi.org/10.1007/978-3-030-29962-0_14Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Blockchain-Empowered Search Over Encrypted Data With Forward and Backward Privacy

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        BSCI '23: Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure
        July 2023
        159 pages
        ISBN:9798400701986
        DOI:10.1145/3594556

        Copyright © 2023 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 12 September 2023

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed limited

        Acceptance Rates

        Overall Acceptance Rate44of12submissions,367%
      • Article Metrics

        • Downloads (Last 12 months)83
        • Downloads (Last 6 weeks)9

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format .

      View HTML Format