Towards forward secure verifiable data streaming with support for keyword query

被引:0
|
作者
Jing, Xuan [1 ]
Wang, Jianfeng [1 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian, Shaanxi, Peoples R China
关键词
Cloud storage; Verifiable data streaming; Range DSSE; Forward security; EFFICIENT; COMPUTATION; DATABASES;
D O I
10.1016/j.ins.2024.121375
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Verifiable data streaming (VDS) allows users to continuously upload their encrypted data items to untrusted cloud servers to reduce the burden of local storage. Meanwhile, it enables users to update outsourced data and initiate queries to verify data integrity. However, most previous works focus on queries for a certain index and are not compatible with general keyword queries. To this end, we propose a VDS protocol that supports keyword queries. Specifically, we first present an efficient dynamic symmetric searchable encryption (DSSE) with range query, which can represent multiple queried keywords within a range as the concise query token, thereby achieving communication-optimized keyword queries while achieving unbounded data appending. Furthermore, we construct a new VDS protocol supporting keyword queries by integrating the proposed range DSSE. Specifically, suppose the user searches for multiple keywords within a certain range. In that case, cloud servers can match the corresponding data items based on the user's query token, and users can verify the integrity of these data items. Security analysis demonstrates that our VDS protocol achieves forward security. Experimental results show that it sacrifices acceptable costs in exchange for keyword retrieval capability.
引用
收藏
页数:14
相关论文
共 50 条
  • [41] Maintainable verifiable data streaming based on redactable blockchain
    Miao, Meixia
    Wang, Mengchen
    Zhao, Siqi
    Zhang, Fangguo
    Wei, Jianghong
    COMPUTER STANDARDS & INTERFACES, 2025, 93
  • [42] Complex Window Query Support for Monitoring Streaming Data in Wireless Body Area Networks
    Lee, Minsoo
    Han, Xiaoyue
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2011, 57 (04) : 1710 - 1718
  • [43] Verifiable and Forward-secure Encrypted Search Using Blockchain Techniques
    Guo, Yu
    Zhang, Chen
    Jia, Xiaohua
    ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2020,
  • [44] Verifiable and Forward Secure Dynamic Searchable Symmetric Encryption with Storage Efficiency
    Yoneyama, Kazuki
    Kimura, Shogo
    INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017, 2018, 10631 : 489 - 501
  • [45] An efficient, secure and verifiable conjunctive keyword search scheme based on rank metric codes over encrypted outsourced cloud data
    Yousefipoor, Vahid
    Eghlidos, Taraneh
    COMPUTERS & ELECTRICAL ENGINEERING, 2023, 105
  • [46] Forward Private Verifiable Dynamic Searchable Symmetric Encryption With Efficient Conjunctive Query
    Guo, Cheng
    Li, Wenfeng
    Tang, Xinyu
    Choo, Kim-Kwang Raymond
    Liu, Yining
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (02) : 746 - 763
  • [47] Secure and verifiable outsourced data dimension reduction on dynamic data
    Chen, Zhenzhu
    Fu, Anmin
    Deng, Robert H.
    Liu, Ximeng
    Yang, Yang
    Zhang, Yinghui
    INFORMATION SCIENCES, 2021, 573 : 182 - 193
  • [48] Verifiable keyword search for secure big data-based mobile healthcare networks with fine-grained authorization control
    Chen, Zehong
    Zhang, Fangguo
    Zhang, Peng
    Liu, Joseph K.
    Huang, Jiwu
    Zhao, Hanbang
    Shen, Jian
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 87 : 712 - 724
  • [49] LS-RQ: A Lightweight and Forward-Secure Range Query on Geographically Encrypted Data
    Peng, Yanguo
    Wang, Long
    Cui, Jiangtao
    Liu, Ximeng
    Li, Hui
    Ma, Jianfeng
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (01) : 388 - 401
  • [50] A data and query model for streaming geospatial image data
    Gertz, Michael
    Hart, Quinn
    Rueda, Carlos
    Singhal, Shefali
    Zhang, Jie
    CURRENT TRENDS IN DATABASE TECHNOLOGY - EDBT 2006, 2006, 4254 : 687 - 699