Toward Forward and Backward Private Dynamic Searchable Symmetric Encryption Supporting Data Deduplication and Conjunctive Queries

被引:22
作者
Chen, Liqing [1 ,2 ]
Li, Jiayi [1 ]
Li, Jiguo [2 ,3 ]
机构
[1] Huaiyin Inst Technol, Fac Comp & Software Engn, Huaian 223003, Jiangsu, Peoples R China
[2] Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou 350117, Fujian, Peoples R China
[3] Fujian Normal Univ, Coll Comp & Cyber Secur, Fuzhou 350117, Fujian, Peoples R China
基金
中国国家自然科学基金;
关键词
Backward privacy; conjunctive queries; data deduplication; dynamic searchable symmetric encryption (DSSE); forward privacy; KEYWORD SEARCH; BROADCAST ENCRYPTION; SECURE DEDUPLICATION; ADAPTIVELY SECURE;
D O I
10.1109/JIOT.2023.3274390
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In Internet of Things (IoT) application scenarios, such as intelligent logistics, secure data access control, and sharing based on dynamic searchable symmetric encryption (DSSE) has become a research hotspot in recent years. DSSE is an encryption technology which gratifies the above requirements, while protecting the sensitive data during the operation. The existing DSSE schemes do not achieve data deduplication and conjunctive queries concurrently, and exist problems, such as complex update process, inflexible query method, and privacy disclosure. For this purpose, this article proposes DSSE for data deduplication and conjunctive queries (DSSE-DC), and constructs a concrete DSSE-DC scheme. Our scheme uses symmetric encryption with homomorphic addition and bitmap index to develop a secure and reliable search architecture, and updates through modular addition. Meanwhile, we add a deduplication mechanism to realize data deduplication which avoids the waste of cloud storage resources. Furthermore, we introduce the idea of inner product matching to achieve efficient conjunctive queries. The adaptive security of the DSSE-DC scheme is proved in the random oracle model. While our scheme satisfies forward and backward privacy. In comparison to the existing DSSE schemes for conjunctive queries, our scheme has advantage in update and search performances, which is applicable to IoT applications like intelligent logistics.
引用
收藏
页码:17408 / 17423
页数:16
相关论文
共 53 条
  • [31] Lightweight Public Key Authenticated Encryption With Keyword Search Against Adaptively-Chosen-Targets Adversaries for Mobile Devices
    Lu, Yang
    Li, Jiguo
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2022, 21 (12) : 4397 - 4409
  • [32] Pairing-Free Certificate-Based Searchable Encryption Supporting Privacy-Preserving Keyword Search Function for IIoTs
    Lu, Yang
    Li, Jiguo
    Wang, Fen
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (04) : 2696 - 2706
  • [33] Privacy-Preserving Distributed Data Access Control for CloudIoT
    Nasiraee, Hassan
    Ashouri-Talouki, Maede
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (04) : 2476 - 2487
  • [34] Keyword search over encrypted cloud data based on blockchain in smart medical applications
    Niu, Shufen
    Song, Mi
    Fang, Lizhi
    Yu, Fei
    Han, Song
    Wang, Caifen
    [J]. COMPUTER COMMUNICATIONS, 2022, 192 : 33 - 47
  • [35] Park DJ, 2005, LECT NOTES COMPUT SC, V3325, P73
  • [36] Forward and Backward Private Conjunctive Searchable Symmetric Encryption
    Patranabis, Sikhar
    Mukhopadhyay, Debdeep
    [J]. 28TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2021), 2021,
  • [37] Popa RA, 2011, SOSP 11: PROCEEDINGS OF THE TWENTY-THIRD ACM SYMPOSIUM ON OPERATING SYSTEMS PRINCIPLES, P85
  • [38] Achieve Efficient and Verifiable Conjunctive and Fuzzy Queries over Encrypted Data in Cloud
    Shao, Jun
    Lu, Rongxing
    Guan, Yunguo
    Wei, Guiyi
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (01) : 124 - 137
  • [39] Song DXD, 2000, P IEEE S SECUR PRIV, P44, DOI 10.1109/SECPRI.2000.848445
  • [40] SAP-SSE: Protecting Search Patterns and Access Patterns in Searchable Symmetric Encryption
    Song, Qiyang
    Liu, Zhuotao
    Cao, Jiahao
    Sun, Kun
    Li, Qi
    Wang, Cong
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 1795 - 1809