Dynamic multi-client searchable symmetric encryption with support for boolean queries

被引:30
作者
Du, Leilei [1 ]
Li, Kenli [1 ]
Liu, Qin [1 ,3 ]
Wu, Zhiqiang [1 ]
Zhang, Shaobo [2 ]
机构
[1] Hunan Univ, Coll Comp Sci & Elect Engn, Changsha 410082, Hunan, Peoples R China
[2] Hunan Univ Sci & Technol, Sch Comp Sci & Engn, Xiangtan 411201, Hunan, Peoples R China
[3] Nanjing Univ, State Key Lab Novel Software Technol, Nanjing 210093, Jiangsu, Peoples R China
关键词
Cloud computing; Multi-client searchable symmetric encryption; Boolean query; Non-interactivity; Dynamic; CONJUNCTIVE KEYWORD SEARCH; EFFICIENT; SECURITY;
D O I
10.1016/j.ins.2019.08.014
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid growth of cloud computing, an increasing amount of data is being outsourced to cloud servers, in the meantime, how to search data securely and efficiently has got an unprecedented concern. Searchable symmetric encryption (SSE) that enables keyword-based searches over encrypted data provides an efficient way to this problem. However, the majority of existing SSE schemes focus on single keyword searches in the single-client setting, which limits their wide application in cloud computing. In this paper, we propose a Dynamic Multi-client SSE (DMSSE) scheme with support for boolean queries, by incorporating a client's authorization information into search tokens and indexes. Our scheme allows a data owner to authorize multiple clients to perform boolean queries over an encrypted database, and limits a client's search ability to legitimate keywords. Compared with existing MSSE schemes, our DMSSE scheme has the following merits: 1) Non-interactivity. After the grant of search permission, the clients can perform queries on their own without the help of the data owner. 2) Dynamic. The data owner can efficiently update a client's search permission without affecting other clients. Experimental evaluations conducted on a real data set demonstrate that our DMSSE scheme is practical for use in a large-scale encrypted database. (C) 2019 Elsevier Inc. All rights reserved.
引用
收藏
页码:234 / 257
页数:24
相关论文
共 37 条
[1]  
[Anonymous], 2013, P ACM SIGSAC C COMP, DOI 10.1145/2508859.2516730
[2]  
Ballard L, 2005, LECT NOTES COMPUT SC, V3783, P414
[3]  
Bao F., 2008, P ISPEC
[4]   A concrete security treatment of symmetric encryption [J].
Bellare, M ;
Desai, A ;
Jokipii, E ;
Rogaway, P .
38TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 1997, :394-403
[5]  
Boyen X, 2008, LECT NOTES COMPUT SC, V5209, P39, DOI 10.1007/978-3-540-85538-5_3
[6]  
Cash D, 2013, LECT NOTES COMPUT SC, V8042, P353, DOI 10.1007/978-3-642-40041-4_20
[7]  
Curtain RF, 2006, LECT NOTES CONTR INF, V329, P79, DOI 10.1007/11664550_5
[8]   Rich Queries on Encrypted Data: Beyond Exact Matches [J].
Faber, Sky ;
Jarecki, Stanislaw ;
Krawczyk, Hugo ;
Quan Nguyen ;
Rosu, Marcel ;
Steiner, Michael .
COMPUTER SECURITY - ESORICS 2015, PT II, 2015, 9327 :123-145
[9]   Malicious-Client Security in Blind Seer: A Scalable Private DBMS [J].
Fisch, Ben A. ;
Binh Vo ;
Krell, Fernando ;
Kumarasubramanian, Abishek ;
Kolesnikov, Vladimir ;
Malkin, Tal ;
Bellovin, Steven M. .
2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015, 2015, :395-410
[10]  
Goh E.-J., 2003, Report 2003/216