ESVSSE: Enabling Efficient, Secure, Verifiable Searchable Symmetric Encryption

被引:22
作者
Shi, Zhenkui [1 ]
Fu, Xuemei [1 ]
Li, Xianxian [1 ]
Zhu, Kai [2 ]
机构
[1] Guangxi Normal Univ, Sch Comp Sci & Informat Engn, Guangxi Key Lab Multisource Informat Min & Secur, Guilin 541004, Peoples R China
[2] Guangxi Normal Univ, Guilin 541004, Peoples R China
基金
中国国家自然科学基金;
关键词
Data outsourcing; searchable encryption; SSE; verification; counting bloom filter; SUPPORT;
D O I
10.1109/TKDE.2020.3025348
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Symmetric Searchable Encryption(SSE) is deemed to tackle the privacy issue as well as the operability and confidentiality in data outsourcing. However, most SSE schemes assume that the cloud is honest but curious. This assumption is not always applicable. And even if some schemes supported verification, integrity or freshness checking in a malicious cloud, but the performance and security functionalities are not fully exploited. In this paper, we propose an efficient SSE scheme based on B+-Tree and Counting Bloom Filter (CBF) which supports secure verification, dynamic updating, and multi-user queries. Comparing with the previous state of the arts, we design the new data structure CBF to support dynamic updating and boost verification. We also leverage the timestamp mechanism in the scheme to prevent the malicious cloud from launching a replay attack. The new designed CBF is like a front-engine to save user's cost for query and verification. And it can achieve more efficient query and verification with negligible false positive when there is no value matching the queried keyword. The CBF supports efficient dynamic updating by combining Bloom Filter with a one-dimensional array that provides the counting capability. Furthermore, we design the authenticator for CBF. We adopt B+-Tree for it is widely used in many database engines and file systems. We also give a brief security proof of our scheme. Then we provide a detailed performance analysis. Finally, we evaluate our scheme through comprehensive experiments. The results are consistent with our analysis and show that our scheme is secure, and more efficient compared with the previous schemes with the same functionalities. The average performance can be improved by about 20 percent for both the cloud servers and users when the missing rate of the searching keywords is 20 percent. And the higher the missing rate is, the more the performance can be improved.
引用
收藏
页码:3241 / 3254
页数:14
相关论文
共 42 条
[1]  
Adya A, 2002, USENIX ASSOCIATION PROCEEDINGS OF THE FIFTH SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, P1
[2]  
Ancin H., 2016, U.S. Patent, Patent No. 9251114
[3]  
[Anonymous], 2012, ACM C COMPUTER COMMU
[4]  
[Anonymous], 2015, PROC ACMIEEE C SUPER
[5]   Second Graders as Spellers: What Types of Errors Are They Making? [J].
Arndt, Elissa J. ;
Foorman, Barbara R. .
ASSESSMENT FOR EFFECTIVE INTERVENTION, 2010, 36 (01) :57-67
[6]  
Bellovin W. R., 2004, IACR CRYPTOL EPRINT, V2004, P22
[7]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[8]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[9]   Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation [J].
Cash, David ;
Jaeger, Joseph ;
Jarecki, Stanislaw ;
Jutla, Charanjit ;
Krawczyk, Hugo ;
Rosu, Marcel-Catalin ;
Steine, Michael .
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
[10]  
Cash D, 2013, LECT NOTES COMPUT SC, V8042, P353, DOI 10.1007/978-3-642-40041-4_20