Authenticated Ranked Keyword Search over Encrypted Data with Strong Privacy Guarantee

  • Conference paper
  • First Online:
Database Systems for Advanced Applications (DASFAA 2023)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13943))

Included in the following conference series:

  • 2093 Accesses

Abstract

In the past decades, with the development of cloud computing, ranked keyword search, which devotes to find the most relevant results, has been extensively studied in outsourcing domain. However, due to a mass of sensitive information containing in the outsourced data, the issue of privacy has become the main brunt. Existing works primarily resort to searchable encryption to protect the privacy but do not consider the access pattern and search pattern, which can be used to infer the privacy information. Moreover, since the cloud server may be malicious, result integrity also needs to be considered. Therefore, in this paper, we study the problem of secure and authenticated ranked keyword search, called SARKS. Specifically, we first propose a framework that integrates d-differential privacy, erasure coding, and oblivious traverse to achieve access pattern and search pattern protection and meanwhile propose a scheme based on merkle hash tree to realize the correctness and completeness of the query results. To accelerate the performance, we further propose an improved scheme by adopting clustering method. Finally, the formal security analysis is conducted and the empirical evaluation over the real-world dataset has demonstrated the feasibility and practicability of our proposed schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
EUR 29.95
Price includes VAT (Germany)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 117.69
Price includes VAT (Germany)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR 149.79
Price includes VAT (Germany)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    https://www.cs.cmu.edu/enron/.

References

  1. Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 25(1), 222–233 (2014)

    Article  Google Scholar 

  2. Chen, G., Lai, T., Reiter, M.K., Zhang, Y.: Differentially private access patterns for searchable symmetric encryption, pp. 810–818. IEEE (2018)

    Google Scholar 

  3. Cui, N., Li, J., Yang, X., Wang, B., Reynolds, M., **ang, Y.: When geo-text meets security: privacy-preserving Boolean spatial keyword queries, pp. 1046–1057. IEEE (2019)

    Google Scholar 

  4. Cui, N., Yang, X., Chen, Y., Li, J., Wang, B., Min, G.: Secure Boolean spatial keyword query with lightweight access control in cloud environments. IEEE Internet Things J. 9(12), 9503–9514 (2022)

    Article  Google Scholar 

  5. Dai, H., Yang, M., Yang, T.G., ** inverted index based multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Sustain. Comput. 7(3), 561–578 (2022)

    Article  Google Scholar 

  6. Ding, X., Liu, P., **, H.: Privacy-preserving multi-keyword top-\$k similarity search over encrypted data. IEEE Trans. Dependable Secur. Comput. 16(2), 344–357 (2019)

    Article  Google Scholar 

  7. Ge, X., et al.: Towards achieving keyword search over dynamic encrypted cloud data with symmetric-key based verification. IEEE Trans. Dependable Secur. Comput. 18(1), 490–504 (2021)

    Article  Google Scholar 

  8. Li, F., Ma, J., Miao, Y., Jiang, Q., Liu, X., Choo, K.K.R.: Verifiable and dynamic multi-keyword search over encrypted cloud data using bitmap. IEEE Trans. Cloud Comput. 1 (2021). https://doi.org/10.1109/TCC.2021.3093304

  9. Li, J., Ma, J., Miao, Y., Yang, R., Liu, X., Choo, K.R.: Practical multi-keyword ranked search with access control over encrypted cloud data. IEEE Trans. Cloud Comput. 10(3), 2005–2019 (2022)

    Article  Google Scholar 

  10. Liu, G., Yang, G., Bai, S., Wang, H., **ang, Y.: FASE: a fast and accurate privacy-preserving multi-keyword top-k retrieval scheme over encrypted cloud data. IEEE Trans. Serv. Comput. 15(4), 1855–1867 (2022)

    Article  Google Scholar 

  11. Liu, Q., Tian, Y., Wu, J., Peng, T., Wang, G.: Enabling verifiable and dynamic ranked search over outsourced data. IEEE Trans. Serv. Comput. 15(1), 69–82 (2022)

    Article  Google Scholar 

  12. Miao, Y., Zheng, W., Jia, X., Liu, X., Choo, K.K.R., Deng, R.: Ranked keyword search over encrypted cloud data through machine learning method. IEEE Trans. Serv. Comput. 1 (2022). https://doi.org/10.1109/TSC.2021.3140098

  13. Wan, Z., Deng, R.H.: VPSearch: achieving verifiability for privacy-preserving multi-keyword search over encrypted cloud data. IEEE Trans. Dependable Secur. Comput. 15(6), 1083–1095 (2018)

    Article  Google Scholar 

  14. Wang, C., Cao, N., Ren, K., Lou, W.: Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Trans. Parallel Distrib. Syst. 23(8), 1467–1479 (2012)

    Article  Google Scholar 

  15. Wong, W.K., Cheung, D.W., Kao, B., Mamoulis, N.: Secure KNN computation on encrypted databases, pp. 139–152. ACM (2009)

    Google Scholar 

  16. **a, Z., Wang, X., Sun, X., Wang, Q.: A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 27(2), 340–352 (2016)

    Article  Google Scholar 

  17. Zheng, Y., Lu, R., Guan, Y., Shao, J., Zhu, H.: Achieving efficient and privacy-preserving set containment search over encrypted data. IEEE Trans. Serv. Comput. 15(5), 2604–2618 (2022)

    Article  Google Scholar 

Download references

Acknowledgement

This work was supported by National Natural Science Foundation of China (62011530-046, U1936220, 62002054), Industry-university-research Innovation Fund for Chinese Universities (2020ITA03009), Ten Thousand Talent Program (ZX20200035), and Excellent Youth Foundation of Anhui Scientific Committee (2108085J31).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ningning Cui .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Cui, N., Deng, Z., Li, M., Ma, Y., Cui, J., Zhong, H. (2023). Authenticated Ranked Keyword Search over Encrypted Data with Strong Privacy Guarantee. In: Wang, X., et al. Database Systems for Advanced Applications. DASFAA 2023. Lecture Notes in Computer Science, vol 13943. Springer, Cham. https://doi.org/10.1007/978-3-031-30637-2_43

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-30637-2_43

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-30636-5

  • Online ISBN: 978-3-031-30637-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

Navigation