Privacy-Preserving Multi-Keyword Searchable Encryption for Distributed Systems
As cloud storage has been widely adopted in various applications, how to protect data privacy while allowing efficient data search and retrieval in a distributed environment remains a challenging research problem. Existing searchable encryption schemes are still inadequate on desired functionality a...
Saved in:
Published in | IEEE transactions on parallel and distributed systems Vol. 32; no. 3; pp. 561 - 574 |
---|---|
Main Authors | , , , , , |
Format | Journal Article |
Language | English |
Published |
New York
IEEE
01.03.2021
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | As cloud storage has been widely adopted in various applications, how to protect data privacy while allowing efficient data search and retrieval in a distributed environment remains a challenging research problem. Existing searchable encryption schemes are still inadequate on desired functionality and security/privacy perspectives. Specifically, supporting multi-keyword search under the multi-user setting, hiding search pattern and access pattern, and resisting keyword guessing attacks (KGA) are the most challenging tasks. In this article, we present a new searchable encryption scheme that addresses the above problems simultaneously, which makes it practical to be adopted in distributed systems. It not only enables multi-keyword search over encrypted data under a multi-writer/multi-reader setting but also guarantees the data and search pattern privacy. To prevent KGA, our scheme adopts a multi-server architecture, which accelerates search response, shares the workload, and lowers the key leakage risk by allowing only authorized servers to jointly test whether a search token matches a stored ciphertext. A novel subset decision mechanism is also designed as the core technique underlying our scheme and can be further used in applications other than keyword search. Finally, we prove the security and evaluate the computational and communication efficiency of our scheme to demonstrate its practicality. |
---|---|
AbstractList | As cloud storage has been widely adopted in various applications, how to protect data privacy while allowing efficient data search and retrieval in a distributed environment remains a challenging research problem. Existing searchable encryption schemes are still inadequate on desired functionality and security/privacy perspectives. Specifically, supporting multi-keyword search under the multi-user setting, hiding search pattern and access pattern, and resisting keyword guessing attacks (KGA) are the most challenging tasks. In this article, we present a new searchable encryption scheme that addresses the above problems simultaneously, which makes it practical to be adopted in distributed systems. It not only enables multi-keyword search over encrypted data under a multi-writer/multi-reader setting but also guarantees the data and search pattern privacy. To prevent KGA, our scheme adopts a multi-server architecture, which accelerates search response, shares the workload, and lowers the key leakage risk by allowing only authorized servers to jointly test whether a search token matches a stored ciphertext. A novel subset decision mechanism is also designed as the core technique underlying our scheme and can be further used in applications other than keyword search. Finally, we prove the security and evaluate the computational and communication efficiency of our scheme to demonstrate its practicality. |
Author | Liu, Xueqiao Susilo, Willy Shen, Jian Liu, Ximeng Yang, Guomin Tonien, Joseph |
Author_xml | – sequence: 1 givenname: Xueqiao orcidid: 0000-0002-4430-8408 surname: Liu fullname: Liu, Xueqiao email: xl691@uow.edu.au organization: Institute of Cybersecurity and Cryptology, University of Wollongong, Wollongong, NSW, Australia – sequence: 2 givenname: Guomin orcidid: 0000-0002-4949-7738 surname: Yang fullname: Yang, Guomin email: gyang@uow.edu.au organization: Institute of Cybersecurity and Cryptology, University of Wollongong, Wollongong, NSW, Australia – sequence: 3 givenname: Willy orcidid: 0000-0002-1562-5105 surname: Susilo fullname: Susilo, Willy email: wsusilo@uow.edu.au organization: Institute of Cybersecurity and Cryptology, University of Wollongong, Wollongong, NSW, Australia – sequence: 4 givenname: Joseph orcidid: 0000-0003-2846-1071 surname: Tonien fullname: Tonien, Joseph email: dong@uow.edu.au organization: Institute of Cybersecurity and Cryptology, University of Wollongong, Wollongong, NSW, Australia – sequence: 5 givenname: Ximeng orcidid: 0000-0002-4238-3295 surname: Liu fullname: Liu, Ximeng email: snbnix@gmail.com organization: College of Mathematics and Computer Science, Fuzhou University, Fuzhou, China – sequence: 6 givenname: Jian orcidid: 0000-0003-0519-9058 surname: Shen fullname: Shen, Jian email: s_shenjian@126.com organization: School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing, China |
BookMark | eNp9kD1PwzAQQC1UJErhByCWSMwpZ8ep7RG15UMUqNQyR05yAVdpUmynKP-eRK0YGJh8w3t31jsng6qukJArCmNKQd2ul7PVmAGDcQRMAEQnZEjjWIaMymjQzcDjUDGqzsi5cxsAymPgQ_K6tGavszZcWnRo96b6CF6a0pvwGdvv2ubBCrXNPnVaYjCvMtvuvKmroKhtMDPOW5M2HjuqdR637oKcFrp0eHl8R-T9fr6ePoaLt4en6d0izJiKfEgF5nzCEVWaFwVIBbnGFFIqCjFJixQVlzlKCh2lIZMIk1jLXHOOOdVCRiNyc9i7s_VXg84nm7qxVXcyYTymUkmIe0ocqMzWzlksksx43f_fW23KhELSx0v6eEkfLznG60z6x9xZs9W2_de5PjgGEX95xUDIWEQ_Eph9_w |
CODEN | ITDSEO |
CitedBy_id | crossref_primary_10_1109_ACCESS_2021_3125729 crossref_primary_10_1109_TIFS_2023_3301734 crossref_primary_10_1109_TKDE_2023_3283020 crossref_primary_10_1109_TSC_2024_3489432 crossref_primary_10_1109_JIOT_2023_3275386 crossref_primary_10_1109_TCC_2021_3071304 crossref_primary_10_1109_JSYST_2021_3103909 crossref_primary_10_1360_SSPMA_2023_0187 crossref_primary_10_1016_j_sysarc_2024_103103 crossref_primary_10_1109_TNSE_2022_3187861 crossref_primary_10_1109_JIOT_2022_3199200 crossref_primary_10_1109_TCC_2023_3242140 crossref_primary_10_1109_TCE_2023_3269045 crossref_primary_10_1109_ACCESS_2024_3400611 crossref_primary_10_1109_TBDATA_2022_3205668 crossref_primary_10_1109_ACCESS_2022_3151429 crossref_primary_10_1016_j_pmcj_2024_101952 crossref_primary_10_1109_JIOT_2021_3126468 crossref_primary_10_1109_JIOT_2023_3262795 crossref_primary_10_1145_3582270 crossref_primary_10_1109_TIFS_2025_3540606 crossref_primary_10_3390_s23020914 crossref_primary_10_1109_JIOT_2022_3204855 crossref_primary_10_1109_TSC_2022_3207750 crossref_primary_10_1016_j_jisa_2023_103471 crossref_primary_10_1109_TCC_2021_3134015 crossref_primary_10_3390_fi15060197 crossref_primary_10_1007_s11042_024_18566_5 crossref_primary_10_1016_j_dcan_2024_07_003 crossref_primary_10_1016_j_sysarc_2023_102839 crossref_primary_10_1109_JIOT_2022_3199937 crossref_primary_10_1109_TGRS_2023_3322112 crossref_primary_10_1016_j_sysarc_2023_102856 crossref_primary_10_1109_TSC_2024_3411450 crossref_primary_10_1109_TCC_2024_3430237 crossref_primary_10_1109_TIFS_2024_3430056 crossref_primary_10_1109_ACCESS_2024_3515042 crossref_primary_10_1541_ieejeiss_144_1011 crossref_primary_10_1016_j_cose_2021_102249 crossref_primary_10_1109_TSUSC_2023_3257223 crossref_primary_10_1007_s10586_022_03755_4 crossref_primary_10_1016_j_future_2023_03_002 crossref_primary_10_1109_TNSM_2021_3123475 crossref_primary_10_1109_TIFS_2023_3275750 crossref_primary_10_1016_j_compeleceng_2024_109367 crossref_primary_10_26599_TST_2021_9010070 crossref_primary_10_1007_s12652_022_03889_8 crossref_primary_10_1016_j_csi_2021_103603 |
Cites_doi | 10.1145/2484313.2484386 10.3233/JCS-2011-0426 10.1145/233551.233553 10.1007/978-3-642-40041-4_20 10.1145/3321705.3329814 10.1109/TIFS.2016.2599293 10.1007/978-3-540-40061-5_3 10.1016/j.jnca.2010.07.007 10.1007/11844662_6 10.1109/TDSC.2018.2876831 10.1109/TIFS.2016.2573770 10.1007/978-3-540-89641-8_13 10.1016/j.ins.2017.03.038 10.1109/ACCESS.2017.2786026 10.1007/978-3-319-45744-4_8 10.1007/978-3-642-33272-2_12 10.1007/978-3-642-32946-3_21 10.1145/2382196.2382298 10.1016/j.jcss.2017.06.001 10.1007/978-3-540-69295-9_10 10.1109/TC.2012.215 10.1007/3-540-45682-1_21 10.1007/978-3-540-24676-3_30 |
ContentType | Journal Article |
Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021 |
Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021 |
DBID | 97E RIA RIE AAYXX CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D |
DOI | 10.1109/TPDS.2020.3027003 |
DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Technology Research Database |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Computer Science |
EISSN | 1558-2183 |
EndPage | 574 |
ExternalDocumentID | 10_1109_TPDS_2020_3027003 9207857 |
Genre | orig-research |
GrantInformation_xml | – fundername: National Natural Science Foundation of China grantid: U1804263; 62072109 funderid: 10.13039/501100001809 – fundername: National Natural Science Foundation of China grantid: 61922045; U1836115; 61672295 funderid: 10.13039/501100001809 |
GroupedDBID | --Z -~X .DC 0R~ 29I 4.4 5GY 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABQJQ ABVLG ACGFO ACIWK AENEX AGQYO AHBIQ AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ASUFR ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 EBS EJD HZ~ IEDLZ IFIPE IPLJI JAVBF LAI M43 MS~ O9- OCL P2P PQQKQ RIA RIE RNS TN5 TWZ UHB AAYXX CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D |
ID | FETCH-LOGICAL-c293t-17ed464ee9bdff0890daeb0b17f76bfbe948de810d46a0c8e065a8da44ed1a783 |
IEDL.DBID | RIE |
ISSN | 1045-9219 |
IngestDate | Mon Jun 30 02:37:58 EDT 2025 Thu Apr 24 23:02:07 EDT 2025 Tue Jul 01 03:58:39 EDT 2025 Wed Aug 27 02:30:35 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 3 |
Language | English |
License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html https://doi.org/10.15223/policy-029 https://doi.org/10.15223/policy-037 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c293t-17ed464ee9bdff0890daeb0b17f76bfbe948de810d46a0c8e065a8da44ed1a783 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0002-1562-5105 0000-0002-4238-3295 0000-0003-0519-9058 0000-0002-4430-8408 0000-0002-4949-7738 0000-0003-2846-1071 |
PQID | 2451898058 |
PQPubID | 85437 |
PageCount | 14 |
ParticipantIDs | crossref_citationtrail_10_1109_TPDS_2020_3027003 ieee_primary_9207857 proquest_journals_2451898058 crossref_primary_10_1109_TPDS_2020_3027003 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2021-03-01 |
PublicationDateYYYYMMDD | 2021-03-01 |
PublicationDate_xml | – month: 03 year: 2021 text: 2021-03-01 day: 01 |
PublicationDecade | 2020 |
PublicationPlace | New York |
PublicationPlace_xml | – name: New York |
PublicationTitle | IEEE transactions on parallel and distributed systems |
PublicationTitleAbbrev | TPDS |
PublicationYear | 2021 |
Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref13 ref12 ref15 ref30 ref11 gentry (ref28) 2009; 20 ref10 ref2 ref17 ref16 ref19 ref18 chen (ref22) 2016; 11 fiat (ref14) 1993 ref24 ref23 ref26 ref25 ref20 ref21 (ref1) 2018 kamara (ref29) 2011; 2011 ref27 ref8 song (ref5) 2000 ref7 ref9 ref4 ref3 goh (ref6) 2003; 2003 |
References_xml | – year: 2018 ident: ref1 – start-page: 480 year: 1993 ident: ref14 article-title: Broadcast encryption publication-title: Proc Annu Int Cryptol Conf – ident: ref24 doi: 10.1145/2484313.2484386 – ident: ref7 doi: 10.3233/JCS-2011-0426 – ident: ref23 doi: 10.1145/233551.233553 – ident: ref15 doi: 10.1007/978-3-642-40041-4_20 – ident: ref17 doi: 10.1145/3321705.3329814 – volume: 20 year: 2009 ident: ref28 publication-title: A Fully Homomorphic Encryption Scheme – ident: ref21 doi: 10.1109/TIFS.2016.2599293 – ident: ref26 doi: 10.1007/978-3-540-40061-5_3 – ident: ref10 doi: 10.1016/j.jnca.2010.07.007 – ident: ref3 doi: 10.1007/11844662_6 – ident: ref13 doi: 10.1109/TDSC.2018.2876831 – ident: ref25 doi: 10.1109/TIFS.2016.2573770 – ident: ref9 doi: 10.1007/978-3-540-89641-8_13 – start-page: 44 year: 2000 ident: ref5 article-title: Practical techniques for searches on encrypted data publication-title: Proc IEEE Symp Security Privacy – ident: ref4 doi: 10.1016/j.ins.2017.03.038 – volume: 11 start-page: 789 year: 2016 ident: ref22 article-title: Dual-server public-key encryption with keyword search for secure cloud storage publication-title: IEEE Trans Inf Forensics Security doi: 10.1109/TIFS.2016.2599293 – ident: ref12 doi: 10.1109/ACCESS.2017.2786026 – volume: 2003 year: 2003 ident: ref6 article-title: Secure indexes publication-title: IACR Cryptology ePrint – ident: ref16 doi: 10.1007/978-3-319-45744-4_8 – ident: ref30 doi: 10.1007/978-3-642-33272-2_12 – ident: ref8 doi: 10.1007/978-3-642-32946-3_21 – ident: ref20 doi: 10.1145/2382196.2382298 – ident: ref11 doi: 10.1016/j.jcss.2017.06.001 – ident: ref18 doi: 10.1007/978-3-540-69295-9_10 – volume: 2011 year: 2011 ident: ref29 article-title: Outsourcing multi-party computation publication-title: IACR Cryptology ePrint – ident: ref19 doi: 10.1109/TC.2012.215 – ident: ref27 doi: 10.1007/3-540-45682-1_21 – ident: ref2 doi: 10.1007/978-3-540-24676-3_30 |
SSID | ssj0014504 |
Score | 2.5467644 |
Snippet | As cloud storage has been widely adopted in various applications, how to protect data privacy while allowing efficient data search and retrieval in a... |
SourceID | proquest crossref ieee |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 561 |
SubjectTerms | access pattern Algorithms Cloud computing Computer architecture Computer networks Data privacy Data search Data storage Encryption Keyword search Keywords multi-keyword search multi-user access Privacy Public key search pattern Searchable encryption Servers |
Title | Privacy-Preserving Multi-Keyword Searchable Encryption for Distributed Systems |
URI | https://ieeexplore.ieee.org/document/9207857 https://www.proquest.com/docview/2451898058 |
Volume | 32 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT9wwEB4Bp_ZQYGnV5aUceqrqxcnasX1ELAiBQEgFiVvkx6SqigJadkHLr2fsZFelVIhbDmPL0mfPI_PNDMA3spluWLiSlWFomVClZZa8cualQGcKxUMR653PzsvjK3FyLa-X4MeiFgYRE_kMB_Ez5fLDrZ_GX2V7piCDJtUyLFPg1tZqLTIGQqZRgRRdSGboGXYZzJybvcuL0U-KBAsKUHnMsw5f2KA0VOWVJk7m5WgVzuYHa1klfwbTiRv4p396Nr735GvwqfMzs_32YqzDEjY9WJ3PcMi6J92Dj381JNyA84vx7wfrZywyM6IWaX5lqUSXneLskeLUrKUnx3qr7LDx41nSOBl5vtkotuCN07OQpNo-6J_h6ujw8uCYdRMXmCezP2G5wiBKgWhcqGuuDQ8WHXe5qlXpaodG6IA65yRluddIDozVwQqBIbdKD7_ASnPb4FfIjNfWSFcLH6RQKnfGCaM1KVhB-9W2D3yOQeW7duRxKsZNlcISbqoIWxVhqzrY-vB9seSu7cXxlvBGhGEh2CHQh-050FX3Wu-rQshcG82l3vz_qi34UEQuS-KebcPKZDzFHXJGJm433cJn3NrbxQ |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LbxMxEB6VcoAeKLSghhbYAyeEU-_GXtvHqg8F2kSVSKXeVn7MVgi0rdKkVfj1jL2bqDyEuO1hbFn67HnsfDMD8J5sphsUrmRlGFgmVGmZJa-ceSnQmULxUMR659G4HF6Iz5fycg0-rmphEDGRz7AfP1MuP1z7efxVtm8KMmhSPYLHZPdl0VZrrXIGQqZhgRRfSGboIXY5zJyb_cn50ReKBQsKUXnMtA5-sUJprMofujgZmJNNGC2P1vJKvvXnM9f3P37r2vi_Z38OzzpPMztor8YLWMNmCzaXUxyy7lFvwcaDloTbMD6ffr2zfsEiNyPqkeYqS0W67BQX9xSpZi1BOVZcZceNny6SzsnI982OYhPeOD8LSarthP4SLk6OJ4dD1s1cYJ4M_4zlCoMoBaJxoa65NjxYdNzlqlalqx0aoQPqnJOU5V4juTBWBysEhtwqPXgF6811gzuQGa-tka4WPkihVO6ME0ZrUrGC9qttD_gSg8p3DcnjXIzvVQpMuKkibFWErepg68GH1ZKbthvHv4S3IwwrwQ6BHuwtga6693pbFULm2mgu9eu_r3oHT4aT0Vl19ml8ugtPi8hsSUy0PVifTef4hlyTmXubbuRPfkHfDw |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Privacy-Preserving+Multi-Keyword+Searchable+Encryption+for+Distributed+Systems&rft.jtitle=IEEE+transactions+on+parallel+and+distributed+systems&rft.au=Liu%2C+Xueqiao&rft.au=Yang%2C+Guomin&rft.au=Susilo%2C+Willy&rft.au=Tonien%2C+Joseph&rft.date=2021-03-01&rft.pub=The+Institute+of+Electrical+and+Electronics+Engineers%2C+Inc.+%28IEEE%29&rft.issn=1045-9219&rft.eissn=1558-2183&rft.volume=32&rft.issue=3&rft.spage=561&rft_id=info:doi/10.1109%2FTPDS.2020.3027003&rft.externalDBID=NO_FULL_TEXT |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1045-9219&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1045-9219&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1045-9219&client=summon |