Privacy-Preserving Multi-Keyword Searchable Encryption for Distributed Systems

As cloud storage has been widely adopted in various applications, how to protect data privacy while allowing efficient data search and retrieval in a distributed environment remains a challenging research problem. Existing searchable encryption schemes are still inadequate on desired functionality a...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on parallel and distributed systems Vol. 32; no. 3; pp. 561 - 574
Main Authors Liu, Xueqiao, Yang, Guomin, Susilo, Willy, Tonien, Joseph, Liu, Ximeng, Shen, Jian
Format Journal Article
LanguageEnglish
Published New York IEEE 01.03.2021
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text

Cover

Loading…
Abstract As cloud storage has been widely adopted in various applications, how to protect data privacy while allowing efficient data search and retrieval in a distributed environment remains a challenging research problem. Existing searchable encryption schemes are still inadequate on desired functionality and security/privacy perspectives. Specifically, supporting multi-keyword search under the multi-user setting, hiding search pattern and access pattern, and resisting keyword guessing attacks (KGA) are the most challenging tasks. In this article, we present a new searchable encryption scheme that addresses the above problems simultaneously, which makes it practical to be adopted in distributed systems. It not only enables multi-keyword search over encrypted data under a multi-writer/multi-reader setting but also guarantees the data and search pattern privacy. To prevent KGA, our scheme adopts a multi-server architecture, which accelerates search response, shares the workload, and lowers the key leakage risk by allowing only authorized servers to jointly test whether a search token matches a stored ciphertext. A novel subset decision mechanism is also designed as the core technique underlying our scheme and can be further used in applications other than keyword search. Finally, we prove the security and evaluate the computational and communication efficiency of our scheme to demonstrate its practicality.
AbstractList As cloud storage has been widely adopted in various applications, how to protect data privacy while allowing efficient data search and retrieval in a distributed environment remains a challenging research problem. Existing searchable encryption schemes are still inadequate on desired functionality and security/privacy perspectives. Specifically, supporting multi-keyword search under the multi-user setting, hiding search pattern and access pattern, and resisting keyword guessing attacks (KGA) are the most challenging tasks. In this article, we present a new searchable encryption scheme that addresses the above problems simultaneously, which makes it practical to be adopted in distributed systems. It not only enables multi-keyword search over encrypted data under a multi-writer/multi-reader setting but also guarantees the data and search pattern privacy. To prevent KGA, our scheme adopts a multi-server architecture, which accelerates search response, shares the workload, and lowers the key leakage risk by allowing only authorized servers to jointly test whether a search token matches a stored ciphertext. A novel subset decision mechanism is also designed as the core technique underlying our scheme and can be further used in applications other than keyword search. Finally, we prove the security and evaluate the computational and communication efficiency of our scheme to demonstrate its practicality.
Author Liu, Xueqiao
Susilo, Willy
Shen, Jian
Liu, Ximeng
Yang, Guomin
Tonien, Joseph
Author_xml – sequence: 1
  givenname: Xueqiao
  orcidid: 0000-0002-4430-8408
  surname: Liu
  fullname: Liu, Xueqiao
  email: xl691@uow.edu.au
  organization: Institute of Cybersecurity and Cryptology, University of Wollongong, Wollongong, NSW, Australia
– sequence: 2
  givenname: Guomin
  orcidid: 0000-0002-4949-7738
  surname: Yang
  fullname: Yang, Guomin
  email: gyang@uow.edu.au
  organization: Institute of Cybersecurity and Cryptology, University of Wollongong, Wollongong, NSW, Australia
– sequence: 3
  givenname: Willy
  orcidid: 0000-0002-1562-5105
  surname: Susilo
  fullname: Susilo, Willy
  email: wsusilo@uow.edu.au
  organization: Institute of Cybersecurity and Cryptology, University of Wollongong, Wollongong, NSW, Australia
– sequence: 4
  givenname: Joseph
  orcidid: 0000-0003-2846-1071
  surname: Tonien
  fullname: Tonien, Joseph
  email: dong@uow.edu.au
  organization: Institute of Cybersecurity and Cryptology, University of Wollongong, Wollongong, NSW, Australia
– sequence: 5
  givenname: Ximeng
  orcidid: 0000-0002-4238-3295
  surname: Liu
  fullname: Liu, Ximeng
  email: snbnix@gmail.com
  organization: College of Mathematics and Computer Science, Fuzhou University, Fuzhou, China
– sequence: 6
  givenname: Jian
  orcidid: 0000-0003-0519-9058
  surname: Shen
  fullname: Shen, Jian
  email: s_shenjian@126.com
  organization: School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing, China
BookMark eNp9kD1PwzAQQC1UJErhByCWSMwpZ8ep7RG15UMUqNQyR05yAVdpUmynKP-eRK0YGJh8w3t31jsng6qukJArCmNKQd2ul7PVmAGDcQRMAEQnZEjjWIaMymjQzcDjUDGqzsi5cxsAymPgQ_K6tGavszZcWnRo96b6CF6a0pvwGdvv2ubBCrXNPnVaYjCvMtvuvKmroKhtMDPOW5M2HjuqdR637oKcFrp0eHl8R-T9fr6ePoaLt4en6d0izJiKfEgF5nzCEVWaFwVIBbnGFFIqCjFJixQVlzlKCh2lIZMIk1jLXHOOOdVCRiNyc9i7s_VXg84nm7qxVXcyYTymUkmIe0ocqMzWzlksksx43f_fW23KhELSx0v6eEkfLznG60z6x9xZs9W2_de5PjgGEX95xUDIWEQ_Eph9_w
CODEN ITDSEO
CitedBy_id crossref_primary_10_1109_ACCESS_2021_3125729
crossref_primary_10_1109_TIFS_2023_3301734
crossref_primary_10_1109_TKDE_2023_3283020
crossref_primary_10_1109_TSC_2024_3489432
crossref_primary_10_1109_JIOT_2023_3275386
crossref_primary_10_1109_TCC_2021_3071304
crossref_primary_10_1109_JSYST_2021_3103909
crossref_primary_10_1360_SSPMA_2023_0187
crossref_primary_10_1016_j_sysarc_2024_103103
crossref_primary_10_1109_TNSE_2022_3187861
crossref_primary_10_1109_JIOT_2022_3199200
crossref_primary_10_1109_TCC_2023_3242140
crossref_primary_10_1109_TCE_2023_3269045
crossref_primary_10_1109_ACCESS_2024_3400611
crossref_primary_10_1109_TBDATA_2022_3205668
crossref_primary_10_1109_ACCESS_2022_3151429
crossref_primary_10_1016_j_pmcj_2024_101952
crossref_primary_10_1109_JIOT_2021_3126468
crossref_primary_10_1109_JIOT_2023_3262795
crossref_primary_10_1145_3582270
crossref_primary_10_1109_TIFS_2025_3540606
crossref_primary_10_3390_s23020914
crossref_primary_10_1109_JIOT_2022_3204855
crossref_primary_10_1109_TSC_2022_3207750
crossref_primary_10_1016_j_jisa_2023_103471
crossref_primary_10_1109_TCC_2021_3134015
crossref_primary_10_3390_fi15060197
crossref_primary_10_1007_s11042_024_18566_5
crossref_primary_10_1016_j_dcan_2024_07_003
crossref_primary_10_1016_j_sysarc_2023_102839
crossref_primary_10_1109_JIOT_2022_3199937
crossref_primary_10_1109_TGRS_2023_3322112
crossref_primary_10_1016_j_sysarc_2023_102856
crossref_primary_10_1109_TSC_2024_3411450
crossref_primary_10_1109_TCC_2024_3430237
crossref_primary_10_1109_TIFS_2024_3430056
crossref_primary_10_1109_ACCESS_2024_3515042
crossref_primary_10_1541_ieejeiss_144_1011
crossref_primary_10_1016_j_cose_2021_102249
crossref_primary_10_1109_TSUSC_2023_3257223
crossref_primary_10_1007_s10586_022_03755_4
crossref_primary_10_1016_j_future_2023_03_002
crossref_primary_10_1109_TNSM_2021_3123475
crossref_primary_10_1109_TIFS_2023_3275750
crossref_primary_10_1016_j_compeleceng_2024_109367
crossref_primary_10_26599_TST_2021_9010070
crossref_primary_10_1007_s12652_022_03889_8
crossref_primary_10_1016_j_csi_2021_103603
Cites_doi 10.1145/2484313.2484386
10.3233/JCS-2011-0426
10.1145/233551.233553
10.1007/978-3-642-40041-4_20
10.1145/3321705.3329814
10.1109/TIFS.2016.2599293
10.1007/978-3-540-40061-5_3
10.1016/j.jnca.2010.07.007
10.1007/11844662_6
10.1109/TDSC.2018.2876831
10.1109/TIFS.2016.2573770
10.1007/978-3-540-89641-8_13
10.1016/j.ins.2017.03.038
10.1109/ACCESS.2017.2786026
10.1007/978-3-319-45744-4_8
10.1007/978-3-642-33272-2_12
10.1007/978-3-642-32946-3_21
10.1145/2382196.2382298
10.1016/j.jcss.2017.06.001
10.1007/978-3-540-69295-9_10
10.1109/TC.2012.215
10.1007/3-540-45682-1_21
10.1007/978-3-540-24676-3_30
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021
DBID 97E
RIA
RIE
AAYXX
CITATION
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
DOI 10.1109/TPDS.2020.3027003
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList
Technology Research Database
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISSN 1558-2183
EndPage 574
ExternalDocumentID 10_1109_TPDS_2020_3027003
9207857
Genre orig-research
GrantInformation_xml – fundername: National Natural Science Foundation of China
  grantid: U1804263; 62072109
  funderid: 10.13039/501100001809
– fundername: National Natural Science Foundation of China
  grantid: 61922045; U1836115; 61672295
  funderid: 10.13039/501100001809
GroupedDBID --Z
-~X
.DC
0R~
29I
4.4
5GY
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABQJQ
ABVLG
ACGFO
ACIWK
AENEX
AGQYO
AHBIQ
AKJIK
AKQYR
ALMA_UNASSIGNED_HOLDINGS
ASUFR
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
DU5
EBS
EJD
HZ~
IEDLZ
IFIPE
IPLJI
JAVBF
LAI
M43
MS~
O9-
OCL
P2P
PQQKQ
RIA
RIE
RNS
TN5
TWZ
UHB
AAYXX
CITATION
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c293t-17ed464ee9bdff0890daeb0b17f76bfbe948de810d46a0c8e065a8da44ed1a783
IEDL.DBID RIE
ISSN 1045-9219
IngestDate Mon Jun 30 02:37:58 EDT 2025
Thu Apr 24 23:02:07 EDT 2025
Tue Jul 01 03:58:39 EDT 2025
Wed Aug 27 02:30:35 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 3
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
https://doi.org/10.15223/policy-029
https://doi.org/10.15223/policy-037
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c293t-17ed464ee9bdff0890daeb0b17f76bfbe948de810d46a0c8e065a8da44ed1a783
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-1562-5105
0000-0002-4238-3295
0000-0003-0519-9058
0000-0002-4430-8408
0000-0002-4949-7738
0000-0003-2846-1071
PQID 2451898058
PQPubID 85437
PageCount 14
ParticipantIDs crossref_citationtrail_10_1109_TPDS_2020_3027003
ieee_primary_9207857
proquest_journals_2451898058
crossref_primary_10_1109_TPDS_2020_3027003
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2021-03-01
PublicationDateYYYYMMDD 2021-03-01
PublicationDate_xml – month: 03
  year: 2021
  text: 2021-03-01
  day: 01
PublicationDecade 2020
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationTitle IEEE transactions on parallel and distributed systems
PublicationTitleAbbrev TPDS
PublicationYear 2021
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref13
ref12
ref15
ref30
ref11
gentry (ref28) 2009; 20
ref10
ref2
ref17
ref16
ref19
ref18
chen (ref22) 2016; 11
fiat (ref14) 1993
ref24
ref23
ref26
ref25
ref20
ref21
(ref1) 2018
kamara (ref29) 2011; 2011
ref27
ref8
song (ref5) 2000
ref7
ref9
ref4
ref3
goh (ref6) 2003; 2003
References_xml – year: 2018
  ident: ref1
– start-page: 480
  year: 1993
  ident: ref14
  article-title: Broadcast encryption
  publication-title: Proc Annu Int Cryptol Conf
– ident: ref24
  doi: 10.1145/2484313.2484386
– ident: ref7
  doi: 10.3233/JCS-2011-0426
– ident: ref23
  doi: 10.1145/233551.233553
– ident: ref15
  doi: 10.1007/978-3-642-40041-4_20
– ident: ref17
  doi: 10.1145/3321705.3329814
– volume: 20
  year: 2009
  ident: ref28
  publication-title: A Fully Homomorphic Encryption Scheme
– ident: ref21
  doi: 10.1109/TIFS.2016.2599293
– ident: ref26
  doi: 10.1007/978-3-540-40061-5_3
– ident: ref10
  doi: 10.1016/j.jnca.2010.07.007
– ident: ref3
  doi: 10.1007/11844662_6
– ident: ref13
  doi: 10.1109/TDSC.2018.2876831
– ident: ref25
  doi: 10.1109/TIFS.2016.2573770
– ident: ref9
  doi: 10.1007/978-3-540-89641-8_13
– start-page: 44
  year: 2000
  ident: ref5
  article-title: Practical techniques for searches on encrypted data
  publication-title: Proc IEEE Symp Security Privacy
– ident: ref4
  doi: 10.1016/j.ins.2017.03.038
– volume: 11
  start-page: 789
  year: 2016
  ident: ref22
  article-title: Dual-server public-key encryption with keyword search for secure cloud storage
  publication-title: IEEE Trans Inf Forensics Security
  doi: 10.1109/TIFS.2016.2599293
– ident: ref12
  doi: 10.1109/ACCESS.2017.2786026
– volume: 2003
  year: 2003
  ident: ref6
  article-title: Secure indexes
  publication-title: IACR Cryptology ePrint
– ident: ref16
  doi: 10.1007/978-3-319-45744-4_8
– ident: ref30
  doi: 10.1007/978-3-642-33272-2_12
– ident: ref8
  doi: 10.1007/978-3-642-32946-3_21
– ident: ref20
  doi: 10.1145/2382196.2382298
– ident: ref11
  doi: 10.1016/j.jcss.2017.06.001
– ident: ref18
  doi: 10.1007/978-3-540-69295-9_10
– volume: 2011
  year: 2011
  ident: ref29
  article-title: Outsourcing multi-party computation
  publication-title: IACR Cryptology ePrint
– ident: ref19
  doi: 10.1109/TC.2012.215
– ident: ref27
  doi: 10.1007/3-540-45682-1_21
– ident: ref2
  doi: 10.1007/978-3-540-24676-3_30
SSID ssj0014504
Score 2.5467644
Snippet As cloud storage has been widely adopted in various applications, how to protect data privacy while allowing efficient data search and retrieval in a...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 561
SubjectTerms access pattern
Algorithms
Cloud computing
Computer architecture
Computer networks
Data privacy
Data search
Data storage
Encryption
Keyword search
Keywords
multi-keyword search
multi-user access
Privacy
Public key
search pattern
Searchable encryption
Servers
Title Privacy-Preserving Multi-Keyword Searchable Encryption for Distributed Systems
URI https://ieeexplore.ieee.org/document/9207857
https://www.proquest.com/docview/2451898058
Volume 32
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT9wwEB4Bp_ZQYGnV5aUceqrqxcnasX1ELAiBQEgFiVvkx6SqigJadkHLr2fsZFelVIhbDmPL0mfPI_PNDMA3spluWLiSlWFomVClZZa8cualQGcKxUMR653PzsvjK3FyLa-X4MeiFgYRE_kMB_Ez5fLDrZ_GX2V7piCDJtUyLFPg1tZqLTIGQqZRgRRdSGboGXYZzJybvcuL0U-KBAsKUHnMsw5f2KA0VOWVJk7m5WgVzuYHa1klfwbTiRv4p396Nr735GvwqfMzs_32YqzDEjY9WJ3PcMi6J92Dj381JNyA84vx7wfrZywyM6IWaX5lqUSXneLskeLUrKUnx3qr7LDx41nSOBl5vtkotuCN07OQpNo-6J_h6ujw8uCYdRMXmCezP2G5wiBKgWhcqGuuDQ8WHXe5qlXpaodG6IA65yRluddIDozVwQqBIbdKD7_ASnPb4FfIjNfWSFcLH6RQKnfGCaM1KVhB-9W2D3yOQeW7duRxKsZNlcISbqoIWxVhqzrY-vB9seSu7cXxlvBGhGEh2CHQh-050FX3Wu-rQshcG82l3vz_qi34UEQuS-KebcPKZDzFHXJGJm433cJn3NrbxQ
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LbxMxEB6VcoAeKLSghhbYAyeEU-_GXtvHqg8F2kSVSKXeVn7MVgi0rdKkVfj1jL2bqDyEuO1hbFn67HnsfDMD8J5sphsUrmRlGFgmVGmZJa-ceSnQmULxUMR659G4HF6Iz5fycg0-rmphEDGRz7AfP1MuP1z7efxVtm8KMmhSPYLHZPdl0VZrrXIGQqZhgRRfSGboIXY5zJyb_cn50ReKBQsKUXnMtA5-sUJprMofujgZmJNNGC2P1vJKvvXnM9f3P37r2vi_Z38OzzpPMztor8YLWMNmCzaXUxyy7lFvwcaDloTbMD6ffr2zfsEiNyPqkeYqS0W67BQX9xSpZi1BOVZcZceNny6SzsnI982OYhPeOD8LSarthP4SLk6OJ4dD1s1cYJ4M_4zlCoMoBaJxoa65NjxYdNzlqlalqx0aoQPqnJOU5V4juTBWBysEhtwqPXgF6811gzuQGa-tka4WPkihVO6ME0ZrUrGC9qttD_gSg8p3DcnjXIzvVQpMuKkibFWErepg68GH1ZKbthvHv4S3IwwrwQ6BHuwtga6693pbFULm2mgu9eu_r3oHT4aT0Vl19ml8ugtPi8hsSUy0PVifTef4hlyTmXubbuRPfkHfDw
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Privacy-Preserving+Multi-Keyword+Searchable+Encryption+for+Distributed+Systems&rft.jtitle=IEEE+transactions+on+parallel+and+distributed+systems&rft.au=Liu%2C+Xueqiao&rft.au=Yang%2C+Guomin&rft.au=Susilo%2C+Willy&rft.au=Tonien%2C+Joseph&rft.date=2021-03-01&rft.pub=The+Institute+of+Electrical+and+Electronics+Engineers%2C+Inc.+%28IEEE%29&rft.issn=1045-9219&rft.eissn=1558-2183&rft.volume=32&rft.issue=3&rft.spage=561&rft_id=info:doi/10.1109%2FTPDS.2020.3027003&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1045-9219&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1045-9219&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1045-9219&client=summon