Chinese Journal of Network and Information Security ›› 2023, Vol. 9 ›› Issue (2): 143-153.doi: 10.11959/j.issn.2096-109x.2023028

• Papers • Previous Articles     Next Articles

Dynamic multi-keyword searchable encryption scheme

Chenghao YUAN1, Yong LI1, Shuang REN2   

  1. 1 School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing 100044, China
    2 School of Computer and Information Technology, Beijing Jiaotong University, Beijing 100044, China
  • Revised:2023-02-19 Online:2023-04-25 Published:2023-04-01
  • Supported by:
    The National Natural Science Foundation of China(62072025);2020 Innovative Development Project of the Industrial Internet(TC200H01V)

Abstract:

Users of cloud storage often outsource their data to cloud servers to save local storage resources.However, cloud storage data is out of the user’s physical control, which may lead to malicious theft or disclosure of private data on cloud.At present, dynamic searchable encryption schemes are mostly based on symmetric searchable encryption, which need to establish a secure key sharing channel in advance, and cannot be directly applied to data sharing in cloud storage scenarios.For the secure sharing scenario of multi-party data in cloud storage, a dynamic multi-keyword searchable encryption scheme was proposed.The forward index was constructed by a cuckoo filter to enable data owners to perform documents and index dynamic updates.The conjunctive multi-keywords search was supported by combining bilinear pairing with Lagrangian interpolation polynomials.To reduce the computational overhead in the ciphertext retrieval phase, a combination of inverted index and forward index was constructed to improve the retrieval efficiency of cloud server.This scheme is provably secure with the indistinguishability in adaptively chosen keyword attack under decision linear Diffie-Hellman problem.Simulation experiments were conducted to analyze the execution efficiency of the scheme for keyword search and index update in different datasets.The results show that the scheme effectively avoids the linear correlation between the retrieval time and the number of ciphertexts, and reduces the computational overhead in the update operation with a large amount of data.

Key words: searchable encryption, cloud storage, cuckoo filter, inverted index

CLC Number: 

No Suggested Reading articles found!