Journal on Communications ›› 2021, Vol. 42 ›› Issue (4): 139-149.doi: 10.11959/j.issn.1000-436x.2021054

• Papers • Previous Articles     Next Articles

Secure and verifiable multi-keyword searchable encryption scheme in cloud

Jianhong ZHANG1,2, Menglong WU1, Jing WANG3,4, Pei LIU3,4, Zhengtao JIANG4, Changgen PENG2   

  1. 1 School of Information Sciences and Technology, North China University of Technology, Beijing 100144, China
    2 Guizhou Provincial Key Laboratory of Public Big Data, Guizhou University, Guiyang 550025, China
    3 Finance and Tax Innovation Department of JD Group, Beijing 100176, China
    4 School of Computer and Cyber Sciences, Communication University of China, Beijing 100024, China
  • Revised:2021-02-22 Online:2021-04-25 Published:2021-04-01
  • Supported by:
    The Natural Science Foundation of Beijing(4212019);The Natural Science Foundation of Beijing(L182039);Guangxi Key Laboratory of Crypto-graphy and Information Security(GCIS201808);Foundation of Guizhou Provincial Key Laboratory of Public Big Data(2019BDKFJJ012);The National Key Research and Development Program of China(2018YFB0803900)

Abstract:

Due to the advantages of cloud computing, such as virtualization and high scalability, individuals and enterprises are willing to outsource local data storage and computing to cloud servers.However, encryption breaks the linkability between the data.Although searchable encryption (SE) enables cloud servers to provide retrieval services of the encrypted data for data owners, cloud servers who are untrusted, may tamper and delete data, or learn information of the newly added encrypted files with previous trapdoors.Besides, single-keyword search inevitably incurs many unrelated results, resulting in a waste of bandwidth and computing resources.To address the problems above, an efficient and verifiable multi-keyword search encryption scheme was proposed, which could not only supported multiple-keyword search, but also realized the privacy of search pattern and forward security of the outsourced files.In the meanwhile, it also ensured the integrity check of the outsourced data.Through rigorous security verification, the proposed scheme was proved to be secure under the standard mode, and could resist offline keyword guesswork attack (KGA) on untrusted cloud servers.Finally, by comparing the efficiency and performance with the recent three searchable encryption schemes, the experimental results show that the proposed scheme has the best comprehensive performance in terms of function and efficiency among the four schemes.

Key words: cloud computing, q-ABDHE security assumption, multi-keyword search, security proof

CLC Number: 

No Suggested Reading articles found!