Integrity Assurance Method of Multi-Keyword Query for Encrypted Outsourced Data

被引:1
|
作者
Wang, Ling [1 ]
Ji, Shan [2 ]
Wang, Zhaokang [3 ]
Wang, Xiaowan [4 ]
Mohiuddin, Ghulam [5 ]
Ren, Yongjun [1 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Sch Comp Sci, Minist Educ, Engn Res Ctr Digital Forens, Nanjing 210044, Peoples R China
[2] Zhengde Polytech, Nanjing 211106, Peoples R China
[3] Nanjing Univ Aeronaut & Astronaut, Nanjing 210008, Peoples R China
[4] Xian Univ Posts & Telecommun, Xian 710061, Peoples R China
[5] VaporVM, Dept Cyber Secur, Abu Dhabi 999041, U Arab Emirates
来源
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
Outsourced data; multi-keyword; query integrity; EFFICIENT; STORAGE; BLOCKCHAIN;
D O I
10.32604/iasc.2022.027536
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the data scale exceeds the petabyte level, more and more users outsource their local databases to third-party service providers to save local storage costs and avoid cumbersome local data management. However, because thirdparty service providers are not fully trusted, they may leak outsourced data and bring security risks to the personal privacy of data users. The service provider may also return incorrect or incomplete query results to the data user. Therefore, in this paper, we propose a Lightweight and Verifiable Multi-keyword Query Scheme for the integrity verification of multi-keyword query of outsourced data. This scheme supports multi-keyword query integrity verification and does not require a third-party auditor, combining a hash-based accumulator that provides correctness verification and a cuckoo filter that provides integrity verification to form a provably secure composite verification structure, and at the same time, it uses controllable Paillier encryption to support data update operations. This scheme strikes a balance between the cost of verification structure generation, verification object generation, and proof verification cost to enable data users to perform secure multi-keyword query while efficiently verifying the integrity of query results. The security proof and the performance analysis show that the proposed scheme is secure and efficient for practical deployment.
引用
收藏
页码:221 / 234
页数:14
相关论文
共 50 条
  • [31] Multi-Keyword search over encrypted data with scoring and search pattern obfuscation
    Orencik, Cengiz
    Selcuk, Ayse
    Savas, Erkay
    Kantarcioglu, Murat
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2016, 15 (03) : 251 - 269
  • [32] Achieving Authorized and Ranked Multi-keyword Search over Encrypted Cloud Data
    Li, Hongwei
    Liu, Dongxiao
    Jia, Kun
    Lin, Xiaodong
    2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2015, : 7450 - 7455
  • [33] Expressive query over outsourced encrypted data
    Yang, Yang
    Liu, Ximeng
    Deng, Robert
    INFORMATION SCIENCES, 2018, 442 : 33 - 53
  • [34] Multi-Keyword search over encrypted data with scoring and search pattern obfuscation
    Cengiz Orencik
    Ayse Selcuk
    Erkay Savas
    Murat Kantarcioglu
    International Journal of Information Security, 2016, 15 : 251 - 269
  • [35] Semantic Multi-Keyword Search over Encrypted Cloud Data with Privacy Preservation
    Hsieh, Fei-Ju
    Chin, Tai-Lin
    Huang, Chin-Ya
    Shen, Shan-Hsiang
    Shen, Chung-An
    2019 IEEE 90TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2019-FALL), 2019,
  • [36] Dynamic secure multi-keyword ranked search over encrypted cloud data
    Hozhabr, Maryam
    Asghari, Parvaneh
    Javadi, Hamid Haj Seyyed
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 61
  • [37] A Survey on Multi-Keyword Ranked Search Manipulations over Encrypted Cloud Data
    Ponnusamy, P. Priya
    Vidhyapriya, R.
    Maheswari, S. Uma
    2017 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2017,
  • [38] Efficient dynamic multi-keyword fuzzy search over encrypted cloud data
    Zhong, Hong
    Li, Zhanfei
    Cui, Jie
    Sun, Yue
    Liu, Lu
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 149
  • [39] VRFMS: Verifiable Ranked Fuzzy Multi-Keyword Search Over Encrypted Data
    Li, Xinghua
    Tong, Qiuyun
    Zhao, Jinwei
    Miao, Yinbin
    Ma, Siqi
    Weng, Jian
    Ma, Jianfeng
    Choo, Kim-Kwang Raymond
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (01) : 698 - 710
  • [40] Verifiable Fuzzy Multi-Keyword Search Over Encrypted Data With Adaptive Security
    Tong, Qiuyun
    Miao, Yinbin
    Weng, Jian
    Liu, Ximeng
    Choo, Kim-Kwang Raymond
    Deng, Robert H. H.
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2023, 35 (05) : 5386 - 5399