Integrity Assurance Method of Multi-Keyword Query for Encrypted Outsourced Data

被引:1
|
作者
Wang, Ling [1 ]
Ji, Shan [2 ]
Wang, Zhaokang [3 ]
Wang, Xiaowan [4 ]
Mohiuddin, Ghulam [5 ]
Ren, Yongjun [1 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Sch Comp Sci, Minist Educ, Engn Res Ctr Digital Forens, Nanjing 210044, Peoples R China
[2] Zhengde Polytech, Nanjing 211106, Peoples R China
[3] Nanjing Univ Aeronaut & Astronaut, Nanjing 210008, Peoples R China
[4] Xian Univ Posts & Telecommun, Xian 710061, Peoples R China
[5] VaporVM, Dept Cyber Secur, Abu Dhabi 999041, U Arab Emirates
来源
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
Outsourced data; multi-keyword; query integrity; EFFICIENT; STORAGE; BLOCKCHAIN;
D O I
10.32604/iasc.2022.027536
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the data scale exceeds the petabyte level, more and more users outsource their local databases to third-party service providers to save local storage costs and avoid cumbersome local data management. However, because thirdparty service providers are not fully trusted, they may leak outsourced data and bring security risks to the personal privacy of data users. The service provider may also return incorrect or incomplete query results to the data user. Therefore, in this paper, we propose a Lightweight and Verifiable Multi-keyword Query Scheme for the integrity verification of multi-keyword query of outsourced data. This scheme supports multi-keyword query integrity verification and does not require a third-party auditor, combining a hash-based accumulator that provides correctness verification and a cuckoo filter that provides integrity verification to form a provably secure composite verification structure, and at the same time, it uses controllable Paillier encryption to support data update operations. This scheme strikes a balance between the cost of verification structure generation, verification object generation, and proof verification cost to enable data users to perform secure multi-keyword query while efficiently verifying the integrity of query results. The security proof and the performance analysis show that the proposed scheme is secure and efficient for practical deployment.
引用
收藏
页码:221 / 234
页数:14
相关论文
共 50 条
  • [41] Blockchain Based Multi-keyword Similarity Search Scheme over Encrypted Data
    Li, Mingyue
    Jia, Chunfu
    Shao, Wei
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS (SECURECOMM 2020), PT II, 2020, 336 : 350 - 371
  • [42] Multi-Client Verifiable Encrypted Keyword Search Scheme With Authorization Over Outsourced Encrypted Data
    Yang, Xu
    Wang, Qiuhao
    Qi, Saiyu
    Li, Ke
    Wang, Jianfeng
    Zhao, Wenjia
    Qi, Yong
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 11 (06): : 6356 - 6371
  • [43] Efficient Multi-Keyword Ranked Search Over Encrypted Data for Multi-Data-Owner Settings
    Nabil, Mahmoud
    Alsharif, Ahmad
    Sherif, Ahmed
    Mahmoud, Mohamed
    Younis, Mohamed
    2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2018,
  • [44] Achieving Effective Cloud Search Services: Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Synonym Query
    Fu, Zhangjie
    Sun, Xingming
    Linge, Nigel
    Zhou, Lu
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2014, 60 (01) : 164 - 172
  • [45] Secure multi-keyword ranked search over encrypted cloud data for multiple data owners
    Guo, Ziqing
    Zhang, Hua
    Sun, Caijun
    Wen, Qiaoyan
    Li, Wenmin
    JOURNAL OF SYSTEMS AND SOFTWARE, 2018, 137 : 380 - 395
  • [46] Multi-User Multi-Keyword Rank Search Over Encrypted Data in Arbitrary Language
    Yang, Yang
    Liu, Ximeng
    Deng, Robert H.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (02) : 320 - 334
  • [47] Verifiable and Dynamic Multi-Keyword Search Over Encrypted Cloud Data Using Bitmap
    Li, Feng
    Ma, Jianfeng
    Miao, Yinbin
    Jiang, Qi
    Liu, Ximeng
    Choo, Kim-Kwang Raymond
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (01) : 336 - 348
  • [48] A Secure Multi-Keyword Fuzzy Search with Polynomial Function for Encrypted Data in Cloud Computing
    Liu, I-Hsien
    Lin, Yu-Hsin
    Li, Jung-Shian
    Kuo, Wen-Chung
    Liu, Chuan-Gang
    PROCEEDINGS OF 2018 3RD INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS (ICCCS), 2018, : 41 - 45
  • [49] Secure and Efficient Multi-keyword Fuzzy Search Over Encrypted Data on Alliance Chain
    Song, Jimeng
    Shen, Ziqi
    Yu, Han
    Lai, Rongxin
    Li, Yuancheng
    Wang, Qingle
    Li, Jianbin
    RECENT ADVANCES IN ELECTRICAL & ELECTRONIC ENGINEERING, 2024, 17 (07) : 652 - 665
  • [50] A Similarity Evaluation Algorithm and Its Application in Multi-Keyword Search on Encrypted Cloud Data
    Shen, Peisong
    Chen, Chi
    Tian, Xue
    Tian, Jing
    2015 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2015), 2015, : 1218 - 1223