Please wait a minute...
Frontiers of Computer Science

ISSN 2095-2228

ISSN 2095-2236(Online)

CN 10-1014/TP

Postal Subscription Code 80-970

2018 Impact Factor: 1.129

Front. Comput. Sci.    2023, Vol. 17 Issue (5) : 175812    https://doi.org/10.1007/s11704-022-2017-5
RESEARCH ARTICLE
SEOT: Secure dynamic searchable encryption with outsourced ownership transfer
Jianwei LI1, Xiaoming WANG1(), Qingqing GAN2
1. Department of Information Science and Technology, Jinan University, Guangzhou 510632, China
2. Department of Cyber Security, Guangdong University of Foreign Studies, Guangzhou 510006, China
 Download: PDF(6936 KB)   HTML
 Export: BibTeX | EndNote | Reference Manager | ProCite | RefWorks
Abstract

When one enterprise acquires another, the electronic data of the acquired enterprise will be transferred to the acquiring enterprise. In particular, if the data system of acquired enterprise contains a searchable encryption mechanism, the corresponding searchability will also be transferred. In this paper, we introduce the concept of Searchable Encryption with Ownership Transfer (SEOT), and propose a secure SEOT scheme. Based on the new structure of polling pool, our proposed searchable encryption scheme not only achieves efficient transfer of outsourced data, but also implements secure transfer of data searchability. Moreover, we optimize the storage cost for user to a desirable value. We prove our scheme can achieve the secure characteristics, then carry out the performance evaluation and experiments. The results demonstrate that our scheme is superior in efficiency and practicability.

Keywords cloud computing      ownership transfer      searchable encryption      forward secure      outsourced computation     
Corresponding Author(s): Xiaoming WANG   
Just Accepted Date: 29 September 2022   Issue Date: 11 January 2023
 Cite this article:   
Jianwei LI,Xiaoming WANG,Qingqing GAN. SEOT: Secure dynamic searchable encryption with outsourced ownership transfer[J]. Front. Comput. Sci., 2023, 17(5): 175812.
 URL:  
https://academic.hep.com.cn/fcs/EN/10.1007/s11704-022-2017-5
https://academic.hep.com.cn/fcs/EN/Y2023/V17/I5/175812
Fig.1  State chain in scheme [28]
NotationDescription
m File
ind File index
cm Encrypted file
w Keyword
cw Encrypted keyword
tw Pseudorandom keyword
op The operations on file, including add and delete
K Pseudorandom key
cnt Update counter
T The table stored the update information
I The table stored the encrypted keywords
st Query token
r Update reference
e Encrypted file information
Tab.1  Notations
Fig.2  System model
Fig.3  State chain structure to be used in ownership transfer
Fig.4  Keyed permutation
Fig.5  Polling pool
  
  
  
  
  
  
  
  
  
SchemeUpdateSearch
Σo?o? [11] OF+OH+O+OEnc nw?(OH+O+ODec)
FSSE [27] OH+O+OSymEnc nw?(OH+O+OSymDec)
FAST [28] 2?OP+2?OH+O nw?(OH+O+OP)
Our scheme OF+n?OP+2?OH+O+OEnc n?(OH+O+OP)
Tab.2  Update and search computation cost
EntityOur schemeNaive scheme
Original data owner OF+OP+OEnc+ODec n/2?OP+n/2?OH+2?O+2?OEnc+2?ODec
New data owner OF+n?OP+2?OH+O+ODec OF+n?OP+2?OH+O+ODec
Cloud 2?O+OEnc ?
Dealer n/2?OP+n/2?OH+2?O ?
Tab.3  Ownership transfer computation cost
SchemeUpdateSearchOwnership transfer
Σo?o? [11] 3?λ (ns+3)?λ ?
FSSE [27] 5?λ (ns+2)?λ ?
FAST [28] 4?λ (ns+3)?λ ?
Our scheme 5?λ (ns+2)?λ (n/2+12)?λ
Naive scheme ? ? (n/2+12)?λ+3?λf
Tab.4  Communication cost comparison
SchemeData ownerCloud
Σo?o? [11] (4v+3)?λ 3?λ?n
FSSE [27] (2v+1)?λ 5?λ?n
FAST [28] (2v+1)?λ 4?λ?n
Our scheme 3?λ 5?λ?n
Tab.5  Storage cost comparison
Fig.6  Cost time of update and search
Fig.7  Cost time of ownership transfer
  
  
  
1 O, Osanaiye K K R, Choo M Dlodlo . Distributed denial of service (DDoS) resilience in cloud: review and conceptual cloud DDoS mitigation framework. Journal of Network and Computer Applications, 2016, 67: 147–165
2 J, Shen T, Zhou X, Chen J, Li W Susilo . Anonymous and traceable group data sharing in cloud computing. IEEE Transactions on Information Forensics and Security, 2018, 13( 4): 912–925
3 D X, Song D, Wagner A Perrig . Practical techniques for searches on encrypted data. In: Proceedings of 2000 IEEE Symposium on Security and Privacy. 2000, 44−55
4 S, Kamara C, Papamanthou T Roeder . Dynamic searchable symmetric encryption. In: Proceedings of 2012 ACM conference on Computer and communications security, 2012, 965–976
5 Kun H, Chen J, Zhou Q, Du R and Xiang Y. Secure dynamic searchable symmetric encryption with constant client storage cost. IEEE Transactions on Information Forensics and Security, 2020, 16:1538--1549
6 Y, Zhang J, Katz C Papamanthou . All your queries are belong to us: the power of file-injection attacks on searchable encryption. In: Proceedings of the 25th USENIX Conference on Security Symposium. 2016, 707–720
7 J W, Byun H S, Rhee H A, Park D H Lee . Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. In: Proceedings of the 3rd VLDB Workshop on Secure Data Management. 2006, 75–83
8 M S, Islam M, Kuzu M Kantarcioglu . Access pattern disclosure on searchable encryption: ramification, attack and mitigation. In: Proceedings of the 19th Annual Network and Distributed System Security Symposium. 2012
9 D, Cash P, Grubbs J, Perry T Ristenpart . Leakage-abuse attacks against searchable encryption. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. 2015, 668–679
10 E, Stefanov C, Papamanthou E Shi . Practical dynamic searchable encryption with small leakage. In: Proceedings of the 21st Annual Network and Distributed System Security Symposium. 2014, 72–75
11 R Bost . σoφoς: forward secure searchable encryption. In: Proceedings of ACM SIGSAC Conference on Computer and Communications Security. 2016, 1143–1154
12 H, Wang D, He A, Fu Q, Li Q Wang . Provable data possession with outsourced data transfer. IEEE Transactions on Services Computing, 2021, 14( 6): 1929–1939
13 J, Shen F, Guo X, Chen W Susilo . Secure cloud auditing with efficient ownership transfer. In: Proceedings of the 25th European Symposium on Research in Computer Security. 2020, 611–631
14 K, Osaka T, Takagi K, Yamazaki O Takahashi . An efficient and secure RFID security method with ownership transfer. In: Proceedings of International Conference on Computational Intelligence and Security. 2007, 778–787
15 J N, Luo M H Yang . A secure partial RFID ownership transfer protocol with multi-owners. Sensors, 2020, 20( 1): 22
16 F, Moazami M Safkhani . SEOTP: a new secure and efficient ownership transfer protocol based on quadric residue and homomorphic encryption. Wireless Networks, 2020, 26( 7): 5285–5306
17 B, Ray J, Abawajy M, Chowdhury A Alelaiwi . Universal and secure object ownership transfer protocol for the internet of things. Future Generation Computer Systems, 2018, 78: 838–849
18 M, Chase S Kamara . Structured encryption and controlled disclosure. In: Proceedings of the 16th International Conference on the Theory and Application of Cryptology and Information Security. 2010, 577–594
19 R, Curtmola J, Garay S, Kamara R Ostrovsky . Searchable symmetric encryption: improved definitions and efficient constructions. Journal of Computer Security, 2011, 19( 5): 895–934
20 N, Premasathian S Choto . Searchable encryption schemes: with multiplication and simultaneous congruences. In: Proceedings of the 9th International ISC Conference on Information Security and Cryptology. 2012, 147–150
21 C, Wang N, Cao J, Li K, Ren W Lou . Secure ranked keyword search over encrypted cloud data. In: Proceedings of the 30th International Conference on Distributed Computing Systems. 2010, 253–262
22 X, Ding P, Liu H Jin . Privacy-preserving multi-keyword top-k similarity search over encrypted data. IEEE Transactions on Dependable and Secure Computing, 2019, 16( 2): 344–357
23 H, Zhong Z, Li J, Cui Y, Sun L Liu . Efficient dynamic multi-keyword fuzzy search over encrypted cloud data. Journal of Network and Computer Applications, 2020, 149: 102469
24 L, Xu C, Xu J K, Liu C, Zuo P Zhang . Building a dynamic searchable encrypted medical database for multi-client. Information Sciences, 2020, 527: 394–405
25 M, Etemad A, Küpçü C, Papamanthou D Evans . Efficient dynamic searchable encryption with forward privacy. Proceedings on Privacy Enhancing Technologies, 2018, 2018( 1): 5–20
26 K S, Kim M, Kim D, Lee J H, Park W H Kim . Forward secure dynamic searchable symmetric encryption with efficient updates. In: Proceedings of ACM SIGSAC Conference on Computer and Communications Security. 2017, 1449–1463
27 Y, Wei S, Lv X, Guo Z, Liu Y, Huang B Li . FSSE: forward secure searchable encryption with keyed-block chains. Information Sciences, 2019, 500: 113–126
28 X, Song C, Dong D, Yuan Q, Xu M Zhao . Forward private searchable symmetric encryption with optimized I/O efficiency. IEEE Transactions on Dependable and Secure Computing, 2020, 17( 5): 912–927
29 H S, Rhee J H, Park W, Susilo D H Lee . Trapdoor security in a searchable public-key encryption scheme with a designated tester. Journal of Systems and Software, 2010, 83( 5): 763–771
30 L, Sun C, Xu M, Zhang K, Chen H Li . Secure searchable public key encryption against insider keyword guessing attacks from indistinguishability obfuscation. Science China Information Sciences, 2018, 61( 3): 038106
31 Y, Lu J, Li Y Zhang . Secure channel free certificate-based searchable encryption withstanding outside and inside keyword guessing attacks. IEEE Transactions on Services Computing, 2021, 14( 6): 2041–2054
32 L, Xu H, Duan A, Zhou X, Yuan C Wang . Interpreting and mitigating leakage-abuse attacks in searchable symmetric encryption. IEEE Transactions on Information Forensics and Security, 2021, 16: 5310–5325
33 J, Shao Z, Cao X, Liang H Lin . Proxy re-encryption with keyword search. Information Sciences, 2010, 180( 13): 2576–2587
[1] FCS-22017-of-JL_suppl_1 Download
[1] Kun WANG, Song WU, Shengbang LI, Zhuo HUANG, Hao FAN, Chen YU, Hai JIN. Precise control of page cache for containers[J]. Front. Comput. Sci., 2024, 18(2): 182102-.
[2] Ashish SINGH, Abhinav KUMAR, Suyel NAMASUDRA. DNACDS: Cloud IoE big data security and accessing scheme based on DNA cryptography[J]. Front. Comput. Sci., 2024, 18(1): 181801-.
[3] Xingxin LI, Youwen ZHU, Rui XU, Jian WANG, Yushu ZHANG. Indexing dynamic encrypted database in cloud for efficient secure k-nearest neighbor query[J]. Front. Comput. Sci., 2024, 18(1): 181803-.
[4] Yunbo YANG, Xiaolei DONG, Zhenfu CAO, Jiachen SHEN, Shangmin DOU. IXT: Improved searchable encryption for multi-word queries based on PSI[J]. Front. Comput. Sci., 2023, 17(5): 175811-.
[5] Sedigheh KHOSHNEVIS. A search-based identification of variable microservices for enterprise SaaS[J]. Front. Comput. Sci., 2023, 17(3): 173208-.
[6] Changbo KE, Fu XIAO, Zhiqiu HUANG, Fangxiong XIAO. A user requirements-oriented privacy policy self-adaption scheme in cloud computing[J]. Front. Comput. Sci., 2023, 17(2): 172203-.
[7] Rong ZENG, Xiaofeng HOU, Lu ZHANG, Chao LI, Wenli ZHENG, Minyi GUO. Performance optimization for cloud computing systems in the microservice era: state-of-the-art and research opportunities[J]. Front. Comput. Sci., 2022, 16(6): 166106-.
[8] Zhengxiong HOU, Hong SHEN, Xingshe ZHOU, Jianhua GU, Yunlan WANG, Tianhai ZHAO. Prediction of job characteristics for intelligent resource allocation in HPC systems: a survey and future directions[J]. Front. Comput. Sci., 2022, 16(5): 165107-.
[9] Bowen ZHAO, Shaohua TANG, Ximeng LIU, Yiming WU. Return just your search: privacy-preserving homoglyph search for arbitrary languages[J]. Front. Comput. Sci., 2022, 16(2): 162801-.
[10] Zhangjie FU, Yan WANG, Xingming SUN, Xiaosong ZHANG. Semantic and secure search over encrypted outsourcing cloud based on BERT[J]. Front. Comput. Sci., 2022, 16(2): 162802-.
[11] Arpita BISWAS, Abhishek MAJUMDAR, Soumyabrata DAS, Krishna Lal BAISHNAB. OCSO-CA: opposition based competitive swarm optimizer in energy efficient IoT clustering[J]. Front. Comput. Sci., 2022, 16(1): 161501-.
[12] Yao QIN, Hua WANG, Shanwen YI, Xiaole LI, Linbo ZHAI. A multi-objective reinforcement learning algorithm for deadline constrained scientific workflow scheduling in clouds[J]. Front. Comput. Sci., 2021, 15(5): 155105-.
[13] Wei ZHENG, Ying WU, Xiaoxue WU, Chen FENG, Yulei SUI, Xiapu LUO, Yajin ZHOU. A survey of Intel SGX and its applications[J]. Front. Comput. Sci., 2021, 15(3): 153808-.
[14] Najme MANSOURI, Mohammad Masoud JAVIDI, Behnam Mohammad Hasani ZADE. Hierarchical data replication strategy to improve performance in cloud computing[J]. Front. Comput. Sci., 2021, 15(2): 152501-.
[15] Jiayang LIU, Jingguo BI, Mu LI. Secure outsourcing of large matrix determinant computation[J]. Front. Comput. Sci., 2020, 14(6): 146807-.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed