Abstract
With big data and cloud computing development, data owners begin to outsource their large-volume data to remote servers to reduce local storage costs. Researchers have currently proposed some Dynamic Searchable Symmetric Encryption (DSSE) schemes that support efficient keyword searches on encrypted data with dynamic update operations. Unfortunately, most of them are constructed based on a single server architecture, which means that they cannot be used directly when multiple servers participate in the search process. Some schemes assume that the server is honest-but-curious, which cannot be guaranteed, especially in the multi-server scenario. This paper proposes a Blockchain-based Verifiable DSSE scheme with forwarding security in Multi-server environments. In the scheme, the data owner encrypts the partitioned files and randomly stores them in different servers from which a single server cannot recover any complete file. The use of blockchain and smart contracts to achieve reliable and verifiable search can detect malicious servers’ improper behaviors. Experimental evaluation show that the scheme achieves verifiable search, forward privacy with less leakage, and high search efficiency.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Zhang, C., Zhu, L., Xu, C., Zhang, C., Sharif, K., Wu, H., Westermann, H.: BSFP: blockchain-enabled smart parking with fairness, reliability and privacy protection. IEEE Trans. Veh. Technol. 69(6), 6578–6591 (2020)
Zhang, C., Zhu, L., Xu, C., Liu, X., Sharif, K.: Reliable and privacy-preserving truth discovery for mobile crowdsensing systems. IEEE Trans. Dependable Secure Comput. (2019). https://doi.org/10.1109/TDSC.2019.2919517
Poh, G.S., Mohamad, M.S., Chin, J.-J.: Searchable symmetric encryption over multiple servers. Cryptogr. Commun. 10(1), 139–158 (2017). https://doi.org/10.1007/s12095-017-0232-y
Zarezadeh, M., Mala, H., Ashouri-Talouki, M.: Multi-keyword ranked searchable encryption scheme with access control for cloud storage. Peer-to-Peer Networking Appl. 13(1), 207–218 (2019). https://doi.org/10.1007/s12083-019-00736-0
Ti, Y., Wu, C., Yu, C., Kuo, S.: Benchmarking dynamic searchable symmetric encryption scheme for cloud-internet of things applications. IEEE Access 8, 1715–1732 (2020). https://doi.org/10.1109/ACCESS.2019.2961971
Hiemenz, B., Krämer, M.: Dynamic searchable symmetric encryption for storing geospatial data in the cloud. Int. J. Inf. Secur. 18(3), 333–354 (2018). https://doi.org/10.1007/s10207-018-0414-4
Kamara, S., Papamanthou, C., Roeder, T.: Dynamic searchable symmetric encryption. IACR Cryptol. ePrint Arch. 2012, 530 (2012)
Zhang, Y., Katz, J., Papamanthou, C.: All your queries are belong to us: the power of file-injection attacks on searchable encryption. IACR Cryptol. ePrint Arch. 2016, 172 (2016)
Zuo, C., Sun, S., Liu, J.K., Shao, J., Pieprzyk, J., Xu, L.: Forward and backward private DSSE for range queries. IACR Cryptol. ePrint Arch. 2019, 1240 (2019)
Patranabis, S., Mukhopadhyay, D.: Forward and backward private conjunctive searchable symmetric encryption. IACR Cryptol. ePrint Arch. 2020, 1342 (2020)
Stefanov, E., Papamanthou, C., Shi, E.: Practical dynamic searchable encryption with small leakage. In: 21st Annual Network and Distributed System Security Symposium, NDSS. The Internet Society (2014)
Orencik, C., Selcuk, A., Savas, E., Kantarcioglu, M.: Multi-Keyword search over encrypted data with scoring and search pattern obfuscation. Int. J. Inf. Secur. 15(3), 251–269 (2015). https://doi.org/10.1007/s10207-015-0294-9
Zhang, C., Fu, S., Ao, W.: A blockchain based searchable encryption scheme for multiple cloud storage. In: Vaidya, J., Zhang, X., Li, J. (eds.) CSS 2019. LNCS, vol. 11982, pp. 585–600. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-37337-5_48
He, K., Chen, J., Zhou, Q., Du, R., Xiang, Y.: Secure dynamic searchable symmetric encryption with constant client storage cost. IEEE Trans. Inf. Forensics Secur. 16, 1538–1549 (2021). https://doi.org/10.1109/TIFS.2020.3033412
Zhang, Z., Wang, J., Wang, Y., Su, Y., Chen, X.: Towards efficient verifiable forward secure searchable symmetric encryption. In: Sako, K., Schneider, S., Ryan, P.Y.A. (eds.) ESORICS 2019. LNCS, vol. 11736, pp. 304–321. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-29962-0_15
Wang, K., Dong, X., Shen, J., Cao, Z.: An effective verifiable symmetric searchable encryption scheme in cloud computing, pp. 98–102. ACM (2019). https://doi.org/10.1145/3377170.3377251
Chen, B., Wu, L., Wang, H., Zhou, L., He, D.: A blockchain-based searchable public-key encryption with forward and backward privacy for cloud-assisted vehicular social networks. IEEE Trans. Veh. Technol. 69(6), 5813–5825 (2020). https://doi.org/10.1109/TVT.2019.2959383
Yan, X., Yuan, X., Ye, Q., Tang, Y.: Blockchain-based searchable encryption scheme with fair payment. IEEE Access 8, 109687–109706 (2020). https://doi.org/10.1109/ACCESS.2020.3002264
Hu, S., Cai, C., Wang, Q., Wang, C., Luo, X., Ren, K.: Searching an encrypted cloud meets blockchain: a decentralized, reliable and fair realization, pp. 792–800. IEEE (2018). https://doi.org/10.1109/INFOCOM.2018.8485890
Li, H., Tian, H., Zhang, F.: Block chain based searchable symmetric encryption. IACR Cryptol. ePrint Arch. 2017, 447 (2017)
Acknowledgments
This research is supported by the National Key Research and Development Program of China (Grant No. 2020YFB1006101) and the National Natural Science Foundation of China (Grant Nos. 61972037, 61872041, U1836212).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Xu, C., Yu, L., Zhu, L., Zhang, C. (2021). Blockchain-Based Verifiable DSSE with Forward Security in Multi-server Environments. In: Liu, Z., Wu, F., Das, S.K. (eds) Wireless Algorithms, Systems, and Applications. WASA 2021. Lecture Notes in Computer Science(), vol 12939. Springer, Cham. https://doi.org/10.1007/978-3-030-86137-7_18
Download citation
DOI: https://doi.org/10.1007/978-3-030-86137-7_18
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-86136-0
Online ISBN: 978-3-030-86137-7
eBook Packages: Computer ScienceComputer Science (R0)