4.7 Article

A Survey on Searchable Symmetric Encryption

Related references

Note: Only part of the references are listed.
Article Computer Science, Hardware & Architecture

Forward/Backward and Content Private DSSE for Spatial Keyword Queries

Xiangyu Wang et al.

Summary: This article investigates the problem of Dynamic Searchable Symmetric Encryption (DSSE) for spatial keyword queries, and presents a practical DSSESKQ construction based on geometric prefix encoding inverted-index and encrypted bitmap. Rigorous security analysis proves that our construction can achieve both forward/backward privacy and content privacy, resisting most existing leakage-abuse attacks. Evaluation results using real-world datasets demonstrate the efficiency and feasibility of our construction. Comparative analysis reveals that our construction outperforms state-of-the-art schemes in terms of privacy and performance, being 175x faster than existing schemes with only 51% server storage cost.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2023)

Article Computer Science, Information Systems

Verifiable and Dynamic Multi-Keyword Search Over Encrypted Cloud Data Using Bitmap

Feng Li et al.

Summary: Searchable Symmetric Encryption (SSE) has attracted attention for enabling users to search encrypted data without decryption. However, existing SSE schemes suffer from low search efficiency and lack support for multi-keyword search, dynamic updates, and result verification. To address these issues, we propose a Verifiable and Dynamic Multi-keyword Search (VDMS) scheme using bitmap and RSA accumulator, offering efficient, verifiable, and updated multi-keyword search. The scheme employs bitmap as a data structure for indexes to improve search efficiency and reduce storage space. The combination of RSA accumulator and bitmap ensures result correctness. Security analysis shows that VDMS is adaptively secure against Chosen-Keyword Attacks (CKA), and experiments using real-world data demonstrate its efficiency and feasibility.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2023)

Article Computer Science, Information Systems

Towards Efficient Verifiable Boolean Search Over Encrypted Cloud Data

Feng Li et al.

Summary: Symmetric Searchable Encryption (SSE) schemes have been extensively explored for improved function, efficiency, and security. However, in real-world settings, additional functions such as forward and backward privacy and support for boolean search are needed. In this article, we propose the construction of Verifiable Boolean Search (VBS) over encrypted data and enhance it to achieve Forward and Backward privacy (VBS-FB). We also provide a formal proof of security and evaluate the performance using real-world datasets.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2023)

Article Computer Science, Hardware & Architecture

Forward and Backward Private DSSE for Range Queries

Cong Zuo et al.

Summary: The dynamic searchable symmetric encryption (DSSE) technology has received considerable attention recently due to its capabilities of searches and updates over the encrypted database. However, secure DSSE schemes usually require forward and backward privacy to resist leakage abuse attacks. Existing schemes either only support single keyword queries or require more interactions between the client and server.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2022)

Article Computer Science, Hardware & Architecture

Eurus: Towards an Efficient Searchable Symmetric Encryption With Size Pattern Protection

Zheli Liu et al.

Summary: This article discusses the issue of size pattern leakage in dynamic searchable symmetric encryption (DSSE) schemes and proposes a new scheme called Eurus to address this problem, significantly reducing leakage and improving efficiency.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2022)

Article Computer Science, Information Systems

Achieving Searchable Encryption Scheme With Search Pattern Hidden

Yunling Wang et al.

Summary: This article discusses the concept of Searchable Encryption (SE) and its limitations in protecting query privacy. It proposes a new SE scheme that utilizes a special additive homomorphic encryption scheme to achieve multiplicative homomorphic property, increasing the accuracy of search results and enhancing user-side security.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2022)

Article Computer Science, Information Systems

Traceable and Controllable Encrypted Cloud Image Search in Multi-User Settings

Yingying Li et al.

Summary: This article introduces a new controllable encrypted cloud image search scheme and demonstrates its efficiency and high accuracy through empirical experiments.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2022)

Article Computer Science, Theory & Methods

ROSE: Robust Searchable Encryption With Forward and Backward Security

Peng Xu et al.

Summary: This study focuses on the robustness of dynamic searchable symmetric encryption (DSSE) and introduces a new cryptographic primitive to construct a robust DSSE scheme called ROSE, which achieves forward and backward security.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2022)

Article Computer Science, Hardware & Architecture

Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verification

Xinrui Ge et al.

Summary: Verifiable Searchable Symmetric Encryption is an important cloud security technique allowing users to retrieve encrypted data through keywords and verify the results. This paper proposes a practical scheme for achieving keyword search over dynamic encrypted cloud data with symmetric-key based verification. By designing a novel Accumulative Authentication Tag and a new secure index, efficient data update and verification are achieved, ensuring both security and efficiency.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2021)

Article Computer Science, Information Systems

Achieve efficient position-heap-based privacy-preserving substring-of-keyword query over cloud

Fan Yin et al.

Summary: This paper investigates the privacy and efficiency issues of keyword substring queries in cloud computing, proposing a tree-based index and keyword substring query scheme with two consecutive phases. Detailed security analysis and experimental results validate the security and efficiency of the proposed scheme.

COMPUTERS & SECURITY (2021)

Article Engineering, Electrical & Electronic

P2HBT: Partially Policy Hidden E-Healthcare System with Black-Box Traceability

Ying Zuobin et al.

Summary: Electronic health record (EHR) is the electronic version of patient medical history, shared through cloud services, but vulnerable to attacks by malicious users. A system with black-box traceable and robust data security mechanism has been proposed for EHR.

CHINESE JOURNAL OF ELECTRONICS (2021)

Article Computer Science, Hardware & Architecture

Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting

Yinbin Miao et al.

Summary: CP-ABKS system enables search queries and fine-grained access control over encrypted data in the cloud, but lacks effective support for shared multi-owner settings and privacy protection. The proposed ABKS-SM systems emphasize privacy preservation and malicious user tracing, with features of selective security and resistance to offline keyword-guessing attacks.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2021)

Proceedings Paper Computer Science, Information Systems

LEAP: Leakage-Abuse Attack on Efficiently Deployable, Efficiently Searchable Encryption with Partially Known Dataset

Jianting Ning et al.

Summary: SE enables private queries on encrypted documents, with most existing schemes focusing on practical solutions at the expense of acceptable information leakages. ShadowCrypt utilizes EDESE approach, revealing encrypted dataset and query tokens, but recent attacks have shown potential for recovering underlying keywords. Our LEAP attack demonstrates keyword and document recovery based on partially known documents and L2 leakage, with varying levels of attacker's background knowledge tested in extensive experiments.

CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2021)

Proceedings Paper Computer Science, Information Systems

DP-Sync: Hiding Update Patterns in Secure Outsourced Databases with Differential Privacy

Chenghong Wang et al.

Summary: This paper explores privacy-preserving update strategies for secure outsourced growing databases, introducing a novel framework called DP-Sync to address the issue of information leakage in existing techniques. Extensive empirical evaluations on real-world datasets demonstrate the practical feasibility of DP-Sync in terms of performance and accuracy.

SIGMOD '21: PROCEEDINGS OF THE 2021 INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA (2021)

Article Computer Science, Theory & Methods

SAP-SSE: Protecting Search Patterns and Access Patterns in Searchable Symmetric Encryption

Qiyang Song et al.

Summary: The proposed SAP-SSE scheme in this paper protects both access patterns and search patterns in a generic database setting by leveraging re-encryption cryptosystems to shuffle index entries over multiple clouds for protecting search patterns, and distributing secure indexes to multiple clouds along with an index redistribution protocol for protecting access patterns. Additionally, it provides a configurable security policy to balance security and efficiency while preventing pattern leakage with low overhead, as demonstrated by formal security analysis and experimental evaluation.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)

Article Computer Science, Theory & Methods

A Verifiable Semantic Searching Scheme by Optimal Matching Over Encrypted Data in Public Cloud

Wenyuan Yang et al.

Summary: The proposed secure verifiable semantic searching scheme utilizes word transportation and linear programming to calculate minimum word transportation cost and verify search results, ensuring correctness and confidentiality. Experimental results show higher accuracy compared to other schemes on two datasets.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)

Article Computer Science, Information Systems

EliMFS: Achieving Efficient, Leakage-Resilient, and Multi-Keyword Fuzzy Search on Encrypted Cloud Data

Jing Chen et al.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2020)

Article Computer Science, Hardware & Architecture

Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency

Xiangfu Song et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2020)

Article Computer Science, Hardware & Architecture

Efficient dynamic multi-keyword fuzzy search over encrypted cloud data

Hong Zhong et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2020)

Proceedings Paper Computer Science, Hardware & Architecture

Search Me in the Dark: Privacy-preserving Boolean Range Query over Encrypted Spatial Data

Xiangyu Wang et al.

IEEE INFOCOM 2020 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (2020)

Article Computer Science, Hardware & Architecture

Privacy-Preserving Multi-Keyword Top-k Similarity Search Over Encrypted Data

Xiaofeng Ding et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2019)

Article Computer Science, Information Systems

Lightweight Fine-Grained Search Over Encrypted Data in Fog Computing

Yinbin Miao et al.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2019)

Article Computer Science, Theory & Methods

Passive Attacks Against Searchable Encryption

Jianting Ning et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)

Proceedings Paper Computer Science, Information Systems

Privacy Preserving Substring Search Protocol with Polylogarithmic Communication Cost

Nicholas Mainardi et al.

35TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSA) (2019)

Proceedings Paper Computer Science, Information Systems

Mitigating Leakage in Secure Cloud-Hosted Data Structures: Volume-Hiding for Multi-Maps via Hashing

Sarvar Patel et al.

PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19) (2019)

Proceedings Paper Computer Science, Hardware & Architecture

Hardening Database Padding for Searchable Encryption

Lei Xu et al.

IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2019) (2019)

Article Computer Science, Theory & Methods

Semantic-Aware Searching Over Encrypted Data for Cloud Computing

Zhangjie Fu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Article Computer Science, Theory & Methods

Enabling Generic, Verifiable, and Secure Data Search in Cloud Services

Jie Zhu et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2018)

Article Computer Science, Information Systems

Enabling verifiable multiple keywords search over encrypted cloud data

Yinbin Miao et al.

INFORMATION SCIENCES (2018)

Article Computer Science, Information Systems

Efficient Searchable Encryption Through Compression

Ioannis Demertzis et al.

PROCEEDINGS OF THE VLDB ENDOWMENT (2018)

Proceedings Paper Computer Science, Theory & Methods

Storage Efficient Substring Searchable Symmetric Encryption

Iraklis Leontiadis et al.

SCC'18: PROCEEDINGS OF THE 6TH INTERNATIONAL WORKSHOP ON SECURITY IN CLOUD COMPUTING (2018)

Proceedings Paper Computer Science, Theory & Methods

Practical Backward-Secure Searchable Encryption from Symmetric Puncturable Encryption

Shi-Feng Sun et al.

PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18) (2018)

Proceedings Paper Computer Science, Theory & Methods

Result Pattern Hiding Searchable Encryption for Conjunctive Queries

Shangqi Lai et al.

PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18) (2018)

Proceedings Paper Computer Science, Theory & Methods

New Constructions for Forward and Backward Private Symmetric Searchable Encryption

Javad Ghareh Chamani et al.

PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18) (2018)

Proceedings Paper Computer Science, Information Systems

Practical and Secure Substring Search

Florian Hahn et al.

SIGMOD'18: PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA (2018)

Article Computer Science, Information Systems

Substring search over encrypted data

Tarik Moataz et al.

JOURNAL OF COMPUTER SECURITY (2018)

Article Computer Science, Theory & Methods

Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data

Zhangjie Fu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Computer Science, Theory & Methods

Enabling Central Keyword-Based Semantic Extension Search Over Encrypted Outsourced Data

Zhangjie Fu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Computer Science, Information Systems

Enabling efficient and verifiable multi-keyword ranked search over encrypted cloud data

Xiuxiu Jiang et al.

INFORMATION SCIENCES (2017)

Proceedings Paper Computer Science, Information Systems

Fast Searchable Encryption With Tunable Locality

Ioannis Demertzis et al.

SIGMOD'17: PROCEEDINGS OF THE 2017 ACM INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA (2017)

Proceedings Paper Computer Science, Information Systems

Forward Secure Dynamic Searchable Symmetric Encryption with Efficient Updates

Kee Sung Kim et al.

CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2017)

Proceedings Paper Computer Science, Information Systems

Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives

Raphael Bost et al.

CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2017)

Article Computer Science, Theory & Methods

Searchable Symmetric Encryption: Designs and Challe

Geong Sen Poh et al.

ACM COMPUTING SURVEYS (2017)

Article Computer Science, Hardware & Architecture

Enabling Fine-Grained Multi-Keyword Search Supporting Classified Sub-Dictionaries over Encrypted Cloud Data

Hongwei Li et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2016)

Article Computer Science, Theory & Methods

A Web Traffic Analysis Attack Using Only Timing Information

Saman Feghhi et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)

Article Computer Science, Theory & Methods

Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement

Zhangjie Fu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)

Article Computer Science, Theory & Methods

An Efficient Privacy-Preserving Ranked Keyword Search Method

Chi Chen et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2016)

Article Computer Science, Theory & Methods

A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data

Zhihua Xia et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2016)

Proceedings Paper Computer Science, Information Systems

The Shadow Nemesis: Inference Attacks on Efficiently Deployable, Efficiently Searchable Encryption

David Pouliot et al.

CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2016)

Proceedings Paper Computer Science, Information Systems

Generic Attacks on Secure Outsourced Databases

Georgios Kellaris et al.

CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2016)

Proceedings Paper Computer Science, Information Systems

Σοφοζ - Forward Secure Searchable Encryption

Raphael Bost

CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2016)

Proceedings Paper Computer Science, Theory & Methods

Executing Boolean Queries on an Encrypted Bitmap Index

Mohamed Ahmed Abdelraheem et al.

CCSW'16: PROCEEDINGS OF THE 2016 ACM CLOUD COMPUTING SECURITY WORKSHOP (2016)

Article Computer Science, Information Systems

Enabling Efficient Multi-Keyword Ranked Search Over Encrypted Mobile Cloud Data Through Blind Storage

Hongwei Li et al.

IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING (2015)

Article Computer Science, Theory & Methods

A Survey of Provably Secure Searchable Encryption

Christoph Bosch et al.

ACM COMPUTING SURVEYS (2015)

Proceedings Paper Computer Science, Information Systems

Substring Position Search over Encrypted Cloud Data using Tree-based Index

Mikhail Strizhov et al.

2015 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E 2015) (2015)

Proceedings Paper Computer Science, Information Systems

Leakage-Abuse Attacks Against Searchable Encryption

David Cash et al.

CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2015)

Article Engineering, Electrical & Electronic

Achieving Effective Cloud Search Services: Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Synonym Query

Zhangjie Fu et al.

IEEE TRANSACTIONS ON CONSUMER ELECTRONICS (2014)

Article Computer Science, Theory & Methods

Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data

Ning Cao et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2014)

Article Computer Science, Information Systems

Search pattern leakage in searchable encryption: Attacks and new construction

Chang Liu et al.

INFORMATION SCIENCES (2014)

Article Computer Science, Information Systems

Fast Range Query Processing with Strong Privacy Protection for Cloud Computing

Rui Li et al.

PROCEEDINGS OF THE VLDB ENDOWMENT (2014)

Proceedings Paper Computer Science, Theory & Methods

Efficient Fuzzy Search Engine with B -Tree Search Mechanism

Simran Bijral et al.

2014 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY (ICIT) (2014)

Article Computer Science, Information Systems

Efficient Verifiable Fuzzy Keyword Search over Encrypted Data in Cloud Computing

Jianfeng Wang et al.

COMPUTER SCIENCE AND INFORMATION SYSTEMS (2013)

Article Computer Science, Hardware & Architecture

Toward Secure Multikeyword Top-k Retrieval over Encrypted Cloud Data

Jiadi Yu et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2013)

Article Computer Science, Theory & Methods

Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data

Cong Wang et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2012)

Article Computer Science, Hardware & Architecture

Secure multidimensional range queries over outsourced data

Bijit Hore et al.

VLDB JOURNAL (2012)

Article Mathematics, Applied

Position heaps: A simple and dynamic text indexing data structure

Andrzej Ehrenfeucht et al.

JOURNAL OF DISCRETE ALGORITHMS (2011)