Keyword Search Shareable Encryption for Fast and Secure Data Replication

Journal Article (2023)
Author(s)

Wei Wang (Huazhong University of Science and Technology)

Dongli Liu (Huazhong University of Science and Technology)

Peng Xu (Huazhong University of Science and Technology)

Laurence Tianruo Yang (Huazhong University of Science and Technology)

Katai Liang (TU Delft - Cyber Security)

Research Group
Cyber Security
Copyright
© 2023 Wei Wang, Dongli Liu, Peng Xu, Laurence Tianruo Yang, K. Liang
DOI related publication
https://doi.org/10.1109/TIFS.2023.3306941
More Info
expand_more
Publication Year
2023
Language
English
Copyright
© 2023 Wei Wang, Dongli Liu, Peng Xu, Laurence Tianruo Yang, K. Liang
Research Group
Cyber Security
Volume number
18
Pages (from-to)
5537-5552
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

It has become a trend for clients to outsource their encrypted databases to remote servers and then leverage the Searchable Encryption technique to perform secure data retrieval. However, the method has yet to be considered a crucial need for replication on searchable encrypted data. It calls for challenging works on Dynamic Searchable Symmetric Encryption (DSSE) since clients must share the search capability of the encrypted data replicas and guarantee forward and backward privacy. We define a new notion called 'Keyword Search Shareable Encryption' (KS2E2E) and the corresponding security model capturing forward and backward privacy. In our notion, data owners are allowed to share search indexes of the encrypted data with users. A search index will be updated with a new search key before sharing to guarantee the data privacy of the source database. The target database also inherits data search efficiency along with the shared data. We further construct an instance of KS2E called Branch, prove its security, and use real-world datasets to evaluate Branch. The evaluation results show that Branch's performance is comparable to classical DSSE schemes on search efficiency and demonstrate the effectiveness of searching encrypted data replicas from multiple owners.

Files

Keyword_Search_Shareable_Encry... (pdf)
(pdf | 9.08 Mb)
- Embargo expired in 26-02-2024
License info not available