A searchable asymmetric encryption scheme with support for boolean queries for cloud applications

  • Ming Zeng
  • , Kai Zhang*
  • , Haifeng Qian
  • , Xiaofeng Chen
  • , Jie Chen
  • *Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

20 Scopus citations

Abstract

Cloud computing is a new promising technology paradigm that can provide clients from the whole network with scalable storage resources and on-demand high-quality services. However, security concerns are raised when sensitive data are outsourced. Searchable encryption is a kind of cryptographic primitive that enables clients to selectively retrieve encrypted data, the existing schemes that support for sub-linear boolean queries are only considered in symmetric key setting, which makes a limitation for being widely deployed in many cloud applications. In order to address this issue, we propose a novel searchable asymmetric encryption scheme to support for sub-linear boolean query over encrypted data in a multi-client model that is extracted from an important observation that the outsourced database in cloud is continuously contributed and searched by multiple clients. For the purpose of introducing the scheme, we combine both the ideas of symmetric searchable encryption and public key searchable encryption and then design a novel secure inverted index. Furthermore, a detailed security analysis for our scheme is given under the simulation-based security definition. Finally, we conduct experiments for our construction on a real dataset (Enron) along with a performance analysis to show its practicality.

Original languageEnglish
Pages (from-to)563-578
Number of pages16
JournalComputer Journal
Volume62
Issue number4
DOIs
StatePublished - 1 Apr 2019

Keywords

  • Boolean query
  • Cloud security
  • Data security
  • Searchable encryption

Fingerprint

Dive into the research topics of 'A searchable asymmetric encryption scheme with support for boolean queries for cloud applications'. Together they form a unique fingerprint.

Cite this