Abstract
In the area of information retrieval, in order to improve search accuracy and reduce communication overhead, there is an increasing tendency to adopt ranked search in engines. Ranked search allows cloud servers to search for the top k most relevant documents based on the relevance score between the query keywords and the documents. Recently, with the increasing popularity of encrypted search technologies, ranked searchable encryption is proposed accordingly which focuses on solving ranked search problem over encrypted databases. However, recent studies show that some privacy protection methods commonly used in ranked searchable encryption, like order-preserving encryption (OPE), have some security problems. These problems may lead to the leakage of the relevant ranking privacy information. Meanwhile, most of the existing ranked searchable encryption schemes do not consider the problem of payment for outsourced services. In this paper, we propose a scheme called ranked searchable encryption based on differential privacy and blockchain (DPB-RSE). Specifically, we first add noise drawn from a Laplace distribution into the relevance score to disturb its value. Then we design a smart contract to verify the correctness of the results returned by the cloud server and realize payment fairness. The experiment results demonstrate that the accuracy of search results in this scheme can reach 94% in a small privacy budge.
Similar content being viewed by others
References
Ge, C., Susilo, W., Liu, Z., Xia, J., Szalachowski, P., & Fang, L. (2020). Secure keyword search and data sharing mechanism for cloud computing. IEEE Transactions on Dependable and Secure Computing, 18(6), 2787–2800.
Boneh, D., Di Crescenzo, G., Ostrovsky, R., & Persiano, G. (2004). Public key encryption with keyword search. In Proceedings of of CRYPTO (pp. 506–522). Springer.
Boneh, D., Di Crescenzo, G., Ostrovsky, R., & Persiano, G. (2007). Public key encryption with conjunctive keyword search and its extension to a multi-user system. In Proceedings of Pairing (pp. 2–22). Springer.
Boneh, D., Di Crescenzo, G., Ostrovsky, R., & Persiano, G. (2004). Public key encryption with conjunctive field keyword search. In Proceedings of WISA (pp. 73–86). Springer.
Xu, Lei, Yuan, Xingliang, Zhou, Zhengxiang, Wang, Cong, & Xu, Chungen. (2021). Towards efficient cryptographic data validation service in edge computing. IEEE Transactions on Services Computing, 1, 1.
Miao, Y., Zheng, W., Jia, X., Liu, X., Choo, K.-K.R., & Deng, R. (2022). Ranked keyword search over encrypted cloud data through machine learning method. IEEE Transactions on Services Computing, 1, 1.
Wang, C, Cao, N, Li, J, Ren, K, & Lou, W. (2010). Secure ranked keyword search over encrypted cloud data. In Proceedings of ICDCS (pp. 253–262). IEEE.
Li, K., Zhang, W., Yang, C., & Nenghai, Yu. (2015). Security analysis on one-to-many order preserving encryption-based cloud data search. IEEE Transactions on Information Forensics and Security, 10(9), 1918–1926.
Zarezadeh, M., Mala, H., & Ashouri-Talouki, M. (2020). Multi-keyword ranked searchable encryption scheme with access control for cloud storage. Peer-to-Peer Networking and Applications, 13(1), 207–218.
Rakesh, A., Jerry, K., Ramakrishnan, S., & Xu, Y. (2004). Order-preserving encryption for numeric data. In Proceedings of ACM SIGMOD (pp. 563–574). ACM.
Abdulatif, A., Ibrahim, K., & Xun, Y. (2020). Towards secure big data analytic for cloud-enabled applications with fully homomorphic encryption. Journal of Parallel and Distributed Computing, 137, 192–204.
Alexandra, B., Nathan, C., Younho, L., & Adam, O. (2009). Order-preserving symmetric encryption. In Proceedings of EUROCRYPT (pp. 224–241). Springer.
Cao, N., Wang, C., Li, M., Ren, K., & Lou, W. (2011). Privacy-preserving multi-keyword ranked search over encrypted cloud data. In Proceedings of IEEE INFOCOM (pp. 829–837). IEEE.
Reza, C., Garay, J. A., Seny, K., & Rafail, O. (2006). Searchable symmetric encryption: Improved definitions and efficient constructions. In Proceedings of ACM CCS (pp. 79–88). ACM.
Ding, B., Kulkarni, J., & Yekhanin, S. (2017). Collecting telemetry data privately. In Proceedings of NIPS (pp. 3571–3580).
Benjamin, F., Mayank, V., Arkady, Y., Shen, E., Hamlin, A., Gadepally, V., Shay, R., Mitchell, J. D., & Cunningham, R. K. (2017). Sok: Cryptographically protected database search. In Proceedings of IEEE S &P (pp. 172–191). IEEE.
Betül, D. F., DuBuisson, T. M., & Cash, D. (2016). What else is revealed by order-revealing encryption? In Proceedings of ACM CCS (pp. 1155–1166). ACM.
Dwork, C. (2006). Differential privacy: A survey of results. In Proceedings of TAMC (pp. 1–12). Springer.
Zhang, Y., Deng, R. H., Liu, X., & Zheng, D. (2018). Blockchain based efficient and robust fair payment for outsourcing services in cloud computing. Information Sciences, 462, 262–277.
Song, D. X., Wagner, D., & Perrig, A. (2000). Practical techniques for searches on encrypted data. In Proceedings of IEEE S &P (pp. 44–55). IEEE.
Goh, E.-J.. (2003). Secure indexes. Cryptology ePrint Archive.
Seny, K., Charalampos, P., & Roeder, T. (2012). Dynamic searchable symmetric encryption. In Proceedings of ACM CCS (pp. 965–976). ACM.
Sun, S.-F., Steinfeld, R., Lai, S., Yuan, X., Sakzad, A., Liu, J. K., Nepal, S., & Gu, D. (2021). Practical non-interactive searchable encryption with forward and backward privacy. In Proceedings of NDSS. The Internet Society.
Lei, X., Huayi, D., Anxin, Z., Xingliang, Y., & Cong, W. (2021). Interpreting and mitigating leakage-abuse attacks in searchable symmetric encryption. IEEE Transactions on Information Forensics and Security, 16, 5310–5325.
Chen, T., Xu, P., Wang, W., Zheng, Y., Susilo, W., & Jin, H. (2021). Bestie: Very practical searchable encryption with forward and backward security. In Proceedings of ESORICS (pp. 3–23). Springer.
Sun, W., Wang, B., Cao, N., Li, M., Lou, W., Hou, Y. T., & Li, H. (2014). Verifiable privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. IEEE Transactions on Parallel Distributed System, 25(11), 3025–3035.
Liu, Qin, Tian, Yue, Wu, Jie, Peng, Tao, & Wang, Guojun. (2019). Enabling verifiable and dynamic ranked search over outsourced data. IEEE Transactions on Services Computing, 15, 69–82.
Yang, Y., Ximeng, L., & Deng, R. H. (2020). Multi-user multi-keyword rank search over encrypted data in arbitrary language. IEEE Transactions on Dependable and Secure Computing, 17, 320–334.
Popa, R. A., Li, F. H., & Nickolai, Z. (2013). An ideal-security protocol for order-preserving encoding. In Proceedings of IEEE S &P (pp. 463–477). IEEE.
Paul, G., Kevin, S., Vincent, B., Muhammad, N., & Thomas, R. (2017). Leakage-abuse attacks against order-revealing encryption. In Proceedings of IEEE S &P (pp. 655–672). IEEE.
Dwork, C., & Roth, A. (2014). The algorithmic foundations of differential privacy. Foundations and Trends in Theoretical Computer Science, 9(3–4), 211–407.
Friedman, A., & Schuster, A. (2010). Data mining with differential privacy. In Proceedings of ACM SIGKDD (pp. 493–502). ACM.
Duchi, J. C., Jordan, M. I., & Wainwright, M. J. (2013). Local privacy and statistical minimax rates. In Proceedings of IEEE FOCS (pp. 429–438). IEEE.
Kasiviswanathan, S. P., Lee, H. K., Nissim, K., Raskhodnikova, S., & Smith, A. D. (2008). What can we learn privately? In Proceedings of IEEE FOCS (pp. 531–540). IEEE.
Ji, Z., Lipton, Z. C., & Elkan, C. (2014). Differential privacy and machine learning: A survey and review. arXiv preprint arXiv:1412.7584
Wei, K., Li, J., Ding, M., Ma, C., Yang, H. H., Farokhi, F., et al. (2020). Federated learning with differential privacy: Algorithms and performance analysis. IEEE Transation Information Forensics Security, 15, 3454–3469.
Wang, T., Ding, B., Zhou, J., Hong, C., Huang, Z., Li, N., & Jha, S. (2019). Answering multi-dimensional analytical queries under local differential privacy. In Proceedings of ACM SIGMOD (pp. 159–176). ACM.
Úlfar, E., Vasyl, P., & Aleksandra, K. (2014). RAPPOR: Randomized aggregatable privacy-preserving ordinal response. In Proceedings of ACM CCS (pp. 1054–1067). ACM.
Liu, Q., Nie, X., Liu, X., Peng, T., & Wu, J. (2017). Verifiable ranked search over dynamic encrypted data in cloud computing. In Proceedings of IEEE IWQoS (pp. 1–6). IEEE.
Jiang, X., Jia, Yu., Yan, J., & Hao, R. (2017). Enabling efficient and verifiable multi-keyword ranked search over encrypted cloud data. Information Sciences, 403, 22–41.
Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review (p. 21260).
Griggs, K. N., Ossipova, O., Kohlios, C. P., Baccarini, A. N., Howson, E. A., & Hayajneh, T. (2018). Healthcare blockchain system using smart contracts for secure automated remote patient monitoring. Journal of Medical Systems, 42, 130:1-130:7.
Lin, Chao, He, Debiao, Huang, Xinyi, Choo, Kim-Kwang Raymond., & Vasilakos, Athanasios V. (2018). Bsein: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0. Journal of Network and Computer Applications, 116, 42–52.
Wood, G., et al. (2014). Ethereum: A secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper, 151, 1–32.
Li, H., Zhang, F., He, J., & Tian, H. (2017). A searchable symmetric encryption scheme using blockchain. arXiv preprint arXiv:1711.01030
Li, H., Tian, H., Zhang, F., & He, J. (2019). Blockchain-based searchable symmetric encryption scheme. Computers & Electrical Engineering, 73, 32–45.
Hu, S., Cai, C., Wang, Q., Wang, C., Luo, X., & Ren, K. (2018). Searching an encrypted cloud meets blockchain: A decentralized, reliable and fair realization. In Proceedings of IEEE INFOCOM (pp. 792–800). IEEE.
Chen, L., Lee, W.-K., Chang, C.-C., Choo, K.-K.R., & Zhang, N. (2019). Blockchain based searchable encryption for electronic health record sharing. Future Generation Computer Systems, 95, 420–429.
Li, H., Wang, T., Qiao, Z., Yang, B., Gong, Y., Wang, J., & Qiu, G. (2021). Blockchain-based searchable encryption with efficient result verification and fair payment. Journal of Information Security and Applications, 58, 102791.
Zhao, Y., Xu, C., Mei, L., & Zhang, P. (2021). Privacy-preserving ranked searchable encryption based on differential privacy. In Proceedings of QShine (pp. 323–339). Springer.
Dannen, C. (2017). Introducing Ethereum and solidity. Springer.
Delmolino, K., Arnett, M., Kosba, A., Miller, A., & Shi, E. (2016). Step by step towards creating a safe smart contract: Lessons and insights from a cryptocurrency lab. In Proceedings of FC (pp. 79–94). Springer.
Acknowledgements
Thanks to the National Natural Science Foundation of China under Grant No. 62072240, the National Key Research and Development Program of China under Grant 2020YFB1804604 and the Natural Science Foundation of Jiangsu Province under Grant No. BK20210330 for financial support.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Xu, C., Zhang, P., Mei, L. et al. Ranked searchable encryption based on differential privacy and blockchain. Wireless Netw 30, 4735–4748 (2024). https://doi.org/10.1007/s11276-022-03109-3
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11276-022-03109-3