[go: up one dir, main page]

Skip to main content

Advertisement

Log in

Ranked searchable encryption based on differential privacy and blockchain

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

In the area of information retrieval, in order to improve search accuracy and reduce communication overhead, there is an increasing tendency to adopt ranked search in engines. Ranked search allows cloud servers to search for the top k most relevant documents based on the relevance score between the query keywords and the documents. Recently, with the increasing popularity of encrypted search technologies, ranked searchable encryption is proposed accordingly which focuses on solving ranked search problem over encrypted databases. However, recent studies show that some privacy protection methods commonly used in ranked searchable encryption, like order-preserving encryption (OPE), have some security problems. These problems may lead to the leakage of the relevant ranking privacy information. Meanwhile, most of the existing ranked searchable encryption schemes do not consider the problem of payment for outsourced services. In this paper, we propose a scheme called ranked searchable encryption based on differential privacy and blockchain (DPB-RSE). Specifically, we first add noise drawn from a Laplace distribution into the relevance score to disturb its value. Then we design a smart contract to verify the correctness of the results returned by the cloud server and realize payment fairness. The experiment results demonstrate that the accuracy of search results in this scheme can reach 94% in a small privacy budge.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Ge, C., Susilo, W., Liu, Z., Xia, J., Szalachowski, P., & Fang, L. (2020). Secure keyword search and data sharing mechanism for cloud computing. IEEE Transactions on Dependable and Secure Computing, 18(6), 2787–2800.

    Google Scholar 

  2. Boneh, D., Di Crescenzo, G., Ostrovsky, R., & Persiano, G. (2004). Public key encryption with keyword search. In Proceedings of of CRYPTO (pp. 506–522). Springer.

  3. Boneh, D., Di Crescenzo, G., Ostrovsky, R., & Persiano, G. (2007). Public key encryption with conjunctive keyword search and its extension to a multi-user system. In Proceedings of Pairing (pp. 2–22). Springer.

  4. Boneh, D., Di Crescenzo, G., Ostrovsky, R., & Persiano, G. (2004). Public key encryption with conjunctive field keyword search. In Proceedings of WISA (pp. 73–86). Springer.

  5. Xu, Lei, Yuan, Xingliang, Zhou, Zhengxiang, Wang, Cong, & Xu, Chungen. (2021). Towards efficient cryptographic data validation service in edge computing. IEEE Transactions on Services Computing, 1, 1.

    Google Scholar 

  6. Miao, Y., Zheng, W., Jia, X., Liu, X., Choo, K.-K.R., & Deng, R. (2022). Ranked keyword search over encrypted cloud data through machine learning method. IEEE Transactions on Services Computing, 1, 1.

    Article  Google Scholar 

  7. Wang, C, Cao, N, Li, J, Ren, K, & Lou, W. (2010). Secure ranked keyword search over encrypted cloud data. In Proceedings of ICDCS (pp. 253–262). IEEE.

  8. Li, K., Zhang, W., Yang, C., & Nenghai, Yu. (2015). Security analysis on one-to-many order preserving encryption-based cloud data search. IEEE Transactions on Information Forensics and Security, 10(9), 1918–1926.

    Article  Google Scholar 

  9. Zarezadeh, M., Mala, H., & Ashouri-Talouki, M. (2020). Multi-keyword ranked searchable encryption scheme with access control for cloud storage. Peer-to-Peer Networking and Applications, 13(1), 207–218.

    Article  Google Scholar 

  10. Rakesh, A., Jerry, K., Ramakrishnan, S., & Xu, Y. (2004). Order-preserving encryption for numeric data. In Proceedings of ACM SIGMOD (pp. 563–574). ACM.

  11. Abdulatif, A., Ibrahim, K., & Xun, Y. (2020). Towards secure big data analytic for cloud-enabled applications with fully homomorphic encryption. Journal of Parallel and Distributed Computing, 137, 192–204.

    Article  Google Scholar 

  12. Alexandra, B., Nathan, C., Younho, L., & Adam, O. (2009). Order-preserving symmetric encryption. In Proceedings of EUROCRYPT (pp. 224–241). Springer.

  13. Cao, N., Wang, C., Li, M., Ren, K., & Lou, W. (2011). Privacy-preserving multi-keyword ranked search over encrypted cloud data. In Proceedings of IEEE INFOCOM (pp. 829–837). IEEE.

  14. Reza, C., Garay, J. A., Seny, K., & Rafail, O. (2006). Searchable symmetric encryption: Improved definitions and efficient constructions. In Proceedings of ACM CCS (pp. 79–88). ACM.

  15. Ding, B., Kulkarni, J., & Yekhanin, S. (2017). Collecting telemetry data privately. In Proceedings of NIPS (pp. 3571–3580).

  16. Benjamin, F., Mayank, V., Arkady, Y., Shen, E., Hamlin, A., Gadepally, V., Shay, R., Mitchell, J. D., & Cunningham, R. K. (2017). Sok: Cryptographically protected database search. In Proceedings of IEEE S &P (pp. 172–191). IEEE.

  17. Betül, D. F., DuBuisson, T. M., & Cash, D. (2016). What else is revealed by order-revealing encryption? In Proceedings of ACM CCS (pp. 1155–1166). ACM.

  18. Dwork, C. (2006). Differential privacy: A survey of results. In Proceedings of TAMC (pp. 1–12). Springer.

  19. Zhang, Y., Deng, R. H., Liu, X., & Zheng, D. (2018). Blockchain based efficient and robust fair payment for outsourcing services in cloud computing. Information Sciences, 462, 262–277.

    Article  MathSciNet  Google Scholar 

  20. Song, D. X., Wagner, D., & Perrig, A. (2000). Practical techniques for searches on encrypted data. In Proceedings of IEEE S &P (pp. 44–55). IEEE.

  21. Goh, E.-J.. (2003). Secure indexes. Cryptology ePrint Archive.

  22. Seny, K., Charalampos, P., & Roeder, T. (2012). Dynamic searchable symmetric encryption. In Proceedings of ACM CCS (pp. 965–976). ACM.

  23. Sun, S.-F., Steinfeld, R., Lai, S., Yuan, X., Sakzad, A., Liu, J. K., Nepal, S., & Gu, D. (2021). Practical non-interactive searchable encryption with forward and backward privacy. In Proceedings of NDSS. The Internet Society.

  24. Lei, X., Huayi, D., Anxin, Z., Xingliang, Y., & Cong, W. (2021). Interpreting and mitigating leakage-abuse attacks in searchable symmetric encryption. IEEE Transactions on Information Forensics and Security, 16, 5310–5325.

    Article  Google Scholar 

  25. Chen, T., Xu, P., Wang, W., Zheng, Y., Susilo, W., & Jin, H. (2021). Bestie: Very practical searchable encryption with forward and backward security. In Proceedings of ESORICS (pp. 3–23). Springer.

  26. Sun, W., Wang, B., Cao, N., Li, M., Lou, W., Hou, Y. T., & Li, H. (2014). Verifiable privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. IEEE Transactions on Parallel Distributed System, 25(11), 3025–3035.

    Article  Google Scholar 

  27. Liu, Qin, Tian, Yue, Wu, Jie, Peng, Tao, & Wang, Guojun. (2019). Enabling verifiable and dynamic ranked search over outsourced data. IEEE Transactions on Services Computing, 15, 69–82.

    Article  Google Scholar 

  28. Yang, Y., Ximeng, L., & Deng, R. H. (2020). Multi-user multi-keyword rank search over encrypted data in arbitrary language. IEEE Transactions on Dependable and Secure Computing, 17, 320–334.

    Article  Google Scholar 

  29. Popa, R. A., Li, F. H., & Nickolai, Z. (2013). An ideal-security protocol for order-preserving encoding. In Proceedings of IEEE S &P (pp. 463–477). IEEE.

  30. Paul, G., Kevin, S., Vincent, B., Muhammad, N., & Thomas, R. (2017). Leakage-abuse attacks against order-revealing encryption. In Proceedings of IEEE S &P (pp. 655–672). IEEE.

  31. Dwork, C., & Roth, A. (2014). The algorithmic foundations of differential privacy. Foundations and Trends in Theoretical Computer Science, 9(3–4), 211–407.

    MathSciNet  Google Scholar 

  32. Friedman, A., & Schuster, A. (2010). Data mining with differential privacy. In Proceedings of ACM SIGKDD (pp. 493–502). ACM.

  33. Duchi, J. C., Jordan, M. I., & Wainwright, M. J. (2013). Local privacy and statistical minimax rates. In Proceedings of IEEE FOCS (pp. 429–438). IEEE.

  34. Kasiviswanathan, S. P., Lee, H. K., Nissim, K., Raskhodnikova, S., & Smith, A. D. (2008). What can we learn privately? In Proceedings of IEEE FOCS (pp. 531–540). IEEE.

  35. Ji, Z., Lipton, Z. C., & Elkan, C. (2014). Differential privacy and machine learning: A survey and review. arXiv preprint arXiv:1412.7584

  36. Wei, K., Li, J., Ding, M., Ma, C., Yang, H. H., Farokhi, F., et al. (2020). Federated learning with differential privacy: Algorithms and performance analysis. IEEE Transation Information Forensics Security, 15, 3454–3469.

    Article  Google Scholar 

  37. Wang, T., Ding, B., Zhou, J., Hong, C., Huang, Z., Li, N., & Jha, S. (2019). Answering multi-dimensional analytical queries under local differential privacy. In Proceedings of ACM SIGMOD (pp. 159–176). ACM.

  38. Úlfar, E., Vasyl, P., & Aleksandra, K. (2014). RAPPOR: Randomized aggregatable privacy-preserving ordinal response. In Proceedings of ACM CCS (pp. 1054–1067). ACM.

  39. Liu, Q., Nie, X., Liu, X., Peng, T., & Wu, J. (2017). Verifiable ranked search over dynamic encrypted data in cloud computing. In Proceedings of IEEE IWQoS (pp. 1–6). IEEE.

  40. Jiang, X., Jia, Yu., Yan, J., & Hao, R. (2017). Enabling efficient and verifiable multi-keyword ranked search over encrypted cloud data. Information Sciences, 403, 22–41.

    Article  Google Scholar 

  41. Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review (p. 21260).

  42. Griggs, K. N., Ossipova, O., Kohlios, C. P., Baccarini, A. N., Howson, E. A., & Hayajneh, T. (2018). Healthcare blockchain system using smart contracts for secure automated remote patient monitoring. Journal of Medical Systems, 42, 130:1-130:7.

    Article  Google Scholar 

  43. Lin, Chao, He, Debiao, Huang, Xinyi, Choo, Kim-Kwang Raymond., & Vasilakos, Athanasios V. (2018). Bsein: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0. Journal of Network and Computer Applications, 116, 42–52.

    Article  Google Scholar 

  44. Wood, G., et al. (2014). Ethereum: A secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper, 151, 1–32.

    Google Scholar 

  45. Li, H., Zhang, F., He, J., & Tian, H. (2017). A searchable symmetric encryption scheme using blockchain. arXiv preprint arXiv:1711.01030

  46. Li, H., Tian, H., Zhang, F., & He, J. (2019). Blockchain-based searchable symmetric encryption scheme. Computers & Electrical Engineering, 73, 32–45.

    Article  Google Scholar 

  47. Hu, S., Cai, C., Wang, Q., Wang, C., Luo, X., & Ren, K. (2018). Searching an encrypted cloud meets blockchain: A decentralized, reliable and fair realization. In Proceedings of IEEE INFOCOM (pp. 792–800). IEEE.

  48. Chen, L., Lee, W.-K., Chang, C.-C., Choo, K.-K.R., & Zhang, N. (2019). Blockchain based searchable encryption for electronic health record sharing. Future Generation Computer Systems, 95, 420–429.

    Article  Google Scholar 

  49. Li, H., Wang, T., Qiao, Z., Yang, B., Gong, Y., Wang, J., & Qiu, G. (2021). Blockchain-based searchable encryption with efficient result verification and fair payment. Journal of Information Security and Applications, 58, 102791.

    Article  Google Scholar 

  50. Zhao, Y., Xu, C., Mei, L., & Zhang, P. (2021). Privacy-preserving ranked searchable encryption based on differential privacy. In Proceedings of QShine (pp. 323–339). Springer.

  51. Dannen, C. (2017). Introducing Ethereum and solidity. Springer.

    Book  Google Scholar 

  52. Delmolino, K., Arnett, M., Kosba, A., Miller, A., & Shi, E. (2016). Step by step towards creating a safe smart contract: Lessons and insights from a cryptocurrency lab. In Proceedings of FC (pp. 79–94). Springer.

Download references

Acknowledgements

Thanks to the National Natural Science Foundation of China under Grant No. 62072240, the National Key Research and Development Program of China under Grant 2020YFB1804604 and the Natural Science Foundation of Jiangsu Province under Grant No. BK20210330 for financial support.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chungen Xu.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Xu, C., Zhang, P., Mei, L. et al. Ranked searchable encryption based on differential privacy and blockchain. Wireless Netw 30, 4735–4748 (2024). https://doi.org/10.1007/s11276-022-03109-3

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-022-03109-3

Keywords

Navigation