Abstract
In cloud computing, a cloud user can improve a system’s reliability by utilizing services from multiple clouds, known as the multi-cloud service model. This model, however, causes serious security concerns since multi-clouds increase the chance of being attacked. To maintain data security, a commonly-used strategy is to encrypt data stored in clouds. Yet, issues such as inconsistent data storage (Byzantine faults), dynamic data update, and inefficient data retrieval among multiple clouds, have remained as open challenges. In this paper, we propose a multi-cloud secure similarity search (MC3S) method to effectively and efficiently utilize the encrypted data over multiple clouds. To achieve secure, flexible and high-efficient data search, MC3S utilizes two novel data structures, called gram-filter and prefix-ring. Different from prior works in secure data search, we address the problem of Byzantine faults among multiple clouds, and our algorithm enables dynamic data index insertion and revocation without decryption. We prove that MC3S can resist chosen-keyword attacks and achieve non-adaptive semantic security. Finally, we evaluate the efficiency of MC3S with real world datasets.
Similar content being viewed by others
References
Mell P, Grance T (2011) The nist definition of cloud computing [recommendations of the national institute of standards and technology-special publication 800-145]. URL Recuperado de http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145
Armbrust M, Fox A, Griffith R, Joseph AD, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I (2010) A view of cloud computing. Commun ACM 53(4):50
Kuang L, Yang L, Feng J, Dong M (2018) Secure tensor decomposition using fully homomorphic encryption scheme. IEEE Trans Cloud Comput 6(3):868
Chang S, Zhu H, Dong M, Ota K, Liu X, Shen X (2016) Private and flexible urban message delivery. IEEE Trans Veh Technol 65(7):4900
He J, Dong M, Ota K, Fan M, Wang G (2016) Netseccc: a scalable and fault-tolerant architecture for cloud computing security. Peer-to-Peer Netw Appl 9(1):67
Zhang L, Wei L, Huang D, Zhang K, Dong M, Ota K (2016) Medaps: secure multi-entities delegated authentication protocols for mobile cloud computing. Secur Commun Netw 9(16):3777
Li M, Yu S, Zheng Y, Ren K, Lou W (2013) Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans Parallel Distrib Syst 24(1):131
Song DX, Wagner D, Perrig A (2000) In: Proc. of IEEE symposium on security and privacy. Oakland, pp 44–55
Wang C, Cao N, Ren K, Lou W (2012) Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Trans Parallel Distrib Syst 23(8):1467
Cao N, Wang C, Li M, Ren K, Lou W (2014) Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans Parallel Distrib Syst 25(1):222
Li J, Wang Q, Wang C, Cao N, Ren K, Lou W (2010) In: Proc. of IEEE INFOCOM. San Diego, pp 1–5
Wang C, Ren K, Yu S, Urs KMR (2012) In: Proc. of IEEE INFOCOM. Orlando, pp 451–459
Wen M, Lu R, Zhang K, Lei J, Liang X, Shen X (2013) Parq: a privacy-preserving range query scheme over encrypted metering data for smart grid. IEEE Trans Emerg Topics Comput 1(1):178
Zhang W, Lin Y, Xiao S, Liu Q, Zhou T (2014) In: Proc. of IEEE international symposium of quality of service (IWQoS). HongKong, pp 370–379
AlZain MA, Soh B, Pardede E (2013) In: IEEE international conference on computational science and engineering. Sydney, pp 130–137
Veronese GS, Correia M, Bessani AN, Lung LC, Verissimo P (2013) Efficient byzantine fault-tolerance. IEEE Trans Comput 62(1):16
Goh EJ (2003) Secure indexes. IACR Cryptol ePrint Archive 2003:216
Chang YC, Mitzenmacher M (2005) In: Proc. of applied cryptography and network security. New York, pp 442–455
Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G (2004) In: Proc. of advances in cryptology-eurocrypt. Interlaken, pp 506–522
Duan S, Peisert S, Levitt KN (2015) hbft: speculative byzantine fault tolerance with minimum cost. IEEE Trans Depend Sec Comput 12(1):58
Curtmola R, Garay J, Kamara S, Ostrovsky R (2011) Searchable symmetric encryption: improved definitions and efficient constructions. J Comput Secur 19(5):895
Zhang Z, Hadjieleftheriou M, Ooi BC, Srivastava D (2010) In: Proc. of ACM SIGMOD international conference on management of data. Indianapolis, pp 915–926
Chuah M, Hu W (2011) In: Proc. of international conference on distributed computing systems workshops (ICDCSW). Minneapolis, pp 273–281
Broder A, Mitzenmacher M (2004) Network applications of bloom filters: a survey. Internet Math 1(4):485
Carter JL, Wegman MN (1977) In: Proc. of the annual ACM symposium on theory of computing. Boulder, pp 106–112
Ramakrishna M (1989) Practical performance of bloom filters and parallel free-text searching. Commun ACM 32(10):1237
Stoica I, Morris R, Liben-Nowell D, Karger DR, Kaashoek MF, Dabek F, Balakrishnan H (2003) Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Trans Network 11(1):17
Sahin OD, Emekci F, Agrawal D, Abbadi AE (2004) In: Proc. of databases, information systems, and peer-to-peer computing. Toronto, pp 61–78
Cheng J, Hao Y, Wong SHY, Zerfos P, Songwu L (2007) In: Proc. of IEEE international conference on network protocols (ICNP). Bejing, pp 284–293
Chen F, Liu AX (2012) Privacy- and integrity-preserving range queries in sensor networks. IEEE/ACM Trans Network 20(6):1774
Chang YK (2007) Fast binary and multiway prefix searches for packet forwarding. Comput Netw 51(3):588
Song H, Dharmapurikar S, Turner J, Lockwood J (2005) In: Proc. of the conference on applications, technologies, architectures, and protocols for computer communications (SIGCOMM’05). Philadelphia, pp 181–192
Fan L, Cao P, Almeida J, Broder AZ (2000) Summary cache: a scalable wide-area web cache sharing protocol. IEEE/ACM Trans Network 8(3):281
Furukawa J, Sako K (2001) In: Advances in cryptology- proc. of CRYPTO. Santa Barbara, pp 368–387
Krawczyk H, Canetti R, Bellare M (1997) Hmac: keyed-hashing for message authentication. RFC 2104
Rivest R (1992) The md5 message-digest algorithm. RFC, 1321
Eastlake 3rd D, Jones P (2001) Us secure hash algorithm 1 (sha1). Report 2070–1721
Xu P, Jin H, Wu Q, Wang W (2013) Public-key encryption with fuzzy keyword search: a provably secure scheme under keyword guessing attack. IEEE Trans Comput 62(11):2266
Baek J, Safavi-Naini R, Susilo W (2008) Public key encryption with keyword search revisited. Computational Science and Its Applications–ICCSA 2008, pp 1249–1259
Katz J, Lindell Y (2014) Introduction to modern cryptography, 2nd edn. CRC Press
AMS (2016) Request for comments database. http://www.rfc-editor.org/rfc.html http://www.rfc-editor.org/rfc.html
Acknowledgements
This work was supported by the National Natural Science Foundation of China (No.61702321, 61772327, 61602295, 61572311, 61872230), the Excellent Young Teachers Program of Shanghai (No. ZZsdl15152), the Project of Shanghai Science and Technology Committee (No. 15110500700), the Dawn Program of Shanghai Education Commission (No. 16SG47).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Li, J., Wen, M., Wu, K. et al. Secure, flexible and high-efficient similarity search over encrypted data in multiple clouds. Peer-to-Peer Netw. Appl. 12, 893–911 (2019). https://doi.org/10.1007/s12083-018-0691-8
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-018-0691-8