IDEAS home Printed from https://ideas.repec.org/a/gam/jftint/v8y2016i3p28-d73291.html
   My bibliography  Save this article

Substring Position Search over Encrypted Cloud Data Supporting Efficient Multi-User Setup

Author

Listed:
  • Mikhail Strizhov

    (Computer Science Department, Colorado State University, Fort Collins, CO 80523, USA)

  • Zachary Osman

    (Computer Science Department, Colorado State University, Fort Collins, CO 80523, USA)

  • Indrajit Ray

    (Computer Science Department, Colorado State University, Fort Collins, CO 80523, USA)

Abstract

Existing Searchable Encryption (SE) solutions are able to handle simple Boolean search queries, such as single or multi-keyword queries, but cannot handle substring search queries over encrypted data that also involve identifying the position of the substring within the document. These types of queries are relevant in areas such as searching DNA data. In this paper, we propose a tree-based Substring Position Searchable Symmetric Encryption (SSP-SSE) to overcome the existing gap. Our solution efficiently finds occurrences of a given substring over encrypted cloud data. Specifically, our construction uses the position heap tree data structure and achieves asymptotic efficiency comparable to that of an unencrypted position heap tree. Our encryption takes O ( k n ) time, and the resulting ciphertext is of size O ( k n ) , where k is a security parameter and n is the size of stored data. The search takes O ( m 2 + o c c ) time and three rounds of communication, where m is the length of the queried substring and o c c is the number of occurrences of the substring in the document collection. We prove that the proposed scheme is secure against chosen-query attacks that involve an adaptive adversary. Finally, we extend SSP-SSE to the multi-user setting where an arbitrary group of cloud users can submit substring queries to search the encrypted data.

Suggested Citation

  • Mikhail Strizhov & Zachary Osman & Indrajit Ray, 2016. "Substring Position Search over Encrypted Cloud Data Supporting Efficient Multi-User Setup," Future Internet, MDPI, vol. 8(3), pages 1-26, July.
  • Handle: RePEc:gam:jftint:v:8:y:2016:i:3:p:28-:d:73291
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/1999-5903/8/3/28/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/1999-5903/8/3/28/
    Download Restriction: no
    ---><---

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jftint:v:8:y:2016:i:3:p:28-:d:73291. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.