Open Access
ARTICLE
Integrity Assurance Method of Multi-Keyword Query for Encrypted Outsourced Data
1 Engineering Research Center of Digital Forensics, Ministry of Education, School of Computer Science, Nanjing University of Information Science & Technology, Nanjing, 210044, China
2 Zhengde Polytechnic, Nanjing, 211106, China
3 Nanjing University of Aeronautics and Astronautics, Nanjing, 210008, China
4 Xi’an University of Posts & Telecommunications, Xi’an, 710061, China
5 Department of Cyber Security at VaporVM, Abu Dhabi, 999041, United Arab Emirates
* Corresponding Author: Xiaowan Wang. Email:
Intelligent Automation & Soft Computing 2022, 34(1), 221-234. https://doi.org/10.32604/iasc.2022.027536
Received 20 January 2022; Accepted 02 March 2022; Issue published 15 April 2022
Abstract
As the data scale exceeds the petabyte level, more and more users outsource their local databases to third-party service providers to save local storage costs and avoid cumbersome local data management. However, because third-party service providers are not fully trusted, they may leak outsourced data and bring security risks to the personal privacy of data users. The service provider may also return incorrect or incomplete query results to the data user. Therefore, in this paper, we propose a Lightweight and Verifiable Multi-keyword Query Scheme for the integrity verification of multi-keyword query of outsourced data. This scheme supports multi-keyword query integrity verification and does not require a third-party auditor, combining a hash-based accumulator that provides correctness verification and a cuckoo filter that provides integrity verification to form a provably secure composite verification structure, and at the same time, it uses controllable Paillier encryption to support data update operations. This scheme strikes a balance between the cost of verification structure generation, verification object generation, and proof verification cost to enable data users to perform secure multi-keyword query while efficiently verifying the integrity of query results. The security proof and the performance analysis show that the proposed scheme is secure and efficient for practical deployment.Keywords
Cite This Article
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.