Towards Multi-user Searchable Encryption Scheme with Support for SQL Queries

Due to the tremendous benefits of cloud computing, organizations are highly motivated to store electronic records on clouds. However, outsourcing data to cloud servers separates it from physical control, resulting in data privacy disclosure. Although encryption enhances data confidentiality, it also...

Full description

Saved in:
Bibliographic Details
Published inMobile networks and applications Vol. 27; no. 1; pp. 417 - 430
Main Authors Li, Mingyue, Du, Ruizhong, Jia, Chunfu
Format Journal Article
LanguageEnglish
Published New York Springer US 01.02.2022
Springer Nature B.V
Subjects
Online AccessGet full text
ISSN1383-469X
1572-8153
DOI10.1007/s11036-021-01836-z

Cover

Abstract Due to the tremendous benefits of cloud computing, organizations are highly motivated to store electronic records on clouds. However, outsourcing data to cloud servers separates it from physical control, resulting in data privacy disclosure. Although encryption enhances data confidentiality, it also complicates the execution of encrypted database operations. In this paper, we propose a multi-user shared searchable encryption scheme that supports multi-user selective authorization and secure access to encrypted databases. First, we apply the Diffie-Hellman protocol to a trapdoor generate algorithm to facilitate fine-grained search control without incremental conversions. Second, we utilize a private key to generate an encrypted index by bilinear mapping, which makes it impossible for an adversary to obtain trapdoor keywords by traversing the keyword space and to carry out keyword guessing attacks. Third, we use double-layered encryption to encrypt a symmetric decryption key. Only the proxies whose attributes are matched with the access control list can obtain the key of decrypted data. Through theoretical security analysis and experimental verifications, we show that our scheme can provide secure and efficacious ciphertext retrieval without the support of a secure channel.
AbstractList Due to the tremendous benefits of cloud computing, organizations are highly motivated to store electronic records on clouds. However, outsourcing data to cloud servers separates it from physical control, resulting in data privacy disclosure. Although encryption enhances data confidentiality, it also complicates the execution of encrypted database operations. In this paper, we propose a multi-user shared searchable encryption scheme that supports multi-user selective authorization and secure access to encrypted databases. First, we apply the Diffie-Hellman protocol to a trapdoor generate algorithm to facilitate fine-grained search control without incremental conversions. Second, we utilize a private key to generate an encrypted index by bilinear mapping, which makes it impossible for an adversary to obtain trapdoor keywords by traversing the keyword space and to carry out keyword guessing attacks. Third, we use double-layered encryption to encrypt a symmetric decryption key. Only the proxies whose attributes are matched with the access control list can obtain the key of decrypted data. Through theoretical security analysis and experimental verifications, we show that our scheme can provide secure and efficacious ciphertext retrieval without the support of a secure channel.
Author Du, Ruizhong
Jia, Chunfu
Li, Mingyue
Author_xml – sequence: 1
  givenname: Mingyue
  surname: Li
  fullname: Li, Mingyue
  organization: College of Cyber Science, Nankai University, Tianjin Key Laboratory of Network and Data Security Technology, Nankai University
– sequence: 2
  givenname: Ruizhong
  surname: Du
  fullname: Du, Ruizhong
  email: drzh@hbu.edu.cn
  organization: School of Cyber Security and Computer, Hebei University
– sequence: 3
  givenname: Chunfu
  surname: Jia
  fullname: Jia, Chunfu
  organization: College of Cyber Science, Nankai University, Tianjin Key Laboratory of Network and Data Security Technology, Nankai University
BookMark eNp9kF1LwzAUhoNMcJv-Aa8CXlfz0aTppYz5ARUZm-BdSNNT17E1NWkZ2683OsE7r865eJ_3HJ4JGrWuBYSuKbmlhGR3gVLCZUIYTQhVcTueoTEVGUsUFXwUd654ksr8_QJNQtgQQoRQ6RgVK7c3vgr4Zdj2TTIE8HgJxtu1KbeA5631h65vXIuXdg07wPumX-Pl0HXO97h2Mb0o8GIA30C4ROe12Qa4-p1T9PYwX82ekuL18Xl2XySWZaRPOMkZl2lVUiptfK9SpiZS8UzlwlpVlaRmWQ4SQEBpqkxwgDSTjFJR18RUfIpuTr2dd58DhF5v3ODbeFIzmTLJeB6hKWKnlPUuBA-17nyzM_6gKdHf1vTJmo7W9I81fYwQP0EhhtsP8H_V_1Bf6OVxyA
Cites_doi 10.1145/2882903.2882932
10.1007/978-3-540-24852-1-3
10.1007/978-3-030-29962-0_15
10.1109/TIFS.2018.2866321
10.1109/TCC.2017.2684811
10.1109/TIFS.2017.2721359
10.1007/978-3-319-98989-1_11
10.1109/TNET.2015.2457493
10.1016/j.future.2019.05.038
10.1109/TPDS.2013.45
10.1109/SECPRI.2000.848445
10.5220/0006666100570067
10.1109/ACCESS.2018.2840119
10.1007/978-3-642-27576-0_13
10.1109/TPDS.2019.2940945
10.1109/TDSC.2020.2974220
10.1109/TPDS.2015.2401003
10.1109/ICWS.2016.62
10.1109/TII.2018.2834351
10.1109/INFOCOM.2019.8737588
10.1007/3-540-44647-8_13
10.1007/978-3-319-56617-7_4
10.14722/ndss.2020.24423
10.1145/2588555.2588572
10.1145/1180405.1180417
10.1155/2018/7383514
ContentType Journal Article
Copyright The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021
The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021.
Copyright_xml – notice: The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021
– notice: The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021.
DBID AAYXX
CITATION
3V.
7SC
7SP
7WY
7WZ
7XB
87Z
8AL
8AO
8FD
8FE
8FG
8FK
8FL
ABUWG
AFKRA
ARAPS
AZQEC
BENPR
BEZIV
BGLVJ
CCPQU
DWQXO
FRNLG
F~G
GNUQQ
HCIFZ
JQ2
K60
K6~
K7-
L.-
L7M
L~C
L~D
M0C
M0N
P5Z
P62
PHGZM
PHGZT
PKEHL
PQBIZ
PQBZA
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
Q9U
DOI 10.1007/s11036-021-01836-z
DatabaseName CrossRef
ProQuest Central (Corporate)
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
ABI/INFORM Collection
ABI/INFORM Global (PDF only)
ProQuest Central (purchase pre-March 2016)
ABI/INFORM Collection
Computing Database (Alumni Edition)
ProQuest Pharma Collection
Technology Research Database
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central (Alumni) (purchase pre-March 2016)
ABI/INFORM Collection (Alumni Edition)
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
Advanced Technologies & Computer Science Collection
ProQuest Central Essentials
ProQuest Central
Business Premium [ProQuest]
Technology collection
ProQuest One Community College
ProQuest Central
Business Premium Collection (Alumni)
ABI/INFORM Global (Corporate)
ProQuest Central Student
SciTech Premium Collection
ProQuest Computer Science Collection
ProQuest Business Collection (Alumni Edition)
ProQuest Business Collection
Computer Science Database
ABI/INFORM Professional Advanced
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
ABI/INFORM Global (OCUL)
Computing Database
Advanced Technologies & Aerospace Collection
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Premium
ProQuest One Academic
ProQuest One Academic Middle East (New)
ProQuest One Business
ProQuest One Business (Alumni)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central China
ProQuest Central Basic
DatabaseTitle CrossRef
ABI/INFORM Global (Corporate)
ProQuest Business Collection (Alumni Edition)
ProQuest One Business
Computer Science Database
ProQuest Central Student
Technology Collection
Technology Research Database
Computer and Information Systems Abstracts – Academic
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
ProQuest Pharma Collection
ProQuest Central China
ABI/INFORM Complete
ProQuest Central
ABI/INFORM Professional Advanced
ProQuest One Applied & Life Sciences
ProQuest Central Korea
ProQuest Central (New)
Advanced Technologies Database with Aerospace
ABI/INFORM Complete (Alumni Edition)
Advanced Technologies & Aerospace Collection
Business Premium Collection
ABI/INFORM Global
ProQuest Computing
ABI/INFORM Global (Alumni Edition)
ProQuest Central Basic
ProQuest Computing (Alumni Edition)
ProQuest One Academic Eastern Edition
Electronics & Communications Abstracts
ProQuest Technology Collection
ProQuest SciTech Collection
ProQuest Business Collection
Computer and Information Systems Abstracts Professional
Advanced Technologies & Aerospace Database
ProQuest One Academic UKI Edition
ProQuest One Business (Alumni)
ProQuest One Academic
ProQuest Central (Alumni)
ProQuest One Academic (New)
Business Premium Collection (Alumni)
DatabaseTitleList
ABI/INFORM Global (Corporate)
Database_xml – sequence: 1
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1572-8153
EndPage 430
ExternalDocumentID 10_1007_s11036_021_01836_z
GrantInformation_xml – fundername: Natural Science Foundation of TianJin
  grantid: 17JCZDJC30500
– fundername: National Key R&D Program of China
  grantid: 2018YFA0704703
– fundername: National Natural Science Foundation of China
  grantid: 61972215; 61702399; 61972073
  funderid: https://doi.org/10.13039/501100001809
GroupedDBID -59
-5G
-BR
-EM
-Y2
-~C
-~X
.4S
.86
.DC
.VR
06D
0R~
0VY
123
1N0
1SB
2.D
203
28-
29M
29~
2J2
2JN
2JY
2KG
2LR
2P1
2VQ
2~H
30V
3V.
4.4
406
408
409
40D
40E
5QI
5VS
67Z
6NX
7WY
85S
8AO
8FE
8FG
8FL
8FW
8TC
8UJ
8US
95-
95.
95~
96X
AAAVM
AABHQ
AACDK
AAHNG
AAIAL
AAJBT
AAJKR
AANZL
AARHV
AARTL
AASML
AATNV
AATVU
AAUYE
AAWCG
AAYIU
AAYOK
AAYQN
AAYTO
AAYZH
ABAKF
ABBBX
ABBXA
ABDZT
ABECU
ABFTD
ABFTV
ABHLI
ABHQN
ABJNI
ABJOX
ABKCH
ABKTR
ABMNI
ABMQK
ABNWP
ABQBU
ABQSL
ABSXP
ABTEG
ABTHY
ABTKH
ABTMW
ABULA
ABUWG
ABWNU
ABXPI
ACAOD
ACBXY
ACDTI
ACGFO
ACGFS
ACHSB
ACHXU
ACKNC
ACM
ACMDZ
ACMLO
ACOKC
ACOMO
ACPIV
ACREN
ACZOJ
ADHHG
ADHIR
ADIMF
ADINQ
ADKNI
ADKPE
ADL
ADMLS
ADRFC
ADTPH
ADURQ
ADYFF
ADYOE
ADZKW
AEBTG
AEFIE
AEFQL
AEGAL
AEGNC
AEJHL
AEJRE
AEKMD
AEMSY
AENEX
AEOHA
AEPYU
AESKC
AETLH
AEVLU
AEXYK
AFEXP
AFFNX
AFGCZ
AFKRA
AFLOW
AFQWF
AFWTZ
AFYQB
AFZKB
AGAYW
AGDGC
AGGDS
AGJBK
AGMZJ
AGQEE
AGQMX
AGRTI
AGWIL
AGWZB
AGYKE
AHAVH
AHBYD
AHKAY
AHSBF
AHYZX
AIAKS
AIGIU
AIIXL
AILAN
AITGF
AJBLW
AJRNO
AJZVZ
ALMA_UNASSIGNED_HOLDINGS
ALWAN
AMKLP
AMTXH
AMXSW
AMYLF
AMYQR
AOCGG
ARAPS
ARCEE
ARCSS
ARMRJ
ASPBG
AVWKF
AXYYD
AYJHY
AZFZN
AZQEC
B-.
BA0
BBWZM
BDATZ
BENPR
BEZIV
BGLVJ
BGNMA
BPHCQ
BSONS
CAG
CCPQU
COF
CS3
CSCUP
DDRTE
DL5
DNIVK
DPUIP
DWQXO
EBLON
EBS
EDO
EIOEI
EJD
ESBYG
FEDTE
FERAY
FFXSO
FIGPU
FINBP
FNLPD
FRNLG
FRRFC
FSGXE
FWDCC
GGCAI
GGRSB
GJIRD
GNUQQ
GNWQR
GQ6
GQ7
GQ8
GROUPED_ABI_INFORM_COMPLETE
GROUPED_ABI_INFORM_RESEARCH
GXS
H13
HCIFZ
HF~
HG5
HG6
HGAVV
HMJXF
HQYDN
HRMNR
HVGLF
HZ~
I-F
I07
I09
IHE
IJ-
IKXTQ
ITG
ITH
ITM
IWAJR
IXC
IXE
IZIGR
IZQ
I~X
I~Y
I~Z
J-C
J0Z
JBSCW
JCJTX
JZLTJ
K60
K6V
K6~
K7-
KDC
KOV
KOW
LAK
LLZTM
M0C
M0N
M4Y
MA-
N2Q
NB0
NDZJH
NPVJJ
NQJWS
NU0
O9-
O93
O9G
O9I
O9J
OAM
OVD
P19
P2P
P62
P9O
PF0
PQBIZ
PQBZA
PQQKQ
PROAC
PT4
PT5
Q2X
QOK
QOS
R4E
R89
R9I
RHV
RIG
RNI
RNS
ROL
RPX
RSV
RZC
RZE
RZK
S16
S1Z
S26
S27
S28
S3B
SAP
SCLPG
SCO
SCV
SDH
SDM
SHX
SISQX
SJN
SJYHP
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
SZN
T13
T16
TEORI
TN5
TSG
TSK
TSV
TUC
TUS
U2A
UG4
UOJIU
UTJUX
UZXMN
VC2
VFIZW
W23
W48
W7O
WK8
YLTOR
Z45
Z7R
Z7X
Z7Z
Z81
Z83
Z88
Z8M
Z8R
Z8T
Z8W
Z92
ZMTXR
_50
~A9
~EX
AAPKM
AAYXX
ABBRH
ABDBE
ABFSG
ABRTQ
ACSTC
ADHKG
AETEA
AEZWR
AFDZB
AFHIU
AFOHR
AGQPQ
AHPBZ
AHWEU
AIXLP
ATHPR
AYFIA
CITATION
PHGZM
PHGZT
PQGLB
PUEGO
7SC
7SP
7XB
8AL
8FD
8FK
JQ2
L.-
L7M
L~C
L~D
PKEHL
PQEST
PQUKI
PRINS
Q9U
ID FETCH-LOGICAL-c270t-3092364db116c153d8af06837895cc8db0f279e6ee5ebad753ee4762115ff0ad3
IEDL.DBID U2A
ISSN 1383-469X
IngestDate Sat Aug 23 13:03:32 EDT 2025
Wed Oct 01 02:45:40 EDT 2025
Fri Feb 21 02:47:39 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 1
Keywords Structured query language (SQL)
Data privacy
Multi-user shared
Searchable encryption
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c270t-3092364db116c153d8af06837895cc8db0f279e6ee5ebad753ee4762115ff0ad3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
PQID 2642623975
PQPubID 26070
PageCount 14
ParticipantIDs proquest_journals_2642623975
crossref_primary_10_1007_s11036_021_01836_z
springer_journals_10_1007_s11036_021_01836_z
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 20220200
2022-02-00
20220201
PublicationDateYYYYMMDD 2022-02-01
PublicationDate_xml – month: 2
  year: 2022
  text: 20220200
PublicationDecade 2020
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationSubtitle The Journal of SPECIAL ISSUES on Mobility of Systems, Users, Data and Computing
PublicationTitle Mobile networks and applications
PublicationTitleAbbrev Mobile Netw Appl
PublicationYear 2022
Publisher Springer US
Springer Nature B.V
Publisher_xml – name: Springer US
– name: Springer Nature B.V
References Xia Z, Wang X, Sun X, Wang Q (2016) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parall Distkbuted Syst. (27)951–963. https://doi.org/10.1109/TPDS.2015.2401003
Curtmola R, Garay JA, Kamara S, Ostrovsky R (2006) Searchable symmetric encryption improved definitions and efficient constructions
Wong WK, Kao B, Cheung DW-L, Li R, Yiu S-M (2014) Secure query processing with data interoperability in a cloud database environment. In: The 2014 ACM SIGMOD conference, pp 1395–1406. https://doi.org/10.1145/2588555.2588572
Cao N, Wang C, Li M, Ren K, Lou W (2013) Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans Parall Distkbuted Syst. (25)222–233. https://doi.org/10.1109/TPDS.2013.45
GuptaMBBAn efficient KP design framework of attribute-based searchable encryption for user level revocation in cloudConcurr Comput Pract Exp20203218117
Xu L, Yuan X, Wang C, Wang Q, Xu C (2019) Hardening database padding for searchable encryption. In: The 2019 IEEE conference on computer communications, pp 2503–2511. https://doi.org/10.1109/INFOCOM.2019.8737588
JiangSZhuXGuoLLiuJPublicly verifiable boolean query over outsourced encrypted dataIEEE Transa Cloud Comput201973799813
Demertzis I, Chamani J G, Papadopoulos D, Papamanthou C (2020) Dynamic searchable encryption with small client storage. In: The 27th annual network and distributed system security symposium, pp 1–18
Olumofin I, Goldberg I (2012) Revisiting the computational practicality of private information retrieval. In: The 16th international conference on financial cryptography and data security, pp 158–172
YuanXYuanXZhangYLiBWangCEnabling encrypted boolean queries in geographically distributed databasesIEEE Trans Parall Distrib Syst2020313634646
Ronald R L, Len A, Michael D L (1978) On data banks and privacy homomorphisms. Foundations of Secure Computation (4)169–180
JiangSZhuXGuoLLiuJPublicly verifiable boolean query over outsourced encrypted dataIEEE Trans Cloud Comput201973799813
WangDChengHWangPHuangXJianGZipf’s law in passwordsIEEE Trans Inf Forensics Sec2017121127762791
Raluca AP, Catherine MSR, Nickolai Z (2011) Cryptdb: Protecting confidentiality with encrypted query processing. In: The 23rd ACM Symposium on operating systems principles, pp 85–100
Boneh D, Franklin MK (2001) Identity-based encryption from the weil pairing. In: The 21st annual international cryptology conference, pp 213–229
LiRLiuAXWangALBruhadeshwarBFast and scalable range query processing with strong privacy protection for cloud computingIEEE/ACM Trans Netw20162423052318https://doi.org/10.1109/TNET.2015.2457493
Chen Y, Xie X, Wang P, Tso R (2019) Witness-based searchable encryption with optimal overhead for cloud-edge computing. Future Generation Computer System (100)715–723. https://doi.org/10.1016/j.future.2019.05.038
Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: The 21st IEEE Symp on security and privacy, pp 44–55. https://doi.org/10.1109/SECPRI.2000.848445
Zhang Z, Wang J, Wang Y, Su Y, Chen X (2019) Towards efficient verifiable forward secure searchable symmetric encryption. In: The 24rd European symposium on research in computer security, pp 304–321
Kamara S, Moataz T (2017) Boolean searchable symmetric encryption with worst-case sub-linear complexity. In: the 36th Annual international conference on the theory and applications of cryptographic techniques, pp 94–124
NingJXuJLiangKZhangFChangEPassive attacks against searchable encryptionIEEE Trans Inf Forens Secur2019143789802
Wang C, Wang D, Tu Y, Xu G, Wang H (2020) Understanding node capture attacks in user authentication schemes for wireless sensor networks. IEEE Trans Dependable Secure Comput. https://doi.org/10.1109/TDSC.2020.2974220
Golle P, Staddon J, Waters BR (2004) Secure conjunctive keyword search over encrypted data. Lect Notes Comput Sci 31–45. https://doi.org/10.1007/978-3-540-24852-1-3
Karras P, Nikitin A, Saad M, Bhatt R, Antyukhov D, Idreos S (2016) Adaptive indexing over encrypted numeric data. In: The 2016 International conference on management of data, pp 171–183
Liu G, Yang G, Wang H, Xiang Y, Dai H (2018) A novel secure scheme for supporting complex sql queries over encrypted databases in cloud computing. Secur Commun Netw. 7383514:1–7383514:15. https://doi.org/10.1155/2018/7383514
WangDLiWWangPMeasuring two-factor authentication schemes for real-time data access in industrial wireless sensor networksIEEE Trans Industrial Inf201814940814092
Azraoui M, Önen M., Molva R (2018) Framework for searchable encryption with sql databases. In: The 8th International conference on cloud computing and services science, pp 57–67. https://doi.org/10.5220/0006666100570067
Zhang R, Xue R, Yu T, Liu L (2016) Pvsae: A public verifiable searchable encryption service framework for outsourced encrypted data. In: The 2016 IEEE international conference on web services, pp 428–435. https://doi.org/10.1109/ICWS.2016.62
Yu Z, Gao C, Jing Z, Gupta B B, Cai Q (2018) A practical public key encryption scheme based on learning parity with noise. IEEE Access (6):31918–31923
Patel S, Persiano G, Yeo K (2018) Symmetric searchable encryption with sharing and unsharing. In: The 23rd European symposium on research in computer security, pp 207– 227
Goh E-J (2003) Secure indexes, IACR ePrint Cryptography Archive
Dua D, Graff C (2020) UCI machine learning repository. http://archive.ics.uci.edu/ml
D Wang (1836_CR30) 2018; 14
J Ning (1836_CR22) 2019; 14
1836_CR2
S Jiang (1836_CR29) 2019; 7
1836_CR3
1836_CR1
D Wang (1836_CR32) 2017; 12
1836_CR6
1836_CR15
1836_CR7
1836_CR16
1836_CR4
1836_CR17
1836_CR5
1836_CR19
1836_CR8
1836_CR9
1836_CR31
1836_CR10
X Yuan (1836_CR26) 2020; 31
1836_CR11
1836_CR12
1836_CR13
1836_CR14
MBB Gupta (1836_CR25) 2020; 32
R Li (1836_CR18) 2016; 24
1836_CR27
1836_CR28
S Jiang (1836_CR24) 2019; 7
1836_CR20
1836_CR21
1836_CR23
References_xml – reference: Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: The 21st IEEE Symp on security and privacy, pp 44–55. https://doi.org/10.1109/SECPRI.2000.848445
– reference: Dua D, Graff C (2020) UCI machine learning repository. http://archive.ics.uci.edu/ml
– reference: Golle P, Staddon J, Waters BR (2004) Secure conjunctive keyword search over encrypted data. Lect Notes Comput Sci 31–45. https://doi.org/10.1007/978-3-540-24852-1-3
– reference: JiangSZhuXGuoLLiuJPublicly verifiable boolean query over outsourced encrypted dataIEEE Trans Cloud Comput201973799813
– reference: Wong WK, Kao B, Cheung DW-L, Li R, Yiu S-M (2014) Secure query processing with data interoperability in a cloud database environment. In: The 2014 ACM SIGMOD conference, pp 1395–1406. https://doi.org/10.1145/2588555.2588572
– reference: Ronald R L, Len A, Michael D L (1978) On data banks and privacy homomorphisms. Foundations of Secure Computation (4)169–180
– reference: Patel S, Persiano G, Yeo K (2018) Symmetric searchable encryption with sharing and unsharing. In: The 23rd European symposium on research in computer security, pp 207– 227
– reference: GuptaMBBAn efficient KP design framework of attribute-based searchable encryption for user level revocation in cloudConcurr Comput Pract Exp20203218117
– reference: Raluca AP, Catherine MSR, Nickolai Z (2011) Cryptdb: Protecting confidentiality with encrypted query processing. In: The 23rd ACM Symposium on operating systems principles, pp 85–100
– reference: NingJXuJLiangKZhangFChangEPassive attacks against searchable encryptionIEEE Trans Inf Forens Secur2019143789802
– reference: Chen Y, Xie X, Wang P, Tso R (2019) Witness-based searchable encryption with optimal overhead for cloud-edge computing. Future Generation Computer System (100)715–723. https://doi.org/10.1016/j.future.2019.05.038
– reference: JiangSZhuXGuoLLiuJPublicly verifiable boolean query over outsourced encrypted dataIEEE Transa Cloud Comput201973799813
– reference: Xia Z, Wang X, Sun X, Wang Q (2016) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parall Distkbuted Syst. (27)951–963. https://doi.org/10.1109/TPDS.2015.2401003
– reference: Curtmola R, Garay JA, Kamara S, Ostrovsky R (2006) Searchable symmetric encryption improved definitions and efficient constructions
– reference: Yu Z, Gao C, Jing Z, Gupta B B, Cai Q (2018) A practical public key encryption scheme based on learning parity with noise. IEEE Access (6):31918–31923
– reference: Kamara S, Moataz T (2017) Boolean searchable symmetric encryption with worst-case sub-linear complexity. In: the 36th Annual international conference on the theory and applications of cryptographic techniques, pp 94–124
– reference: Zhang Z, Wang J, Wang Y, Su Y, Chen X (2019) Towards efficient verifiable forward secure searchable symmetric encryption. In: The 24rd European symposium on research in computer security, pp 304–321
– reference: Wang C, Wang D, Tu Y, Xu G, Wang H (2020) Understanding node capture attacks in user authentication schemes for wireless sensor networks. IEEE Trans Dependable Secure Comput. https://doi.org/10.1109/TDSC.2020.2974220
– reference: Cao N, Wang C, Li M, Ren K, Lou W (2013) Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans Parall Distkbuted Syst. (25)222–233. https://doi.org/10.1109/TPDS.2013.45
– reference: Azraoui M, Önen M., Molva R (2018) Framework for searchable encryption with sql databases. In: The 8th International conference on cloud computing and services science, pp 57–67. https://doi.org/10.5220/0006666100570067
– reference: Goh E-J (2003) Secure indexes, IACR ePrint Cryptography Archive
– reference: LiRLiuAXWangALBruhadeshwarBFast and scalable range query processing with strong privacy protection for cloud computingIEEE/ACM Trans Netw20162423052318https://doi.org/10.1109/TNET.2015.2457493
– reference: Karras P, Nikitin A, Saad M, Bhatt R, Antyukhov D, Idreos S (2016) Adaptive indexing over encrypted numeric data. In: The 2016 International conference on management of data, pp 171–183
– reference: Demertzis I, Chamani J G, Papadopoulos D, Papamanthou C (2020) Dynamic searchable encryption with small client storage. In: The 27th annual network and distributed system security symposium, pp 1–18
– reference: YuanXYuanXZhangYLiBWangCEnabling encrypted boolean queries in geographically distributed databasesIEEE Trans Parall Distrib Syst2020313634646
– reference: Olumofin I, Goldberg I (2012) Revisiting the computational practicality of private information retrieval. In: The 16th international conference on financial cryptography and data security, pp 158–172
– reference: WangDLiWWangPMeasuring two-factor authentication schemes for real-time data access in industrial wireless sensor networksIEEE Trans Industrial Inf201814940814092
– reference: Boneh D, Franklin MK (2001) Identity-based encryption from the weil pairing. In: The 21st annual international cryptology conference, pp 213–229
– reference: Liu G, Yang G, Wang H, Xiang Y, Dai H (2018) A novel secure scheme for supporting complex sql queries over encrypted databases in cloud computing. Secur Commun Netw. 7383514:1–7383514:15. https://doi.org/10.1155/2018/7383514
– reference: Zhang R, Xue R, Yu T, Liu L (2016) Pvsae: A public verifiable searchable encryption service framework for outsourced encrypted data. In: The 2016 IEEE international conference on web services, pp 428–435. https://doi.org/10.1109/ICWS.2016.62
– reference: Xu L, Yuan X, Wang C, Wang Q, Xu C (2019) Hardening database padding for searchable encryption. In: The 2019 IEEE conference on computer communications, pp 2503–2511. https://doi.org/10.1109/INFOCOM.2019.8737588
– reference: WangDChengHWangPHuangXJianGZipf’s law in passwordsIEEE Trans Inf Forensics Sec2017121127762791
– ident: 1836_CR19
  doi: 10.1145/2882903.2882932
– ident: 1836_CR7
  doi: 10.1007/978-3-540-24852-1-3
– ident: 1836_CR13
  doi: 10.1007/978-3-030-29962-0_15
– volume: 14
  start-page: 789
  issue: 3
  year: 2019
  ident: 1836_CR22
  publication-title: IEEE Trans Inf Forens Secur
  doi: 10.1109/TIFS.2018.2866321
– volume: 7
  start-page: 799
  issue: 3
  year: 2019
  ident: 1836_CR29
  publication-title: IEEE Trans Cloud Comput
  doi: 10.1109/TCC.2017.2684811
– volume: 32
  start-page: 1
  issue: 18
  year: 2020
  ident: 1836_CR25
  publication-title: Concurr Comput Pract Exp
– volume: 12
  start-page: 2776
  issue: 11
  year: 2017
  ident: 1836_CR32
  publication-title: IEEE Trans Inf Forensics Sec
  doi: 10.1109/TIFS.2017.2721359
– ident: 1836_CR14
– ident: 1836_CR12
  doi: 10.1007/978-3-319-98989-1_11
– volume: 24
  start-page: 2305
  year: 2016
  ident: 1836_CR18
  publication-title: IEEE/ACM Trans Netw
  doi: 10.1109/TNET.2015.2457493
– ident: 1836_CR2
  doi: 10.1016/j.future.2019.05.038
– ident: 1836_CR8
  doi: 10.1109/TPDS.2013.45
– ident: 1836_CR5
  doi: 10.1109/SECPRI.2000.848445
– ident: 1836_CR20
  doi: 10.5220/0006666100570067
– ident: 1836_CR21
  doi: 10.1109/ACCESS.2018.2840119
– ident: 1836_CR15
  doi: 10.1007/978-3-642-27576-0_13
– ident: 1836_CR28
– volume: 31
  start-page: 634
  issue: 3
  year: 2020
  ident: 1836_CR26
  publication-title: IEEE Trans Parall Distrib Syst
  doi: 10.1109/TPDS.2019.2940945
– ident: 1836_CR31
  doi: 10.1109/TDSC.2020.2974220
– ident: 1836_CR6
– ident: 1836_CR10
  doi: 10.1109/TPDS.2015.2401003
– ident: 1836_CR11
  doi: 10.1109/ICWS.2016.62
– volume: 14
  start-page: 4081
  issue: 9
  year: 2018
  ident: 1836_CR30
  publication-title: IEEE Trans Industrial Inf
  doi: 10.1109/TII.2018.2834351
– ident: 1836_CR1
  doi: 10.1109/INFOCOM.2019.8737588
– ident: 1836_CR27
  doi: 10.1007/3-540-44647-8_13
– ident: 1836_CR23
  doi: 10.1007/978-3-319-56617-7_4
– volume: 7
  start-page: 799
  issue: 3
  year: 2019
  ident: 1836_CR24
  publication-title: IEEE Transa Cloud Comput
  doi: 10.1109/TCC.2017.2684811
– ident: 1836_CR9
  doi: 10.14722/ndss.2020.24423
– ident: 1836_CR16
  doi: 10.1145/2588555.2588572
– ident: 1836_CR4
  doi: 10.1145/1180405.1180417
– ident: 1836_CR3
– ident: 1836_CR17
  doi: 10.1155/2018/7383514
SSID ssj0005584
Score 2.318628
Snippet Due to the tremendous benefits of cloud computing, organizations are highly motivated to store electronic records on clouds. However, outsourcing data to cloud...
SourceID proquest
crossref
springer
SourceType Aggregation Database
Index Database
Publisher
StartPage 417
SubjectTerms Access control
Algorithms
Cloud computing
Communications Engineering
Computer Communication Networks
Cryptography
Electrical Engineering
Encryption
Engineering
IT in Business
Networks
Privacy
SummonAdditionalLinks – databaseName: ProQuest Central
  dbid: BENPR
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV09T8MwED2VdoEB8SkKBXlgA4vUjZ1kQAhQqwqVitIidYsc29lISz8G-uvxOYkCSDBHsqI7--75fPcewCXjLEjwduJzrakvpKARkym1YDTQWirBndbh81D03_ynKZ_WYFjOwmBbZRkTXaDWM4U18hubuJlN1VHA7-YfFFWj8HW1lNCQhbSCvnUUY1vQYMiMVYfGQ3f48lo1ffAwl7kNO_bHomkxRpMP07WRnBdbFjy7zwXd_ExVFf789WTqMlFvD3YLCEnuc5_vQ81kB7DzjVjwEAYT1w27JG6-lmIlguSNxTgpRbqZWny6WEHG1mnvhmA5lqDCp0XjxOJYMh4NyGiNLMjLI3jrdSePfVroJlDFAm9FO16EtPA6abeFshFNhzL1BDLHR1ypUCdeyoLICGO4SaS2FxZjfBsULThMU0_qzjHUs1lmToDIkBmkhOeR17FpjMkQGeuVpwIT8TRMm3BVmiie5_QYcUWEjAaNrUFjZ9B404RWacW4OCrLuHJsE65Ly1af_17t9P_VzmCb4aiC67BuQX21WJtzCyBWyUWxK74A3lTAvw
  priority: 102
  providerName: ProQuest
Title Towards Multi-user Searchable Encryption Scheme with Support for SQL Queries
URI https://link.springer.com/article/10.1007/s11036-021-01836-z
https://www.proquest.com/docview/2642623975
Volume 27
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVEBS
  databaseName: Inspec with Full Text
  customDbUrl:
  eissn: 1572-8153
  dateEnd: 20241102
  omitProxy: false
  ssIdentifier: ssj0005584
  issn: 1383-469X
  databaseCode: ADMLS
  dateStart: 20080101
  isFulltext: true
  titleUrlDefault: https://www.ebsco.com/products/research-databases/inspec-full-text
  providerName: EBSCOhost
– providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl: http://www.proquest.com/pqcentral?accountid=15518
  eissn: 1572-8153
  dateEnd: 20241102
  omitProxy: true
  ssIdentifier: ssj0005584
  issn: 1383-469X
  databaseCode: BENPR
  dateStart: 19990101
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Technology Collection
  customDbUrl:
  eissn: 1572-8153
  dateEnd: 20241102
  omitProxy: true
  ssIdentifier: ssj0005584
  issn: 1383-469X
  databaseCode: 8FG
  dateStart: 19990101
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/technologycollection1
  providerName: ProQuest
– providerCode: PRVAVX
  databaseName: SpringerLINK - Czech Republic Consortium
  customDbUrl:
  eissn: 1572-8153
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0005584
  issn: 1383-469X
  databaseCode: AGYKE
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: http://link.springer.com
  providerName: Springer Nature
– providerCode: PRVAVX
  databaseName: SpringerLink Journals (ICM)
  customDbUrl:
  eissn: 1572-8153
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0005584
  issn: 1383-469X
  databaseCode: U2A
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: http://www.springerlink.com/journals/
  providerName: Springer Nature
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV09T8MwED3RdoEB8SkKpfLABpZSJ87HWFDaCkpFaSuVKXJiZyOgph3or-fsJAogGJgyJHKk5_Pds333DuCKcebFenficCmp4wqXBkykFMmoJ6VIXG56HT5O3NHCuV_yZVkUllfZ7tWVpPHUdbFbT4vn6pQCC-3QpdsGtLiW80IrXrB-ndjB_aKVrW_jz4NlWSrz-xjfw1HNMX9ci5poMziA_ZImkn4xr4ewo7Ij2PsiHngM47nJeM2JqaGl-rSBFMnDuhqKhFmy-jD-gMxwYl4V0UeuRHfxRMZNkKuS2XRMphutdJyfwGIQzu9GtOyNQBPmWWtqW4GWfpdxr-cm6LWkL1LL1erwAU8SX8ZWyrxAuUpxFQuJmxKlHHR8SADT1BLSPoVm9papMyDCZ0rLvvPAsjFUMeFrVfrESjwV8NRP23BdQRS9FxIYUS12rAGNENDIABpt29CpUIzK5ZBHyLoY8qzA4224qZCtX_892vn_Pr-AXabLE0xWdQea69VGXSJpWMddaPiDYRda_eHLQ4jP23Dy9Nw1lvMJN727qQ
linkProvider Springer Nature
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1NT9tAEB2FcIAeUEtBBCjdAz2VFc7a649DVBUISkqI-AhSbma9u76RUBKE4Mfx25hZ23Kp1N5ytrSSn2dn3q5n3gPYF1JEGZ1OAmkMD0IV8kSonCMZjYxROpTO6_B8GPZugl9jOW7AazULQ22VVU50idpMNd2RH2LhFliqk0j-uP_NyTWK_q5WFhqqtFYwHScxVg52nNnnJzzCzTr9E_ze34Q47Y6Oe7x0GeBaRN6c-15CIuoma7dDjfvfxCr3QtJZT6TWscm8XESJDa2VNlMG6b21AaYQpFJ57inj47pLsBz4-HZNWD7qDi-u6iYTGRe2urGPQCTjcmynGN5rkxgwtUh4uK9C_vK-NNZ8969ftK7ynX6EtZKysp9FjH2Chp2sw4c_hAw_w2Dkum9nzM3zcrr5YEUjM01mse5EPzy73MSuMUjuLKPrX0aOosj-GfJmdn05YJePpLo824CbhSC4Cc3JdGK3gKlYWJKgl4nnY9kUKiaFfO3pyCYyj_MWfK8gSu8LOY60Fl4mQFMENHWApi8t2K1QTMutOUvrQGrBQYVs_fjfq23_f7WvsNIbnQ_SQX94tgOrgsYkXHf3LjTnD4_2C5KXebZXRgiD20UH5RtChv2F
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3JTsMwEB2xSAgOiFWU1Qc4gUXqxlkOCCHasrQgKkDqLSS2cyMsLULtp_F1zDiJAkhw4xzJh5fxzLP95g3ArpDCT-h04kqtuevFHg9FnHIko77WsfKknXV4de2d37uXfdmfgI-yF4ZklWVOtIlaPym6Iz_Ewi2wVIe-PEwLWcRNs338_MJpghS9tJbjNPIQ6ZjROx7fBkcXTfzXe0K0W3en57yYMMCV8J0hbzghGajrpF73FO59HcSp45HHeiiVCnTipMIPjWeMNEmskdob42L6QBqVpk6sG7juJEz75OJOXerts0peIoN8oG7QQAjCftGwk7ft1ckGmMQRDu4oj4-_F8WK6f54nLU1r70A8wVZZSd5dC3ChMmWYO6LheEydO-s7nbAbCcvpzsPlkuYqSeLtTL1OrJZid1ieDwaRhe_jGaJIu9nyJjZba_Lem_ktzxYgft_wW8VprKnzKwBiwNhyHxehk4DC6aIA_LGV47yTSjTIK3BfglR9JwbcUSV5TIBGiGgkQU0Gtdgs0QxKjblIKpCqAYHJbLV599XW_97tR2YwVCMuhfXnQ2YFdQfYWXdmzA1fH0zW8hahsm2DQ8GD_8dj59Frvsf
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Towards+Multi-user+Searchable+Encryption+Scheme+with+Support+for+SQL+Queries&rft.jtitle=Mobile+networks+and+applications&rft.au=Li%2C+Mingyue&rft.au=Du%2C+Ruizhong&rft.au=Jia%2C+Chunfu&rft.date=2022-02-01&rft.issn=1383-469X&rft.eissn=1572-8153&rft.volume=27&rft.issue=1&rft.spage=417&rft.epage=430&rft_id=info:doi/10.1007%2Fs11036-021-01836-z&rft.externalDBID=n%2Fa&rft.externalDocID=10_1007_s11036_021_01836_z
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1383-469X&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1383-469X&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1383-469X&client=summon