Privacy-Preserving Keyword Search With Access Control for Secret Sharing-Based Data Outsourcing

Searchable encryption, also known as secure search, is a technology that enables search operations on encrypted data while maintaining confidentiality. Extensive research has been conducted on searchable encryption utilizing public key and symmetric encryptions. However, public key encryption incurs...

Full description

Saved in:
Bibliographic Details
Main Authors: Ahmad Akmal Aminuddin Mohd Kamal, Masamune Okada, Masaya Fujisawa
Format: Article
Language:English
Published: IEEE 2025-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/10971421/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1849324281173901312
author Ahmad Akmal Aminuddin Mohd Kamal
Masamune Okada
Masaya Fujisawa
author_facet Ahmad Akmal Aminuddin Mohd Kamal
Masamune Okada
Masaya Fujisawa
author_sort Ahmad Akmal Aminuddin Mohd Kamal
collection DOAJ
description Searchable encryption, also known as secure search, is a technology that enables search operations on encrypted data while maintaining confidentiality. Extensive research has been conducted on searchable encryption utilizing public key and symmetric encryptions. However, public key encryption incurs significant computational expenses and is inefficient for querying large databases, particularly in cloud settings. Hence, we focus on searchable encryption using a secret sharing scheme (also known as searchable secret sharing), which is recognized for its minimal computational complexity. A secret sharing scheme is a method for transforming secret inputs into several distinct values known as shares. Kamal et al. (2021) introduced a simple searchable encryption method utilizing secret sharing schemes, yet did not include user access control capabilities. In this study, we introduce a secure search method with user access control that employs secure computation based on a <inline-formula> <tex-math notation="LaTeX">$(k,n)$ </tex-math></inline-formula> threshold secret sharing scheme, where every piece of data stored in the cloud has an owner, and owners grant access to users at their discretion. We assume a client-server model to perform secure computation between the owner, player, and <inline-formula> <tex-math notation="LaTeX">$n\geq k$ </tex-math></inline-formula> cloud servers. Furthermore, we provide an in-depth analysis of the security aspects of our proposed distribution, query generation, and search processes, demonstrating that our approach is resilient to honest-but-curious adversaries with information from up to <inline-formula> <tex-math notation="LaTeX">$k-1$ </tex-math></inline-formula> computing servers. Moreover, we include an improved and efficient method using an <inline-formula> <tex-math notation="LaTeX">$(n,n)$ </tex-math></inline-formula> additive secret sharing scheme when assuming <inline-formula> <tex-math notation="LaTeX">$n=k$ </tex-math></inline-formula> computing servers. We compare the proposed methods in terms of their computational and communication costs. Finally, we present a detailed performance analysis using Python, including a comparison with conventional secret sharing-based methods.
format Article
id doaj-art-12d0dd0d041d4d0b8c1e54e54c341fb6
institution Kabale University
issn 2169-3536
language English
publishDate 2025-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj-art-12d0dd0d041d4d0b8c1e54e54c341fb62025-08-20T03:48:46ZengIEEEIEEE Access2169-35362025-01-0113736257365110.1109/ACCESS.2025.356266710971421Privacy-Preserving Keyword Search With Access Control for Secret Sharing-Based Data OutsourcingAhmad Akmal Aminuddin Mohd Kamal0https://orcid.org/0000-0002-7941-3021Masamune Okada1Masaya Fujisawa2https://orcid.org/0000-0001-8385-5781Department of Information and Computer Technology, Tokyo University of Science, Tokyo, JapanGraduate School of Engineering, Tokyo University of Science, Tokyo, JapanDepartment of Information and Computer Technology, Tokyo University of Science, Tokyo, JapanSearchable encryption, also known as secure search, is a technology that enables search operations on encrypted data while maintaining confidentiality. Extensive research has been conducted on searchable encryption utilizing public key and symmetric encryptions. However, public key encryption incurs significant computational expenses and is inefficient for querying large databases, particularly in cloud settings. Hence, we focus on searchable encryption using a secret sharing scheme (also known as searchable secret sharing), which is recognized for its minimal computational complexity. A secret sharing scheme is a method for transforming secret inputs into several distinct values known as shares. Kamal et al. (2021) introduced a simple searchable encryption method utilizing secret sharing schemes, yet did not include user access control capabilities. In this study, we introduce a secure search method with user access control that employs secure computation based on a <inline-formula> <tex-math notation="LaTeX">$(k,n)$ </tex-math></inline-formula> threshold secret sharing scheme, where every piece of data stored in the cloud has an owner, and owners grant access to users at their discretion. We assume a client-server model to perform secure computation between the owner, player, and <inline-formula> <tex-math notation="LaTeX">$n\geq k$ </tex-math></inline-formula> cloud servers. Furthermore, we provide an in-depth analysis of the security aspects of our proposed distribution, query generation, and search processes, demonstrating that our approach is resilient to honest-but-curious adversaries with information from up to <inline-formula> <tex-math notation="LaTeX">$k-1$ </tex-math></inline-formula> computing servers. Moreover, we include an improved and efficient method using an <inline-formula> <tex-math notation="LaTeX">$(n,n)$ </tex-math></inline-formula> additive secret sharing scheme when assuming <inline-formula> <tex-math notation="LaTeX">$n=k$ </tex-math></inline-formula> computing servers. We compare the proposed methods in terms of their computational and communication costs. Finally, we present a detailed performance analysis using Python, including a comparison with conventional secret sharing-based methods.https://ieeexplore.ieee.org/document/10971421/Secret sharingsearchable encryptionsecure searchsearchable secret sharinguser access controlsearch pattern
spellingShingle Ahmad Akmal Aminuddin Mohd Kamal
Masamune Okada
Masaya Fujisawa
Privacy-Preserving Keyword Search With Access Control for Secret Sharing-Based Data Outsourcing
IEEE Access
Secret sharing
searchable encryption
secure search
searchable secret sharing
user access control
search pattern
title Privacy-Preserving Keyword Search With Access Control for Secret Sharing-Based Data Outsourcing
title_full Privacy-Preserving Keyword Search With Access Control for Secret Sharing-Based Data Outsourcing
title_fullStr Privacy-Preserving Keyword Search With Access Control for Secret Sharing-Based Data Outsourcing
title_full_unstemmed Privacy-Preserving Keyword Search With Access Control for Secret Sharing-Based Data Outsourcing
title_short Privacy-Preserving Keyword Search With Access Control for Secret Sharing-Based Data Outsourcing
title_sort privacy preserving keyword search with access control for secret sharing based data outsourcing
topic Secret sharing
searchable encryption
secure search
searchable secret sharing
user access control
search pattern
url https://ieeexplore.ieee.org/document/10971421/
work_keys_str_mv AT ahmadakmalaminuddinmohdkamal privacypreservingkeywordsearchwithaccesscontrolforsecretsharingbaseddataoutsourcing
AT masamuneokada privacypreservingkeywordsearchwithaccesscontrolforsecretsharingbaseddataoutsourcing
AT masayafujisawa privacypreservingkeywordsearchwithaccesscontrolforsecretsharingbaseddataoutsourcing