Privacy-Preserving Keyword Search With Access Control for Secret Sharing-Based Data Outsourcing
Searchable encryption, also known as secure search, is a technology that enables search operations on encrypted data while maintaining confidentiality. Extensive research has been conducted on searchable encryption utilizing public key and symmetric encryptions. However, public key encryption incurs...
Saved in:
| Main Authors: | , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
IEEE
2025-01-01
|
| Series: | IEEE Access |
| Subjects: | |
| Online Access: | https://ieeexplore.ieee.org/document/10971421/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1849324281173901312 |
|---|---|
| author | Ahmad Akmal Aminuddin Mohd Kamal Masamune Okada Masaya Fujisawa |
| author_facet | Ahmad Akmal Aminuddin Mohd Kamal Masamune Okada Masaya Fujisawa |
| author_sort | Ahmad Akmal Aminuddin Mohd Kamal |
| collection | DOAJ |
| description | Searchable encryption, also known as secure search, is a technology that enables search operations on encrypted data while maintaining confidentiality. Extensive research has been conducted on searchable encryption utilizing public key and symmetric encryptions. However, public key encryption incurs significant computational expenses and is inefficient for querying large databases, particularly in cloud settings. Hence, we focus on searchable encryption using a secret sharing scheme (also known as searchable secret sharing), which is recognized for its minimal computational complexity. A secret sharing scheme is a method for transforming secret inputs into several distinct values known as shares. Kamal et al. (2021) introduced a simple searchable encryption method utilizing secret sharing schemes, yet did not include user access control capabilities. In this study, we introduce a secure search method with user access control that employs secure computation based on a <inline-formula> <tex-math notation="LaTeX">$(k,n)$ </tex-math></inline-formula> threshold secret sharing scheme, where every piece of data stored in the cloud has an owner, and owners grant access to users at their discretion. We assume a client-server model to perform secure computation between the owner, player, and <inline-formula> <tex-math notation="LaTeX">$n\geq k$ </tex-math></inline-formula> cloud servers. Furthermore, we provide an in-depth analysis of the security aspects of our proposed distribution, query generation, and search processes, demonstrating that our approach is resilient to honest-but-curious adversaries with information from up to <inline-formula> <tex-math notation="LaTeX">$k-1$ </tex-math></inline-formula> computing servers. Moreover, we include an improved and efficient method using an <inline-formula> <tex-math notation="LaTeX">$(n,n)$ </tex-math></inline-formula> additive secret sharing scheme when assuming <inline-formula> <tex-math notation="LaTeX">$n=k$ </tex-math></inline-formula> computing servers. We compare the proposed methods in terms of their computational and communication costs. Finally, we present a detailed performance analysis using Python, including a comparison with conventional secret sharing-based methods. |
| format | Article |
| id | doaj-art-12d0dd0d041d4d0b8c1e54e54c341fb6 |
| institution | Kabale University |
| issn | 2169-3536 |
| language | English |
| publishDate | 2025-01-01 |
| publisher | IEEE |
| record_format | Article |
| series | IEEE Access |
| spelling | doaj-art-12d0dd0d041d4d0b8c1e54e54c341fb62025-08-20T03:48:46ZengIEEEIEEE Access2169-35362025-01-0113736257365110.1109/ACCESS.2025.356266710971421Privacy-Preserving Keyword Search With Access Control for Secret Sharing-Based Data OutsourcingAhmad Akmal Aminuddin Mohd Kamal0https://orcid.org/0000-0002-7941-3021Masamune Okada1Masaya Fujisawa2https://orcid.org/0000-0001-8385-5781Department of Information and Computer Technology, Tokyo University of Science, Tokyo, JapanGraduate School of Engineering, Tokyo University of Science, Tokyo, JapanDepartment of Information and Computer Technology, Tokyo University of Science, Tokyo, JapanSearchable encryption, also known as secure search, is a technology that enables search operations on encrypted data while maintaining confidentiality. Extensive research has been conducted on searchable encryption utilizing public key and symmetric encryptions. However, public key encryption incurs significant computational expenses and is inefficient for querying large databases, particularly in cloud settings. Hence, we focus on searchable encryption using a secret sharing scheme (also known as searchable secret sharing), which is recognized for its minimal computational complexity. A secret sharing scheme is a method for transforming secret inputs into several distinct values known as shares. Kamal et al. (2021) introduced a simple searchable encryption method utilizing secret sharing schemes, yet did not include user access control capabilities. In this study, we introduce a secure search method with user access control that employs secure computation based on a <inline-formula> <tex-math notation="LaTeX">$(k,n)$ </tex-math></inline-formula> threshold secret sharing scheme, where every piece of data stored in the cloud has an owner, and owners grant access to users at their discretion. We assume a client-server model to perform secure computation between the owner, player, and <inline-formula> <tex-math notation="LaTeX">$n\geq k$ </tex-math></inline-formula> cloud servers. Furthermore, we provide an in-depth analysis of the security aspects of our proposed distribution, query generation, and search processes, demonstrating that our approach is resilient to honest-but-curious adversaries with information from up to <inline-formula> <tex-math notation="LaTeX">$k-1$ </tex-math></inline-formula> computing servers. Moreover, we include an improved and efficient method using an <inline-formula> <tex-math notation="LaTeX">$(n,n)$ </tex-math></inline-formula> additive secret sharing scheme when assuming <inline-formula> <tex-math notation="LaTeX">$n=k$ </tex-math></inline-formula> computing servers. We compare the proposed methods in terms of their computational and communication costs. Finally, we present a detailed performance analysis using Python, including a comparison with conventional secret sharing-based methods.https://ieeexplore.ieee.org/document/10971421/Secret sharingsearchable encryptionsecure searchsearchable secret sharinguser access controlsearch pattern |
| spellingShingle | Ahmad Akmal Aminuddin Mohd Kamal Masamune Okada Masaya Fujisawa Privacy-Preserving Keyword Search With Access Control for Secret Sharing-Based Data Outsourcing IEEE Access Secret sharing searchable encryption secure search searchable secret sharing user access control search pattern |
| title | Privacy-Preserving Keyword Search With Access Control for Secret Sharing-Based Data Outsourcing |
| title_full | Privacy-Preserving Keyword Search With Access Control for Secret Sharing-Based Data Outsourcing |
| title_fullStr | Privacy-Preserving Keyword Search With Access Control for Secret Sharing-Based Data Outsourcing |
| title_full_unstemmed | Privacy-Preserving Keyword Search With Access Control for Secret Sharing-Based Data Outsourcing |
| title_short | Privacy-Preserving Keyword Search With Access Control for Secret Sharing-Based Data Outsourcing |
| title_sort | privacy preserving keyword search with access control for secret sharing based data outsourcing |
| topic | Secret sharing searchable encryption secure search searchable secret sharing user access control search pattern |
| url | https://ieeexplore.ieee.org/document/10971421/ |
| work_keys_str_mv | AT ahmadakmalaminuddinmohdkamal privacypreservingkeywordsearchwithaccesscontrolforsecretsharingbaseddataoutsourcing AT masamuneokada privacypreservingkeywordsearchwithaccesscontrolforsecretsharingbaseddataoutsourcing AT masayafujisawa privacypreservingkeywordsearchwithaccesscontrolforsecretsharingbaseddataoutsourcing |