Improving the Performance of Searchable Symmetric Encryption by Optimizing Locality
DOI:
https://doi.org/10.56714/bjrs.49.1.9Keywords:
Locality, Optimal locality, Searchable Symmetric Encryption, Cloud Server, Inverted IndexAbstract
Both individuals and organizations prioritize data security and privacy, leading to an increasing focus on technological solutions that emphasize these aspects. Searchable symmetric encryption stands out as a prominent choice for secure storage and search of encrypted data on cloud servers, contributing to this objective. While searchable symmetric encryption offers numerous benefits, it also faces certain challenges, particularly when dealing with large databases. One significant challenge is poor performance, often attributed to poor locality. Visiting multiple locations can significantly increase the time required for data retrieval. Additionally, optimization methods aimed at improving locality can sometimes impact read efficiency or result in excessive storage of the encrypted index on the cloud server. In this paper, we present a scheme that effectively addresses these issues. We have enhanced the encrypted inverted index storage mechanism to improve information retrieval performance. Our scheme achieves optimal locality O(1) and optimal read efficiency in O(1), resulting in a significant increase in retrieval speed. Through experimentation with real-world data, we have demonstrated the practicality, accuracy, and security of our scheme.
Downloads
References
A. Ahmed, S. Kumar, A. A. Shah, A. Bhutto, Trop. Sci. J.,2(1), 1(2023).
M. F. Mushtaq, U. Akram, I. Khan, S. N. Khan, A. Shahzad, A. Ullah, Int. J. Adv. Comput. Sci. Appl., 8(10), 2017.
J. R. Vacca, CRC press, 2016.
G. Sen Poh, J.-J. Chin, W.-C. Yau, K.-K. R. Choo, M. S. Mohamad, ACM Comput. Surv., 50(3), 1 (2017).
D. V. N. Siva Kumar, P. Santhi Thilagam, Knowl. Inf. Syst., 61(3), 1179(2019).
D. Cash S. Tessaro, in Annual international conference on the theory and applications of cryptographic techniques, 351(2014).
G. Asharov, M. Naor, G. Segev, I. Shahaf, in Proceedings of the forty-eighth annual ACM symposium on Theory of Computing, 1101(2016).
I. Demertzis ,C. Papamanthou, in Proceedings of the 2017 ACM International Conference on Management of Data, 1053(2017).
G. Asharov, G. Segev, I. Shahaf, J. Cryptol., 34(2),1(2021).
E.-J. Goh, Cryptol. ePrint Arch., 2003.
Y.-C. Chang, M. Mitzenmacher, in International conference on applied cryptography and network security, 442(2005).
R. Curtmola, J. Garay, S. Kamara, R. Ostrovsky, in Proceedings of the 13th ACM conference on Computer and communications security, 79(2006).
D. X. Song, D. Wagner,A. Perrig, in Proceeding 2000 IEEE symposium on security and privacy. S&P 2000, 44(2000).
D. Cash, S. Jarecki, C. Jutla, H. Krawczyk, M.-C. Roşu, M. Steiner, in Annual cryptology conference, 353(2013).
M. Chase, S. Kamara, in International conference on the theory and application of cryptology and information security, 577(2010).
P. Van Liesdonk, S. Sedghi, J. Doumen, P. Hartel, W. Jonker, in Workshop on Secure Data Management, 87(2010).
K. Kurosawa, Y. Ohtaki, in c, 309(2013).
S. Kamara, C. Papamanthou, T. Roeder, in Proceedings of the 2012 ACM conference on Computer and communications security, 965(2012).
H. M. Mohammed, A. I. Abdulsada, Iraqi J. Electr. Electron. Eng., 17(2), 2021.
H. M. Mohammed, A. I. Abdulsada, J. Basrah Res., 47(1), 2021.
C. Guo, W. Li, X. Tang, K.-K. R. Choo, Y. Liu, IEEE Trans. Dependable Secur. Comput., 2023.
Z. A. Abduljabbar, A. Ibrahim, M. A. Al Sibahee, S. Lu, S. M. Umran, in 2021 IEEE 45th Annual Computers, Software, and Applications Conference (COMPSAC), 1397(2021).
M. A. Al Sibahee, A. I. Abdulsada, Z. A. Abduljabbar, J. Ma, V. O. Nyangaresi, S. M. Umran, Appl. Sci., 11(24), 2021.
M. A. Hussain et al., Egypt. Informatics J., 23(4), 145(2022).
M. Bellare, R. Canetti, H. Krawczyk, in Advances in Cryptology—CRYPTO’96: 16th Annual International Cryptology Conference Santa Barbara, California, USA August 18–22, 1996 Proceedings 16, 1(1996).
J. Katz,Y. Lindell, CRC press, 2020.
D. Cash et al., Cryptol. ePrint Arch., 2014.

Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Aya A. Alyousif , Ali A. Yassin , Zaid A. Abduljabbar, Ke Xu

This work is licensed under a Creative Commons Attribution 4.0 International License.