Improving the Performance of Searchable Symmetric Encryption by Optimizing Locality
DOI:
https://doi.org/10.56714/bjrs.49.1.9Keywords:
Locality, Optimal locality, Searchable Symmetric Encryption, Cloud Server, Inverted IndexAbstract
Both individuals and organizations prioritize data security and privacy, leading to an increasing focus on technological solutions that emphasize these aspects. Searchable symmetric encryption stands out as a prominent choice for secure storage and search of encrypted data on cloud servers, contributing to this objective. While searchable symmetric encryption offers numerous benefits, it also faces certain challenges, particularly when dealing with large databases. One significant challenge is poor performance, often attributed to poor locality. Visiting multiple locations can significantly increase the time required for data retrieval. Additionally, optimization methods aimed at improving locality can sometimes impact read efficiency or result in excessive storage of the encrypted index on the cloud server. In this paper, we present a scheme that effectively addresses these issues. We have enhanced the encrypted inverted index storage mechanism to improve information retrieval performance. Our scheme achieves optimal locality O(1) and optimal read efficiency in O(1), resulting in a significant increase in retrieval speed. Through experimentation with real-world data, we have demonstrated the practicality, accuracy, and security of our scheme.
Downloads
References
A. Ahmed, S. Kumar, A. A. Shah, A. Bhutto, Trop. Sci. J.,2(1), 1(2023).
M. F. Mushtaq, U. Akram, I. Khan, S. N. Khan, A. Shahzad, A. Ullah, Int. J. Adv. Comput. Sci. Appl., 8(10), 2017.
J. R. Vacca, CRC press, 2016.
G. Sen Poh, J.-J. Chin, W.-C. Yau, K.-K. R. Choo, M. S. Mohamad, ACM Comput. Surv., 50(3), 1 (2017).
D. V. N. Siva Kumar, P. Santhi Thilagam, Knowl. Inf. Syst., 61(3), 1179(2019).
D. Cash S. Tessaro, in Annual international conference on the theory and applications of cryptographic techniques, 351(2014).
G. Asharov, M. Naor, G. Segev, I. Shahaf, in Proceedings of the forty-eighth annual ACM symposium on Theory of Computing, 1101(2016).
I. Demertzis ,C. Papamanthou, in Proceedings of the 2017 ACM International Conference on Management of Data, 1053(2017).
G. Asharov, G. Segev, I. Shahaf, J. Cryptol., 34(2),1(2021).
E.-J. Goh, Cryptol. ePrint Arch., 2003.
Y.-C. Chang, M. Mitzenmacher, in International conference on applied cryptography and network security, 442(2005).
R. Curtmola, J. Garay, S. Kamara, R. Ostrovsky, in Proceedings of the 13th ACM conference on Computer and communications security, 79(2006).
D. X. Song, D. Wagner,A. Perrig, in Proceeding 2000 IEEE symposium on security and privacy. S&P 2000, 44(2000).
D. Cash, S. Jarecki, C. Jutla, H. Krawczyk, M.-C. Roşu, M. Steiner, in Annual cryptology conference, 353(2013).
M. Chase, S. Kamara, in International conference on the theory and application of cryptology and information security, 577(2010).
P. Van Liesdonk, S. Sedghi, J. Doumen, P. Hartel, W. Jonker, in Workshop on Secure Data Management, 87(2010).
K. Kurosawa, Y. Ohtaki, in c, 309(2013).
S. Kamara, C. Papamanthou, T. Roeder, in Proceedings of the 2012 ACM conference on Computer and communications security, 965(2012).
H. M. Mohammed, A. I. Abdulsada, Iraqi J. Electr. Electron. Eng., 17(2), 2021.
H. M. Mohammed, A. I. Abdulsada, J. Basrah Res., 47(1), 2021.
C. Guo, W. Li, X. Tang, K.-K. R. Choo, Y. Liu, IEEE Trans. Dependable Secur. Comput., 2023.
Z. A. Abduljabbar, A. Ibrahim, M. A. Al Sibahee, S. Lu, S. M. Umran, in 2021 IEEE 45th Annual Computers, Software, and Applications Conference (COMPSAC), 1397(2021).
M. A. Al Sibahee, A. I. Abdulsada, Z. A. Abduljabbar, J. Ma, V. O. Nyangaresi, S. M. Umran, Appl. Sci., 11(24), 2021.
M. A. Hussain et al., Egypt. Informatics J., 23(4), 145(2022).
M. Bellare, R. Canetti, H. Krawczyk, in Advances in Cryptology—CRYPTO’96: 16th Annual International Cryptology Conference Santa Barbara, California, USA August 18–22, 1996 Proceedings 16, 1(1996).
J. Katz,Y. Lindell, CRC press, 2020.
D. Cash et al., Cryptol. ePrint Arch., 2014.
Downloads
Published
Issue
Section
License
Copyright (c) 2023 Aya A. Alyousif , Ali A. Yassin , Zaid A. Abduljabbar, Ke Xu

This work is licensed under a Creative Commons Attribution 4.0 International License.
This journal is licensed under the Creative Commons Attribution 4.0 International License (CC BY 4.0).
Under this license, users are permitted to read, download, copy, distribute, print, search, link to the full texts of articles, and create derivative works, including for commercial purposes, provided that appropriate credit is given to the original author(s) and the source.
Authors retain the copyright of their published work, while granting the Journal of Basrah Researches Sciences (JBRS) the right of first publication. Proper attribution must include the article title, author name(s), journal name, DOI, and a link to the Creative Commons license.





