Improving the Performance of Searchable Symmetric Encryption by Optimizing Locality

Authors

  • Aya A. Alyousif Department of Computer Science, Education Co1Department of Computer Science, Education College for Pure Sciences, University of Basrah, Basrah, Iraqllege for Pure Sciences, University of Basrah, Basrah, Iraq
  • Ali A. Yassin Department of Computer Science, College of Education for Pure Sciences, University of Basrah, Basrah, Iraq.
  • Zaid A. Abduljabbar Department of Computer Science, College of Education for Pure Sciences, University of Basrah, Basrah, Iraq.
  • Ke Xu Shenzhen Research Institute of Huazhong University of Science and Technology, Shenzhen, China

DOI:

https://doi.org/10.56714/bjrs.49.1.9

Keywords:

Locality, Optimal locality, Searchable Symmetric Encryption, Cloud Server, Inverted Index

Abstract

Both individuals and organizations prioritize data security and privacy, leading to an increasing focus on technological solutions that emphasize these aspects. Searchable symmetric encryption stands out as a prominent choice for secure storage and search of encrypted data on cloud servers, contributing to this objective. While searchable symmetric encryption offers numerous benefits, it also faces certain challenges, particularly when dealing with large databases. One significant challenge is poor performance, often attributed to poor locality. Visiting multiple locations can significantly increase the time required for data retrieval. Additionally, optimization methods aimed at improving locality can sometimes impact read efficiency or result in excessive storage of the encrypted index on the cloud server. In this paper, we present a scheme that effectively addresses these issues. We have enhanced the encrypted inverted index storage mechanism to improve information retrieval performance. Our scheme achieves optimal locality O(1) and optimal read efficiency in O(1), resulting in a significant increase in retrieval speed. Through experimentation with real-world data, we have demonstrated the practicality, accuracy, and security of our scheme.

Downloads

Download data is not yet available.

References

A. Ahmed, S. Kumar, A. A. Shah, A. Bhutto, Trop. Sci. J.,2(1), 1(2023).

M. F. Mushtaq, U. Akram, I. Khan, S. N. Khan, A. Shahzad, A. Ullah, Int. J. Adv. Comput. Sci. Appl., 8(10), 2017.

J. R. Vacca, CRC press, 2016.

G. Sen Poh, J.-J. Chin, W.-C. Yau, K.-K. R. Choo, M. S. Mohamad, ACM Comput. Surv., 50(3), 1 (2017).

D. V. N. Siva Kumar, P. Santhi Thilagam, Knowl. Inf. Syst., 61(3), 1179(2019).

D. Cash S. Tessaro, in Annual international conference on the theory and applications of cryptographic techniques, 351(2014).

G. Asharov, M. Naor, G. Segev, I. Shahaf, in Proceedings of the forty-eighth annual ACM symposium on Theory of Computing, 1101(2016).

I. Demertzis ,C. Papamanthou, in Proceedings of the 2017 ACM International Conference on Management of Data, 1053(2017).

G. Asharov, G. Segev, I. Shahaf, J. Cryptol., 34(2),1(2021).

E.-J. Goh, Cryptol. ePrint Arch., 2003.

Y.-C. Chang, M. Mitzenmacher, in International conference on applied cryptography and network security, 442(2005).

R. Curtmola, J. Garay, S. Kamara, R. Ostrovsky, in Proceedings of the 13th ACM conference on Computer and communications security, 79(2006).

D. X. Song, D. Wagner,A. Perrig, in Proceeding 2000 IEEE symposium on security and privacy. S&P 2000, 44(2000).

D. Cash, S. Jarecki, C. Jutla, H. Krawczyk, M.-C. Roşu, M. Steiner, in Annual cryptology conference, 353(2013).

M. Chase, S. Kamara, in International conference on the theory and application of cryptology and information security, 577(2010).

P. Van Liesdonk, S. Sedghi, J. Doumen, P. Hartel, W. Jonker, in Workshop on Secure Data Management, 87(2010).

K. Kurosawa, Y. Ohtaki, in c, 309(2013).

S. Kamara, C. Papamanthou, T. Roeder, in Proceedings of the 2012 ACM conference on Computer and communications security, 965(2012).

H. M. Mohammed, A. I. Abdulsada, Iraqi J. Electr. Electron. Eng., 17(2), 2021.

H. M. Mohammed, A. I. Abdulsada, J. Basrah Res., 47(1), 2021.

C. Guo, W. Li, X. Tang, K.-K. R. Choo, Y. Liu, IEEE Trans. Dependable Secur. Comput., 2023.

Z. A. Abduljabbar, A. Ibrahim, M. A. Al Sibahee, S. Lu, S. M. Umran, in 2021 IEEE 45th Annual Computers, Software, and Applications Conference (COMPSAC), 1397(2021).

M. A. Al Sibahee, A. I. Abdulsada, Z. A. Abduljabbar, J. Ma, V. O. Nyangaresi, S. M. Umran, Appl. Sci., 11(24), 2021.

M. A. Hussain et al., Egypt. Informatics J., 23(4), 145(2022).

M. Bellare, R. Canetti, H. Krawczyk, in Advances in Cryptology—CRYPTO’96: 16th Annual International Cryptology Conference Santa Barbara, California, USA August 18–22, 1996 Proceedings 16, 1(1996).

J. Katz,Y. Lindell, CRC press, 2020.

D. Cash et al., Cryptol. ePrint Arch., 2014.

Downloads

Published

30-06-2023

How to Cite

Alyousif , A. A., Yassin , A. A., Abduljabbar, Z. A., & Xu, K. (2023). Improving the Performance of Searchable Symmetric Encryption by Optimizing Locality. J. Basrah Res. (Sci.), 49(1), 102–113. https://doi.org/10.56714/bjrs.49.1.9

Issue

Section

Articles