A secure search method for cloud data storage

Authors

  • Nguyen Dao Truong (Corresponding Author) Academy of Cryptography Technique
  • Doan Thi Bich Ngoc University of Information and Communication Technology, Thai Nguyen University

DOI:

https://doi.org/10.54939/1859-1043.j.mst.106.2025.137-144

Keywords:

Cloud storage; Searchable encryption; Secure search; Digital signature; Encrypted data search.

Abstract

Storing data on cloud computing platforms offers significant benefits in terms of performance and scalability; however, it also poses serious challenges related to security and privacy. One of the key issues is enabling users to search over encrypted data without revealing its contents to the cloud service provider. In this paper, we propose a secure search method based on searchable encryption combined with a novel digital signature scheme, allowing users to perform keyword queries without decrypting the data. The proposed method is implemented and evaluated in a cloud environment, with results demonstrating acceptable performance and strong security against common attacks such as query analysis.

References

[1]. Li, F. et al. "A Survey on Searchable Symmetric Encryption", ACM Computing Surveys, 56(5), Article 119, (2023). https://dl.acm.org/doi/10.1145/3617991

[2]. Yan, L., Wang, G., Yin, T., Liu, P., Feng, H., Zhang, W., Hu, H., & Pan, F. "Attribute-Based Searchable Encryption: A Survey", Electronics, 13(9), 1621, (2024). https://doi.org/10.3390/electronics13091621

[3]. Kishiyama, B., & Alsmadi, I. "A Review on Searchable Encryption Functionality and the Evaluation of Homomorphic Encryption", International Journal of Science, Technology and Society, 12(2), (2024).

[4]. Chen, T et al. "The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption", NDSS, (2023). https://doi.org/10.14722/ndss.2023.24725

[5]. Shi, D et al.. "SPKSE: Secure Public Key Searchable Encryption Withstand Keyword Guessing Attacks", Scientific Reports, 15, 19658, (2025). https://doi.org/10.1038/s41598-025-01454-9

[6]. Cai, J., Zhao, X., Li, D., Li, H., & Fan, K. "Efficient and Expressive Public Key Authenticated Encryption with Keyword Search in Multi-user Scenarios", Cryptography and Security (cs.CR), (2025). https://doi.org/10.48550/arXiv.2503.16828

[7]. Xu, Y., Cheng, H., Li, J., & Liu, X. "Lightweight Multi-User Public-Key Authenticated Encryption With Keyword Search", IEEE Transactions on Information Forensics and Security, (2025). https://doi.org/10.1109/TIFS.2025.3550054

[8]. Zhang, K., Hu, B., Ning, J., Gong, J., & Qian, H. "Pattern Hiding and Authorized Searchable Encryption for Data Sharing in Cloud Storage", IEEE Transactions on Knowledge and Data Engineering, 37, 2802–2815, (2025). https://doi.org/10.1109/TKDE.2025.3537613

[9]. Xu, S., Cao, Y., Chen, X., Guo, Y., Yang, Y., Guo, F., & Yiu, S.-M. "Lattice-based Public Key Encryption with Authorized Keyword Search: Construction, Implementation, and Applications", Cryptology ePrint Archive, (2023).

[10]. Zhu, T., Wang, J., Xiao, Y., Gao, Y., Zhou, Y., & Weng, J. "Fully-incremental Public Key Encryption with Adjustable Timed-release Keyword Search", Information Sciences, 702, 121887, (2025).

[11]. Ngoc, D. T. B., & Truong, N. D. "Developing a digital signature scheme avoids attacks based on the order of the generator element", Journal of Military Science and Technology, 101, 131–139, (2025).

[12]. "The Sonnets", (n.d.). https://ocw.mit.edu/ans7870/6/6.006/s08/lecturenotes/files/t8.shakespeare.txt

Downloads

Published

02-10-2025

How to Cite

[1]
T. Nguyen Dao and Doan Thi Bich Ngoc, “A secure search method for cloud data storage”, JMST, vol. 106, no. 106, pp. 137–144, Oct. 2025.

Issue

Section

Information Technology & Applied Mathematics