Journal of Computer Applications ›› 2021, Vol. 41 ›› Issue (11): 3288-3294.DOI: 10.11772/j.issn.1001-9081.2021010112

• Cyber security • Previous Articles     Next Articles

Searchable encryption scheme based on splittable inverted index

Xiaoling SUN(), Guang YANG, Yanping SHEN, Qiuge YANG, Tao CHEN   

  1. School of Information Engineering,Institute of Disaster Prevention,Sanhe Hebei 065201,China
  • Received:2021-01-22 Revised:2021-05-13 Accepted:2021-05-14 Online:2021-11-29 Published:2021-11-10
  • Contact: Xiaoling SUN
  • About author:SUN Xiaoling, born in 1983, M. S., lecturer. Her research interests include cryptography,information security
    YANG Guang,born in 1984,Ph. D.,associate professor. Her research interests include data analysis,image processing
    SHEN Yanping,born in 1986,Ph. D.,lecturer. Her research interests include network security
    YANG Qiuge, born in 1981, M. S., lecturer. Her research interests include data analysis
    CHEN Tao,born in 1998. His research interests include data analysis.
  • Supported by:
    the Scientific Research and Development Program of Langfang Science and Technology Bureau(2020011024);the National Natural Science Foundation of China(42007422);the Fundamental Research Funds for the Central Universities(2020011024)


孙晓玲(), 杨光, 沈焱萍, 杨秋格, 陈涛   

  1. 防灾科技学院 信息工程学院,河北 三河 065201
  • 通讯作者: 孙晓玲
  • 作者简介:孙晓玲(1983—),女,山东莱阳人,讲师,硕士,CCF会员,主要研究方向:密码学、信息安全
    杨光(1984—),女,吉林洮南人,副 教授,博士,主要研究方向:数据分析、图像处理
    沈焱萍(1986—),河北三河人,讲师,博士,CCF 会员,主要研究方向:网络安全
  • 基金资助:


For retrieving the encrypted data in cloud environment quickly, an efficient searchable encryption scheme for batch data processing scenarios was proposed. Firstly, two inverted indexes were built by the client, one file index was used to store the file-keyword mapping, another empty search index was used to store keyword-file mapping. Then, these two indexes were submitted to the cloud server. The search indexwas gradually updated and constructed according to the search tokens and file indexesduring the user’s search by the cloud, and the search results of the searched keywords were recorded by this search index. In this way, the search index construction time was shared to each retrieval process effectively and the storage space of search index was reduced. A set storage method based on key-value structure was adopted by the indexes, which supported the at-the-same-time merging and splitting of index, which means when adding and deleting files, the corresponding file index and search index were generated by the client according to the file set to be added or deleted, then the server merged or split the indexes, so that the files were able to be added and deleted in batch quickly. Testing results show that the proposed scheme greatly improves the updating efficiency of files and is suitable for batch data processing. Through leakage function, it is proved that the proposed scheme can meet the indistinguishability security standard against adaptive dynamic keyword selection attack.

Key words: cloud computing, searchable encryption, inverted index, index merging and splitting, dynamic update



关键词: 云计算, 可搜索加密, 倒排索引, 索引合并和拆分, 动态更新

CLC Number: