SUMMARYData search and sharing are two important functionalities in social networks. The social network users can form a peer-to-peer group and securely and flexibly search and share cloud data through wireless applications. When the number of users increases, the communication, storage, and computational overheads will be increased, and the quality of services such as searching and data sharing for clients could be affected. In order to solve these problems, we formalize an ID-based multi-user searchable encryption (IDB-MUSE) and formally define its security model, where the security notions accommodate indistinguishability against insider's keyword guessing attack, indistinguishability against chosen keyword attack, and indistinguishability against insider's identity guessing attack. We present an IDB-MUSE scheme, where the index and search trapdoor are of constant size. We formally prove its security properties. To improve the search efficiency, we divide the computation of the trapdoor into two phases, that is, the offline phase and the online phase. The computation cost for the online phase trapdoor remains constant with respect to the number of users. Based on the IDB-MUSE scheme, a privacy-preserving data search and sharing protocol is proposed, where only the authorized user can access the shared group data. It captures the properties of source authenticity, data and search pattern privacy-preserving, anonymity, and request unlinkability. The experimental results show that the protocol is practical for wireless applications. Copyright © 2016 John Wiley & Sons, Ltd.Received 11 December 2015; Revised 9 March 2016; Accepted 11 April 2016 KEY WORDS: social network; peer-to-peer group; searchable encryption; data sharing; insider attack; anonymity
INTRODUCTIONData search and sharing are widely used in social networks. As there is no group manager, the users in social networks form a peer-to-peer group. With the popularity of wireless communication, users usually search and share their data through wireless devices, which offer great convenience and flexibility. However, the wireless devices usually have a limited storage. Therefore, the social networks users often outsource their data to cloud, for example, the dropbox [1], amazon cloud [2], google cloud [3], and others, because of their great advantages of the powerful computation capability, the abundant storage resource and the on demand high-quality services.As a common scenario shown in Figure 1, a group of social network users access and share the cloud data through their mobile phones, laptops, and smart watches. They can outsource their shared data on the cloud storage, while any authorized user in the social network can access the data through their mobile devices. The privacy protection and system performance are regarded as two major concerns when social network users retrieve and share the cloud data via these resource constrained mobile devices.As the data is outsourced to the cloud and the cloud server may be untrusted, it need to protect the dat...