An In-Depth Analysis on Efficiency and Vulnerabilities on a Cloud-Based Searchable Symmetric Encryption Solution

Main Article Content

Prithvi Chaudhari
Ji-Jian Chin
Soeheila Moesfa bt Mohamad


Searchable Symmetric Encryption (SSE) has come to be as an integral cryptographic approach in a world where digital privacy is essential. The capacity to search through encrypted data whilst maintaining its integrity meets the most important demand for security and confidentiality in a society that is increasingly dependent on cloud-based services and data storage. SSE offers efficient processing of queries over encrypted datasets, allowing entities to comply with data privacy rules while preserving database usability. Our research goes into this need, concentrating on the development and thorough testing of an SSE system based on Curtmola’s architecture and employing Advanced Encryption Standard (AES) in Cypher Block Chaining (CBC) mode. A primary goal of the research is to conduct a thorough evaluation of the security and performance of the system. In order to assess search performance, a variety of database settings were extensively tested, and the system's security was tested by simulating intricate threat scenarios such as count attacks and leakage abuse. The efficiency of operation and cryptographic robustness of the SSE system are critically examined by these reviews.

Article Details



R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, “Searchable symmetric encryption: improved definitions and efficient constructions,” in Proceedings of the 13th ACM conference on Computer and communications security, Alexandria Virginia USA: ACM, Oct. 2006, pp. 79–88. doi: 10.1145/1180405.1180417.

S. Kamara, C. Papamanthou, and T. Roeder, “Dynamic searchable symmetric encryption,” in Proceedings of the 2012 ACM conference on Computer and communications security, Raleigh North Carolina USA: ACM, Oct. 2012, pp. 965–976. doi: 10.1145/2382196.2382298.

L. Xu, H. Duan, A. Zhou, X. Yuan, and C. Wang, “Interpreting and Mitigating Leakage-Abuse Attacks in Searchable Symmetric Encryption,” IEEE Trans. Inf. Forensics Secur., vol. 16, pp. 5310–5325, 2021, doi: 10.1109/TIFS.2021.3128823.

L. Chen, Y. Xue, Y. Mu, L. Zeng, F. Rezaeibagha, and R. H. Deng, “CASE-SSE: Context-Aware Semantically Extensible Searchable Symmetric Encryption for Encrypted Cloud Data,” IEEE Trans. Serv. Comput., vol. 16, no. 2, pp. 1011–1022, Mar. 2023, doi: 10.1109/TSC.2022.3162266.

Y.-C. Liu and M.-F. Liu, “Implementation of Grover’s Algorithm & Bernstein-Vazirani Algorithm with IBM Qiskit,” J. Inform. Web Eng., vol. 3, no. 1, pp. 76–95, 2024.

Babitha M.P. and K. R. R. Babu, “Secure cloud storage using AES encryption,” in 2016 International Conference on Automatic Control and Dynamic Optimization Techniques (ICACDOT), Pune, India: IEEE, Sep. 2016, pp. 859–864. doi: 10.1109/ICACDOT.2016.7877709.

M. I. Salam et al., “Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage,” Hum.-Centric Comput. Inf. Sci., vol. 5, no. 1, p. 19, Dec. 2015, doi: 10.1186/s13673-015-0039-9.

Q. Song, Z. Liu, J. Cao, K. Sun, Q. Li, and C. Wang, “SAP-SSE: Protecting Search Patterns and Access Patterns in Searchable Symmetric Encryption,” IEEE Trans. Inf. Forensics Secur., vol. 16, pp. 1795–1809, 2021, doi: 10.1109/TIFS.2020.3042058.

K. A. Dongre, R. S. Thakur, and A. Abraham, “Secure cloud storage of data,” in 2014 International Conference on Computer Communication and Informatics, Coimbatore, India: IEEE, Jan. 2014, pp. 1–5. doi: 10.1109/ICCCI.2014.6921741.

C. Hu, L. Han, and S. M. Yiu, “Efficient and secure multi-functional searchable symmetric encryption scheme,” Secur. Commun. Netw., vol. 9, no. 1, pp. 34–42, Jan. 2016, doi: 10.1002/sec.1376.

K. S. Kim, M. Kim, D. Lee, J. H. Park, and W.-H. Kim, “Forward Secure Dynamic Searchable Symmetric Encryption with Efficient Updates,” in Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas Texas USA: ACM, Oct. 2017, pp. 1449–1463. doi: 10.1145/3133956.3133970.

D. X. Song, D. Wagner, and A. Perrig, “Practical techniques for searches on encrypted data,” in Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000, 2000, pp. 44–55. doi: 10.1109/SECPRI.2000.848445.

C. Bosch et al., “Distributed Searchable Symmetric Encryption,” in 2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada: IEEE, Jul. 2014, pp. 330–337. doi: 10.1109/PST.2014.6890956.

D. Cash, P. Grubbs, J. Perry, and T. Ristenpart, “Leakage-Abuse Attacks Against Searchable Encryption,” in Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver Colorado USA: ACM, Oct. 2015, pp. 668–679. doi: 10.1145/2810103.2813700.

M. S. Islam, M. Kuzu, and M. Kantaracioglu, “Access Pattern disclosure on Searchable Encryption: Ramification, Attack and Mitigation”.

F. Chen, T. Xiang, Y. Yang, and S. S. M. Chow, “Secure cloud storage meets with secure network coding,” in IEEE INFOCOM 2014 - IEEE Conference on Computer Communications, Toronto, ON, Canada: IEEE, Apr. 2014, pp. 673–681. doi: 10.1109/INFOCOM.2014.6847993.

G. S. Poh, J.-J. Chin, W.-C. Yau, K.-K. R. Choo, and M. S. Mohamad, “Searchable Symmetric Encryption: Designs and Challenges,” ACM Comput. Surv., vol. 50, no. 3, pp. 1–37, May 2018, doi: 10.1145/3064005.

X. Song, C. Dong, D. Yuan, Q. Xu, and M. Zhao, “Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency,” IEEE Trans. Dependable Secure Comput., vol. 17, no. 5, pp. 912–927, Sep. 2020, doi: 10.1109/TDSC.2018.2822294.

G. Chen, T.-H. Lai, M. K. Reiter, and Y. Zhang, “Differentially Private Access Patterns for Searchable Symmetric Encryption,” in IEEE INFOCOM 2018 - IEEE Conference on Computer Communications, Honolulu, HI: IEEE, Apr. 2018, pp. 810–818. doi: 10.1109/INFOCOM.2018.8486381.

K. He, J. Chen, Q. Zhou, R. Du, and Y. Xiang, “Secure Dynamic Searchable Symmetric Encryption With Constant Client Storage Cost,” IEEE Trans. Inf. Forensics Secur., vol. 16, pp. 1538–1549, 2021, doi: 10.1109/TIFS.2020.3033412.

J. Li et al., “Searchable Symmetric Encryption with Forward Search Privacy,” IEEE Trans. Dependable Secure Comput., vol. 18, no. 1, pp. 460–474, Jan. 2021, doi: 10.1109/TDSC.2019.2894411.

Q. Gan, X. Wang, D. Huang, J. Li, D. Zhou, and C. Wang, “Towards Multi-Client Forward Private Searchable Symmetric Encryption in Cloud Computing,” IEEE Trans. Serv. Comput., vol. 15, no. 6, pp. 3566–3576, Nov. 2022, doi: 10.1109/TSC.2021.3087155.

G. Asharov, G. Segev, and I. Shahaf, “Tight Tradeoffs in Searchable Symmetric Encryption,” J. Cryptol., vol. 34, no. 2, p. 9, Apr. 2021, doi: 10.1007/s00145-020-09370-z.

J. Wang and S. S. M. Chow, “Forward and Backward-Secure Range-Searchable Symmetric Encryption,” Proc. Priv. Enhancing Technol., vol. 2022, no. 1, pp. 28–48, Jan. 2022, doi: 10.2478/popets-2022-0003.

K. Salmani, “An Efficient, Verifiable, and Dynamic Searchable Symmetric Encryption with Forward Privacy,” in 2022 19th Annual International Conference on Privacy, Security & Trust (PST), Fredericton, NB, Canada: IEEE, Aug. 2022, pp. 1–10. doi: 10.1109/PST55820.2022.9851964.

L. Chen, J. Li, and J. Li, “Toward Forward and Backward Private Dynamic Searchable Symmetric Encryption Supporting Data Deduplication and Conjunctive Queries,” IEEE Internet Things J., vol. 10, no. 19, pp. 17408–17423, Oct. 2023, doi: 10.1109/JIOT.2023.3274390.

S.-Y. Tan, J.-J. Chin, G.-S. Poh, Y. H. S. Kam, and W.-C. Yau, “A Client-Server Prototype of a Symmetric Key Searchable Encryption Scheme Using Open-Source Applications,” in 2015 5th International Conference on IT Convergence and Security (ICITCS), Kuala Lumpur, Malaysia: IEEE, Aug. 2015, pp. 1–5. doi: 10.1109/ICITCS.2015.7292892.

“How Do You Write Test Cases for a Text Box?,” Testsigma Blog. Jan. 2024. Accessed: Feb. 09, 2024. [Online]. Available:

B. Minaud and M. Reichle, “Hermes: I/O-Efficient Forward-Secure Searchable Symmetric Encryption,” in Advances in Cryptology – ASIACRYPT 2023, vol. 14443, J. Guo and R. Steinfeld, Eds., Singapore: Springer Nature Singapore, 2023, pp. 263–294. doi: 10.1007/978-981-99-8736-8_9.

B. Zhao, Z. Chen, and H. Lin, “Cycle ORAM: A Practical Protection for Access Pattern in Untrusted Storage,” IEEE Access, vol. 7, pp. 26684–26695, 2019, doi: 10.1109/ACCESS.2019.2900304.

E. Stefanov et al., “Path ORAM: an extremely simple oblivious RAM protocol,” in Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security - CCS ’13, Berlin, Germany: ACM Press, 2013, pp. 299–310. doi: 10.1145/2508859.2516660.

C. V. Wright and D. Pouliot, “Early Detection and Analysis of Leakage Abuse Vulnerabilities.” 2017. Accessed: Feb. 10, 2024. [Online]. Available:

Z. Gui, K. G. Paterson, and S. Patranabis, “Rethinking Searchable Symmetric Encryption,” in 2023 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA: IEEE, May 2023, pp. 1401–1418. doi: 10.1109/SP46215.2023.10179460.

J.-F. Lai and S.-H. Heng, “Secure File Storage On Cloud Using Hybrid Cryptography,” J. Inform. Web Eng., vol. 1, no. 2, pp. 1–18, Sep. 2022, doi: 10.33093/jiwe.2022.1.2.1.