Searchable encryption

نویسندگان

  • Artūrs Bačkurs
  • Daniel Grier
  • Adam Sealfon
  • Po-An Tsai
چکیده

We built a system supporting encrypted substring search of a text document. The user can encrypt and upload files to a server. The client can also query the server to ask whether an encrypted file contains a particular string of characters. The query, like the file, is not sent in plaintext but is encrypted or hashed. The server should be able to respond correctly to queries without learning the contents of the file or the queries. We designed and implemented two novel schemes for the problem of encrypted substring search. Both schemes require a copy of the file encrypted with a standard block cipher. The first scheme relies on an encrypted suffix array. In the second scheme, the server stores cryptographic hashes of all repeated substrings which occur in the file, as well as all substrings which occur once but would occur multiple times if the last character were deleted. It also stores the index in the file of each of these uniquely occurring substrings occurs. The encrypted suffix array scheme is simpler and has better memory usage and faster preprocessing time. The hashing scheme has better query time and security properties. Its query time can be made to be independent of the size of the file, assuming constant-time hash table lookups. The space usage on worst-case inputs is poor, but the space usage is reasonable on input files having the properties of English text or of randomly generated strings. We assume the following threat model. Threat model. We assume that the server is honest but curious. That is, the server will follow the protocol and will respond appropriately to all user queries. However, the server will additionally seek to learn whatever it can about the client’s data. The server does not have the capability to issue queries, and has no information about the strings being queried. Previous work. There has been a sequence of recent papers on the problem of keyword search of encrypted data. In this setting, the file is assumed to consist of a sequence of words, e.g. whitespaceseparated words in the file or any other atomic units the file can be broken up into. The server must be able to determine which encrypted files contain a particular queried word, which is also encrypted. Song, Wagner and Perrig [11] published the first solution to encrypted keyword search. Their scheme has provable security properties, linear-time encryption and search, and little space overhead. The CryptDB system [8] implements this encryption scheme and uses it to support keyword-based predicates in SQL queries. Several subsequent papers provide additional guarantees, alternate proposals, and improvements. For instance, Chang and Mitzenmacher [2] present an alternate scheme and prove that no information is leaked from search in addition to the set of files which contain the search keyword in common. Boneh et al. [1] present a solution in the public key setting. Kamara, Papamanthou and Roeder [3] provide a solution with a number of desirable properties, including sublinear search, strong security guarantees, and efficient upload and download of files. Popa and Zeldovich [9] present a practical encryption scheme for keyword search of data which is encrypted using different keys. The techniques used in the papers mentioned above heavily rely on the fact that search is over keywords, which roughly correspond to the words that appear in the document. Building on this insight, it is possible to encrypt each unique keyword into a list of all keywords. Thus, to search for a keyword, the user can

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Browse searchable encryption schemes: Classification, methods and recent developments

With the advent of cloud computing, data owners tend to submit their data to cloud servers and allow users to access data when needed. However, outsourcing sensitive data will lead to privacy issues. Encrypting data before outsourcing solves privacy issues, but in this case, we will lose the ability to search the data. Searchable encryption (SE) schemes have been proposed to achieve this featur...

متن کامل

Fuzzy retrieval of encrypted data by multi-purpose data-structures

The growing amount of information that has arisen from emerging technologies has caused organizations to face challenges in maintaining and managing their information. Expanding hardware, human resources, outsourcing data management, and maintenance an external organization in the form of cloud storage services, are two common approaches to overcome these challenges; The first approach costs of...

متن کامل

SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing

While cloud computing is growing at a remarkable speed, privacy issues are far from being solved. One way to diminish privacy concerns is to store data on the cloud in encrypted form. However, encryption often hinders useful computation cloud services. A theoretical approach is to employ the so-called fully homomorphic encryption, yet the overhead is so high that it is not considered a viable s...

متن کامل

Decryptable Searchable Encryption

As such, public-key encryption with keyword search (a.k.a PEKS or searchable encryption) does not allow the recipient to decrypt keywords i.e. encryption is not invertible. This paper introduces searchable encryption schemes which enable decryption. An additional feature is that the decryption key and the trapdoor derivation key are totally independent, thereby complying with many contexts of a...

متن کامل

Searchable Encryption with Keyword-Recoverability

Searchable encryption has many applications including email systems and storage systems. The usefulness of searchable encryption derives from its support of keyword-testability. Keyword-testability means that a receiver of a ciphertext can test whether the ciphertext contains a specific keyword. Recently, Bellare et al. suggested an efficientlysearchable encryption scheme with keyword-recoverab...

متن کامل

A Secure Index Management Scheme for Providing Data Sharing in Cloud Storage

Cloud storage is provided as a service in order to keep pace with the increasing use of digital information. It can be used to store data via networks and various devices and is easy to access. Unlike existing removable storage, many users can use cloud storage because it has no storage capacity limit and does not require a storage medium. Cloud storage reliability has become a topic of importa...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013