CS2: A Searchable Cryptographic Cloud Storage System

نویسندگان

  • Seny Kamara
  • Charalampos Papamanthou
  • Tom Roeder
چکیده

Cloud storage provides a highly available, easily accessible and inexpensive remote data repository to clients who cannot afford to maintain their own storage infrastructure. While many applications of cloud storage require security guarantees against the cloud provider (e.g., storage of high-impact business data or medical records), most services cannot guarantee that the provider will not see or modify client data. This is largely because the current approaches for providing security (e.g., encryption and digital signatures) diminish the utility and/or performance of cloud storage. This paper presents CS2, a cryptographic cloud storage system that guarantees confidentiality, integrity and verifiability without sacrificing utility. In particular, while CS2 provides security against the cloud provider, clients are still able not only to efficiently access their data through a search interface but also to add and delete files securely. The CS2 system is based on new highly-efficient and provably-secure cryptographic primitives and protocols. In particular, we (1) construct the first searchable symmetric encryption scheme that is adaptively secure, dynamic and achieves sub-linear search time; (2) introduce and construct search authenticators (which allow a client to efficiently verify the correctness of search operations); and (3) design an efficient and dynamic proof of data possession scheme. Based in part on our new constructions, we propose two cryptographic protocols for cloud storage which we prove secure in the ideal/real-world paradigm. The first protocol implements standard keyword search. Our second protocol implements what we refer to as assisted keyword search, where a user performs a keyword search, sees a summary of the results and asks for a subset of these results. Experimental results from an implementation of CS2 over both simulated and real-world data sets demonstrate that all operations achieve practical performance.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Fuzzy retrieval of encrypted data by multi-purpose data-structures

The growing amount of information that has arisen from emerging technologies has caused organizations to face challenges in maintaining and managing their information. Expanding hardware, human resources, outsourcing data management, and maintenance an external organization in the form of cloud storage services, are two common approaches to overcome these challenges; The first approach costs of...

متن کامل

Dynamic Multi-Keyword Ranked Searchable Security Algorithm Using CRSA and B-Tree

With the advantage of storage as a service many enterprises are moving their valuable data to the cloud, since it costs less, easily scalable and can be accessed from anywhere any time. The trust between cloud user and provider is paramount. We use security as a parameter to establish trust. Cryptography is one way of establishing trust. Searchable encryption is a cryptographic method to provid...

متن کامل

Review on Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing

An efficient cryptographic approach for data sharing where data is shared among a group of users as Data sharing is an important functionality in cloud storage. How to securely and efficiently share a collection of data related to any subject areas with others in cloud storage. Development of new novel concept of KeyAggregate Searchable Encryption (KASE). This concept is implemented through dev...

متن کامل

The Research and Outlook for Keyword-Based Searchable Encryption in Cloud Storage

In cloud computing, users usually outsource their private data to the cloud storage to save the local storage space and reduce the management costs. Cloud storage is a commonly used cloud computing service which enables users to remotely access data in a cloud anytime and anywhere, using any device, in a pay-as-you-go manner. To protect the confidentiality and privacy of the stored data on the ...

متن کامل

Challenges and Trends on Predicate Encryption—A Better Searchable Encryption in Cloud

—As cloud storage becomes widely used, sensitive data is usually required to be encrypted before stored in the cloud. Searchable encryption schemes provide an important mechanism to cryptographically protect data and make it available to be searched and accessed. Predicate encryption, a recently developed cryptographic primitive, offers a new solution to search on encrypted data and fine-grain...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011