MUSES: Efficient Multi-User Searchable Encrypted Database

被引:0
|
作者
Le, Tung [1 ]
Behnia, Rouzbeh [2 ]
Guaardo, Jorge [3 ]
Hoang, Tang [1 ]
机构
[1] Virginia Tech, Blacksburg, VA 24061 USA
[2] Univ S Florida, Tampa, FL USA
[3] Robert Bosch LLC RTC, Gerlingen, Germany
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Searchable encrypted systems enable privacy-preserving keyword search on encrypted data. Symmetric systems achieve high efficiency (e.g., sublinear search), but they mostly support single-user search. Although systems based on publickey or hybrid models support multi-user search, they incur inherent security weaknesses (e.g., keyword-guessing vulnerabilities) and scalability limitations due to costly public-key operations (e.g., pairing). More importantly, most encrypted search designs leak statistical information (e.g., search, result, and volume patterns) and thus are vulnerable to devastating leakage-abuse attacks. Some pattern-hiding schemes were proposed. However, they incur significant user bandwidth/computation costs, and thus are not desirable for largescale outsourced databases with resource-constrained users. In this paper, we propose MUSES, a new multi-writer encrypted search platform that addresses the functionality, security, and performance limitations in the existing encrypted search designs. Specifically, MUSES permits single-reader, multi-writer functionalities with permission revocation and hides all statistical information (including search, result, and volume patterns) while featuring minimal user overhead. In MUSES, we demonstrate a unique incorporation of various emerging distributed cryptographic protocols including Distributed Point Function, Distributed PRF, and Oblivious Linear Group Action. We also introduce novel distributed protocols for oblivious counting and shuffling on arithmetic shares for the general multi-party setting with a dishonest majority, which can be found useful in other applications. Our experimental results showed that the keyword search by MUSES is two orders of magnitude faster with up to 97x lower user bandwidth cost than the state-of-the-art.
引用
收藏
页码:2581 / 2598
页数:18
相关论文
共 50 条
  • [31] One for all: Efficient verifiable dynamic multi-user searchable encryption in the presence of corrupted users
    Wang, Xianmiao
    Wu, Jiaojiao
    Wang, Jianfeng
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2023, 35 (08)
  • [32] Multi-user and Keyword-based Searchable Encryption Scheme
    Zhang, Ya-ling
    Liu, Li-jun
    Wang, Shang-ping
    PROCEEDINGS OF 2016 12TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2016, : 223 - 227
  • [33] Multi-user searchable encryption voice in home IoT system
    Li, Wei
    Xiao, Yazhou
    Tang, Chao
    Huang, Xujing
    Xue, Jianwu
    INTERNET OF THINGS, 2020, 11
  • [34] Multi-user Forward Secure Dynamic Searchable Symmetric Encryption
    Wang, Qiao
    Guo, Yu
    Huang, Hejiao
    Jia, Xiaohua
    NETWORK AND SYSTEM SECURITY (NSS 2018), 2018, 11058 : 125 - 140
  • [35] Fine-grained searchable encryption in multi-user setting
    Jun Ye
    Jianfeng Wang
    Jiaolian Zhao
    Jian Shen
    Kuan-Ching Li
    Soft Computing, 2017, 21 : 6201 - 6212
  • [36] Multi-User Dynamic Searchable Symmetric Encryption With Corrupted Participants
    Chamani, Javad Ghareh
    Wang, Yun
    Papadopoulos, Dimitrios
    Zhang, Mingyang
    Jalili, Rasool
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (01) : 114 - 130
  • [37] Multi-User Verifiable Searchable Symmetric Encryption for Cloud Storage
    Liu, Xueqiao
    Yang, Guomin
    Mu, Yi
    Deng, Robert H.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (06) : 1322 - 1332
  • [38] Server-aided searchable encryption in multi-user setting
    Sun, Lixue
    Xu, Chunxiang
    Li, Chuang
    Li, Yuhui
    COMPUTER COMMUNICATIONS, 2020, 164 (164) : 25 - 30
  • [39] Fine-grained searchable encryption in multi-user setting
    Ye, Jun
    Wang, Jianfeng
    Zhao, Jiaolian
    Shen, Jian
    Li, Kuan-Ching
    SOFT COMPUTING, 2017, 21 (20) : 6201 - 6212
  • [40] Multi-User Searchable hncryption Scheme with General Access Structure
    Zirtol, Kobra Amiri
    Noroozi, Mahnaz
    Eslami, Ziba
    2015 2ND INTERNATIONAL CONFERENCE ON KNOWLEDGE-BASED ENGINEERING AND INNOVATION (KBEI), 2015, : 398 - 403