Searching Encrypted Data with Size-Locked Indexes

被引:0
|
作者
Xu, Min [1 ]
Namavari, Armin [2 ]
Cash, David [1 ]
Ristenpart, Thomas [3 ]
机构
[1] Univ Chicago, Chicago, IL 60637 USA
[2] Cornell Univ, Ithaca, NY 14853 USA
[3] Cornell Tech, New York, NY USA
基金
美国国家科学基金会;
关键词
DYNAMIC SEARCHABLE ENCRYPTION;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We investigate a simple but overlooked folklore approach for searching encrypted documents held at an untrusted service: Just stash an index (with unstructured encryption) at the service and download it for updating and searching. This approach is simple to deploy, enables rich search support beyond unsorted keyword lookup, requires no persistent client state, and (intuitively at least) provides excellent security compared with approaches like dynamic searchable symmetric encryption (DSSE). This work first shows that implementing this construct securely is more subtle than it appears, and that naive implementations with commodity indexes are insecure due to the leakage of the byte-length of the encoded index. We then develop a set of techniques for encoding indexes, called size-locking, that eliminates this leakage. Our key idea is to fix the size of indexes to depend only on features that are safe to leak. We further develop techniques for securely partitioning indexes into smaller pieces that are downloaded, trading leakage for large increases in performance in a measured way. We implement our systems and evaluate that they provide search quality matching plaintext systems, support for stateless clients, and resistance to damaging injection attacks.
引用
收藏
页码:4025 / 4042
页数:18
相关论文
共 50 条
  • [1] Searching Keywords with Wildcards on Encrypted Data
    Sedghi, Saeed
    van Liesdonk, Peter
    Nikova, Svetla
    Hartel, Pieter
    Jonker, Willem
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, 2010, 6280 : 138 - +
  • [2] Using secret sharing for searching in encrypted data
    Brinkman, R
    Doumen, J
    Jonker, W
    SECURE DATA MANAGEMENT, PROCEEDINGS, 2004, 3178 : 18 - 27
  • [4] Constructing Private Indexes on Encrypted Data for Outsourced Databases
    Tang, Yi
    Zhang, Ji
    Zhang, Xiaolei
    FUTURE DATA AND SECURITY ENGINEERING, FDSE 2014, 2014, 8860 : 71 - 85
  • [5] Nothing is for Free: Security in Searching Shared and Encrypted Data
    Tang, Qiang
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (11) : 1943 - 1952
  • [6] A FHE-based Evaluation for Searching on Encrypted Data
    Togan, Mihai
    2016 INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM 2016), 2016, : 291 - 296
  • [7] Recent Developments in Searching Over Encrypted Cloud Data
    Mittal, Sneha A.
    Krishna, C. Rama
    2016 5TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO), 2016, : 338 - 342
  • [8] An Approach for Searching on Encrypted Data Based on Bloom Filter
    Yao Hanbing
    Xiang Dong
    Peng Dewei
    Huang Jing
    2012 11TH INTERNATIONAL SYMPOSIUM ON DISTRIBUTED COMPUTING AND APPLICATIONS TO BUSINESS, ENGINEERING & SCIENCE (DCABES), 2012, : 301 - 304
  • [9] SafeBox: A Scheme for Searching and Sharing Encrypted Data in Cloud Applications
    Wang, Guofeng
    Liu, Chuanyi
    Dong, Yingfei
    Pan, Hezhong
    Han, Peiyi
    Fang, Binxing
    2017 INTERNATIONAL CONFERENCE ON SECURITY, PATTERN ANALYSIS, AND CYBERNETICS (SPAC), 2017, : 648 - 653
  • [10] A Computing-in-Memory Engine for Searching on Homomorphically Encrypted Data
    Reis, Dayane
    Niemier, Michael T.
    Hu, Xiaobo Sharon
    IEEE JOURNAL ON EXPLORATORY SOLID-STATE COMPUTATIONAL DEVICES AND CIRCUITS, 2019, 5 (02): : 123 - 131