Searching Encrypted Data with Size-Locked Indexes

被引:0
|
作者
Xu, Min [1 ]
Namavari, Armin [2 ]
Cash, David [1 ]
Ristenpart, Thomas [3 ]
机构
[1] Univ Chicago, Chicago, IL 60637 USA
[2] Cornell Univ, Ithaca, NY 14853 USA
[3] Cornell Tech, New York, NY USA
基金
美国国家科学基金会;
关键词
DYNAMIC SEARCHABLE ENCRYPTION;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We investigate a simple but overlooked folklore approach for searching encrypted documents held at an untrusted service: Just stash an index (with unstructured encryption) at the service and download it for updating and searching. This approach is simple to deploy, enables rich search support beyond unsorted keyword lookup, requires no persistent client state, and (intuitively at least) provides excellent security compared with approaches like dynamic searchable symmetric encryption (DSSE). This work first shows that implementing this construct securely is more subtle than it appears, and that naive implementations with commodity indexes are insecure due to the leakage of the byte-length of the encoded index. We then develop a set of techniques for encoding indexes, called size-locking, that eliminates this leakage. Our key idea is to fix the size of indexes to depend only on features that are safe to leak. We further develop techniques for securely partitioning indexes into smaller pieces that are downloaded, trading leakage for large increases in performance in a measured way. We implement our systems and evaluate that they provide search quality matching plaintext systems, support for stateless clients, and resistance to damaging injection attacks.
引用
收藏
页码:4025 / 4042
页数:18
相关论文
共 50 条
  • [31] A practical privacy-preserving nearest neighbor searching method over encrypted spatial data
    Jing Zhang
    Chuanwen Li
    The Journal of Supercomputing, 2023, 79 : 14146 - 14171
  • [32] A practical privacy-preserving nearest neighbor searching method over encrypted spatial data
    Zhang, Jing
    Li, Chuanwen
    JOURNAL OF SUPERCOMPUTING, 2023, 79 (13): : 14146 - 14171
  • [33] OS2: Oblivious similarity based searching for encrypted data outsourced to an untrusted domain
    Pervez, Zeeshan
    Ahmad, Mahmood
    Khattak, Asad Masood
    Ramzan, Naeem
    Khan, Wajahat Ali
    PLOS ONE, 2017, 12 (07):
  • [34] Significant discrepancies were found in pooled estimates of searching with Chinese indexes versus searching with English indexes
    Xue, Jing
    Chen, Wenhang
    Chen, Lizhang
    Gaudet, Laura
    Moher, David
    Walker, Mark
    Wen, Shi Wu
    JOURNAL OF CLINICAL EPIDEMIOLOGY, 2016, 70 : 246 - 253
  • [35] Searching dynamic communities with personal indexes
    Löser, A
    Tempich, C
    Quilitz, B
    Balke, WT
    Staab, S
    Nejdl, W
    SEMANTIC WEB - ISWC 2005, PROCEEDINGS, 2005, 3729 : 491 - 505
  • [36] On Minimizing the Size of Encrypted Databases
    Di Crescenzo, Giovanni
    Shallcross, David
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXVIII, 2014, 8566 : 364 - 372
  • [37] Time-scoped searching of encrypted audit logs
    Davis, D
    Monrose, F
    Reiter, MK
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2004, 3269 : 532 - 545
  • [38] Efficient Searching Over Encrypted Database: Methodology and Algorithms
    Deshpande, Varad
    Das, Debasis
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, ICDCIT 2019, 2019, 11319 : 327 - 338
  • [39] Algorithm Analysis of Multi Keyword Rank Searching Using Tree Method upon Encrypted Cloud Data
    Tanwar, Pawan Kumar
    Khunteta, Ajay
    Goar, Vishal
    3RD INTERNATIONAL CONFERENCE ON CONDENSED MATTER & APPLIED PHYSICS (ICC-2019), 2020, 2220
  • [40] Querying Encrypted Data
    Arasu, Arvind
    Eguro, Ken
    Kaushik, Raghav
    Ramamurthy, Ravi
    SIGMOD'14: PROCEEDINGS OF THE 2014 ACM SIGMOD INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA, 2014, : 1259 - 1261