Private Set Operations Over Encrypted Cloud Dataset and Applications

被引:2
|
作者
Rafiee, Mojtaba [1 ]
Khazaei, Shahram [1 ]
机构
[1] Sharif Univ Technol, Dept Math Sci, Tehran 111551639, Iran
来源
COMPUTER JOURNAL | 2021年 / 64卷 / 08期
关键词
cloud storage; secure outsourcing; private set operation; symmetric-key encryption; SEARCHABLE SYMMETRIC-ENCRYPTION; RANKED SEARCH; SCHEME; SUPPORT;
D O I
10.1093/comjnl/bxaa123
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We introduce the notion of private set operations (PSO) as a symmetric-key primitive in the cloud scenario, where a client securely outsources his dataset to a cloud service provider and later privately issues queries in the form of common set operations. We define a syntax and security notion for PSO and propose a general construction that satisfies it. There are two main ingredients to our PSO scheme: an adjustable join (Adjoin) scheme (MIT-CSAIL-TR-2012-006 (2012) Cryptographic treatment of CryptDB's adjustable join. http://people.csail.mit.edu/nickolai/papers/popa-join-tr.pdf) and a tuple set (TSet) scheme (Cash, D., Jarecki, S., Jutla, C. S., Krawczyk, H., Rosu, M.-C., and Steiner, M. (2013) Highly-Scalable Searchable Symmetric Encryption With Support for Boolean Queries. 33rd Annual Cryptology Conf., Santa Barbara, CA, August 18-22, pp. 353-373. Springer, Berlin, Heidelberg). We also propose an Adjoin construction that is substantially more efficient (in computation and storage) than the previous ones (Mironov, I., Segev, G., and Shahaf, I. (2017) Strengthening the Security of Encrypted Databases: Non-Transitive Joins. 15th Int. Conf., TCC 2017, Baltimore, MD, USA, November 12-15, pp. 631-661. Springer, Cham) due to the hardness assumption that we rely on, while retaining the same security notion. The proposed PSO scheme can be used to perform join queries on encrypted databases without revealing the duplicate patterns in the unqueried columns, which is inherent to an Adjoin scheme. In addition, we also show that the PSO scheme can be used to perform Boolean search queries on a collection of encrypted documents. We also provide standard security proofs for our constructions and present detailed efficiency evaluation and compare them with well-known previous ones.
引用
收藏
页码:1145 / 1162
页数:18
相关论文
共 50 条
  • [1] An Experimental Study of Encrypted Polynomial Arithmetics for Private Set Operations
    Kim, Myungsun
    Kim, Benjamin Z.
    [J]. JOURNAL OF COMMUNICATIONS AND NETWORKS, 2017, 19 (05) : 431 - 441
  • [2] Private Set Intersection With Authorization Over Outsourced Encrypted Datasets
    Wang, Yuanhao
    Huang, Qiong
    Li, Hongbo
    Xiao, Meiyan
    Ma, Sha
    Susilo, Willy
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 4050 - 4062
  • [3] Authorized Private Keyword Search over Encrypted Data in Cloud Computing
    Li, Ming
    Yu, Shucheng
    Cao, Ning
    Lou, Wenjing
    [J]. 31ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2011), 2011, : 383 - 392
  • [4] A novel dataset for encrypted virtual private network traffic
    Naas, Mohamed
    Fesl, Jan
    [J]. DATA IN BRIEF, 2023, 47
  • [5] Cloud based private data analytic using secure computation over encrypted data
    Zaraket, Christiana
    Hariss, Khalil
    Chamoun, Maroun
    Nicolas, Tony
    [J]. JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (08) : 4931 - 4942
  • [6] TRQED: Secure and Fast Tree-Based Private Range Queries over Encrypted Cloud
    Yang, Wei
    Xu, Yang
    Nie, Yiwen
    Shen, Yao
    Huang, Liusheng
    [J]. DATABASE SYSTEMS FOR ADVANCED APPLICATIONS (DASFAA 2018), PT II, 2018, 10828 : 130 - 146
  • [7] Private Conjunctive Query over Encrypted Data
    Saha, Tushar Kanti
    Koshiba, Takeshi
    [J]. PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2017, 2017, 10239 : 149 - 164
  • [8] Distributed private matching and set operations
    Ye, Qingsong
    Wang, Huaxiong
    Pieprzyk, Josef
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2008, 4991 : 347 - 360
  • [9] Keyword search over encrypted cloud data based on blockchain in smart medical applications
    Niu, Shufen
    Song, Mi
    Fang, Lizhi
    Yu, Fei
    Han, Song
    Wang, Caifen
    [J]. COMPUTER COMMUNICATIONS, 2022, 192 : 33 - 47
  • [10] Private and oblivious set and multiset operations
    Blanton, Marina
    Aguiar, Everaldo
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2016, 15 (05) : 493 - 518