Nowhere to Leak: A Multi-client Forward and Backward Private Symmetric Searchable Encryption Scheme

被引:4
|
作者
Bakas, Alexandros [1 ]
Michalas, Antonis [1 ]
机构
[1] Tampere Univ, Tampere, Finland
关键词
Backward privacy; Cloud security; Forward privacy; Multi-client; Symmetric Searchable Encryption;
D O I
10.1007/978-3-030-81242-3_5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Symmetric Searchable Encryption (SSE) allows users to out-source encrypted data to a possibly untrusted remote location while simultaneously being able to perform keyword search directly through the stored ciphertexts. An ideal SSE scheme should reveal no information about the content of the encrypted information nor about the searched keywords and their mapping to the stored files. However, most of the existing SSE schemes fail to fulfil this property since in every search query, some information potentially valuable to a malicious adversary is leaked. The leakage becomes even bigger if the underlying SSE scheme is dynamic. In this paper, we minimize the leaked information by proposing a forward and backward private SSE scheme in a multi-client setting. Our construction achieves optimal search and update costs. In contrast to many recent works, each search query only requires one round of interaction between a user and the cloud service provider. In order to guarantee the security and privacy of the scheme and support the multi-client model (i.e. synchronization between users), we exploit the functionality offered by AMD's Secure Encrypted Virtualization (SEV).
引用
收藏
页码:84 / 95
页数:12
相关论文
共 50 条
  • [31] Dynamic Searchable Symmetric Encryption with Forward and Backward Privacy: A Survey
    Gan, Qingqing
    Zuo, Cong
    Wang, Jianfeng
    Sun, Shi-Feng
    Wang, Xiaoming
    [J]. NETWORK AND SYSTEM SECURITY, NSS 2019, 2019, 11928 : 37 - 52
  • [32] Fast Multi-User Searchable Encryption with Forward and Backward Private Access Control
    Bulbul, Salim Sabah
    Abduljabbar, Zaid Ameen
    Najem, Duaa Fadhel
    Nyangaresi, Vincent Omollo
    Ma, Junchao
    Aldarwish, Abdulla J. Y.
    [J]. JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2024, 13 (01)
  • [33] Practical Multi-Source Multi-Client Searchable Encryption With Forward Privacy: Refined Security Notion and New Constructions
    Mei, Lin
    Xu, Chungen
    Xu, Lei
    Yuan, Xingliang
    Liu, Joseph K.
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (01) : 63 - 77
  • [34] Toward Forward and Backward Private Dynamic Searchable Symmetric Encryption Supporting Data Deduplication and Conjunctive Queries
    Chen, Liqing
    Li, Jiayi
    Li, Jiguo
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (19) : 17408 - 17423
  • [35] Multi-Client Searchable Encryption over Distributed Key-Value Stores
    Lin, Wanyu
    Yuan, Xu
    Li, Baochun
    Wang, Cong
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON SMART COMPUTING (SMARTCOMP), 2017, : 72 - 78
  • [36] Verifiable Conjunctive Dynamic Searchable Symmetric Encryption With Forward and Backward Privacy
    Lu, Haitang
    Chen, Jie
    Ning, Jianting
    Zhang, Kai
    [J]. COMPUTER JOURNAL, 2023, 66 (10): : 2379 - 2392
  • [37] Accelerating Forward and Backward Private Searchable Encryption Using Trusted Execution
    Vo, Viet
    Lai, Shangqi
    Yuan, Xingliang
    Sun, Shi-Feng
    Nepal, Surya
    Liu, Joseph K.
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2020), PT II, 2020, 12147 : 83 - 103
  • [38] Libertas: Backward Private Dynamic Searchable Symmetric Encryption Supporting Wildcards
    Weener, Jeroen
    Hahn, Florian
    Peter, Andreas
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXXVI, DBSEC 2022, 2022, 13383 : 215 - 235
  • [39] Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives
    Bost, Raphael
    Minaud, Brice
    Ohrimenko, Olga
    [J]. CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 1465 - 1482
  • [40] Efficient backward private searchable encryption
    Chatterjee, Sanjit
    Puria, Shravan Kumar Parshuram
    Shah, Akash
    [J]. JOURNAL OF COMPUTER SECURITY, 2020, 28 (02) : 229 - 267