Outsourced Pattern Matching

被引:0
|
作者
Faust, Sebastian [1 ]
Hazay, Carmit [2 ]
Venturi, Daniele [3 ]
机构
[1] Ecole Polytech Fed Lausanne, Secur & Cryptog Lab, Lausanne, Switzerland
[2] Bar Ilan Univ, Fac Engn, IL-52100 Ramat Gan, Israel
[3] Aarhus Univ, Dept Comp Sci, Aarhus, Denmark
基金
美国国家科学基金会; 新加坡国家研究基金会;
关键词
SUBSET; COMPUTATION; ENCRYPTION; DELEGATION; SECURE;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In secure delegatable computation, computationally weak devices (or clients) wish to outsource their computation and data to an untrusted server in the cloud. While most earlier work considers the general question of how to securely outsource any computation to the cloud server, we focus on concrete and important functionalities and give the first protocol for the pattern matching problem in the cloud. Loosely speaking, this problem considers a text T that is outsourced to the cloud S by a client C-T. In a query phase, clients C-1,...,C-l run an efficient protocol with the server S and the client C-T in order to learn the positions at which a pattern of length m matches the text (and nothing beyond that). This is called the outsourced pattern matching problem and is highly motivated in the context of delegatable computing since it offers storage alternatives for massive databases that contain confidential data (e. g., health related data about patient history). Our constructions offer simulation-based security in the presence of semi-honest and malicious adversaries (in the random oracle model) and limit the communication in the query phase to O(m) bits plus the number of occurrences - which is optimal. In contrast to generic solutions for delegatable computation, our schemes do not rely on fully homomorphic encryption but instead uses novel ideas for solving pattern matching, based on efficiently solvable instances of the subset sum problem.
引用
下载
收藏
页码:545 / 556
页数:12
相关论文
共 50 条
  • [1] Outsourced pattern matching
    Faust, Sebastian
    Hazay, Carmit
    Venturi, Daniele
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2018, 17 (03) : 327 - 346
  • [2] Outsourced pattern matching
    Sebastian Faust
    Carmit Hazay
    Daniele Venturi
    International Journal of Information Security, 2018, 17 : 327 - 346
  • [3] Verifiable pattern matching on outsourced texts
    Catalano, Dario
    Di Raimondo, Mario
    Faro, Simone
    JOURNAL OF DISCRETE ALGORITHMS, 2018, 51 : 39 - 50
  • [4] Verifiable Pattern Matching on Outsourced Texts
    Catalano, Dario
    Di Raimondo, Mario
    Faro, Simone
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, SCN 2016, 2016, 9841 : 333 - 350
  • [5] Assuring String Pattern Matching in Outsourced Middleboxes
    Yuan, Xingliang
    Duan, Huayi
    Wang, Cong
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2018, 26 (03) : 1362 - 1375
  • [6] Efficient and secure outsourced approximate pattern matching protocol
    Wei, Xiaochao
    Zhao, Minghao
    Xu, Qiuliang
    SOFT COMPUTING, 2018, 22 (04) : 1175 - 1187
  • [7] Efficient and secure outsourced approximate pattern matching protocol
    Xiaochao Wei
    Minghao Zhao
    Qiuliang Xu
    Soft Computing, 2018, 22 : 1175 - 1187
  • [8] Bringing Execution Assurances of Pattern Matching in Outsourced Middleboxes
    Yuan, Xingliang
    Duan, Huayi
    Wang, Cong
    2016 IEEE 24TH INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP), 2016,
  • [9] PPOPM: More Efficient Privacy Preserving Outsourced Pattern Matching
    Zhou, Jun
    Cao, Zhenfu
    Dong, Xiaolei
    COMPUTER SECURITY - ESORICS 2016, PT I, 2016, 9878 : 135 - 153
  • [10] Secure and privacy-preserving pattern matching in outsourced computing
    Li, Dongmei
    Dong, Xiaolei
    Cao, Zhenfu
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3444 - 3451