Nothing is for Free: Security in Searching Shared and Encrypted Data

被引:51
|
作者
Tang, Qiang [1 ]
机构
[1] Univ Luxembourg, Appl Secur & Informat Assurance Grp, Ctr Secur Reliabil & Trust, L-1511 Luxembourg, Luxembourg
关键词
Multi-party searchable encryption (MPSE); data privacy; trapdoor privacy; pairing; KEY EXCHANGE; PRIVACY;
D O I
10.1109/TIFS.2014.2359389
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Most existing symmetric searchable encryption schemes aim at allowing a user to outsource her encrypted data to a cloud server and delegate the latter to search on her behalf. These schemes do not qualify as a secure and scalable solution for the multiparty setting, where users outsource their encrypted data to a cloud server and selectively authorize each other to search. Due to the possibility that the cloud server may collude with some malicious users, it is a challenge to have a secure and scalable multiparty searchable encryption (MPSE) scheme. This is shown by our analysis on the Popa-Zeldovich scheme, which says that an honest user may leak all her search patterns even if she shares only one of her documents with another malicious user. Based on our analysis, we present a new security model for MPSE by considering the worst case and average-case scenarios, which capture different server-user collusion possibilities. We then propose a MPSE scheme by employing the bilinear property of Type-3 pairings and prove its security based on the bilinear Diffie-Hellman variant and symmetric external Diffie-Hellman assumptions in the random oracle model.
引用
收藏
页码:1943 / 1952
页数:10
相关论文
共 50 条
  • [1] Encrypted Shared Data Spaces
    Russello, Giovanni
    Dong, Changyu
    Dulay, Naranker
    Chaudron, Michel
    van Steen, Maarten
    COORDINATION MODELS AND LANGUAGES, PROCEEDINGS, 2008, 5052 : 264 - +
  • [2] Searching Keywords with Wildcards on Encrypted Data
    Sedghi, Saeed
    van Liesdonk, Peter
    Nikova, Svetla
    Hartel, Pieter
    Jonker, Willem
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, 2010, 6280 : 138 - +
  • [3] Using secret sharing for searching in encrypted data
    Brinkman, R
    Doumen, J
    Jonker, W
    SECURE DATA MANAGEMENT, PROCEEDINGS, 2004, 3178 : 18 - 27
  • [4] Security models for delegated keyword searching within encrypted contents
    Yau, Wei-Chuen
    Phan, Raphael C. -W.
    Heng, Swee-Huay
    Goi, Bok-Min
    JOURNAL OF INTERNET SERVICES AND APPLICATIONS, 2012, 3 : 233 - 241
  • [5] Security issues in querying encrypted data
    Kantarcioglu, M
    Clifton, C
    DATA AND APPLICATIONS SECURITY XIX, PROCEEDINGS, 2005, 3654 : 325 - 337
  • [6] Shared and searchable encrypted data for untrusted servers
    Dong, Changyu
    Russello, Giovanni
    Dulay, Naranker
    JOURNAL OF COMPUTER SECURITY, 2011, 19 (03) : 367 - 397
  • [7] Shared and searchable encrypted data for untrusted servers
    Dong, Changyu
    Russello, Giovanni
    Dulay, Naranker
    DATA AND APPLICATIONS SECURITY XXII, 2008, 5094 : 127 - 143
  • [8] A FHE-based Evaluation for Searching on Encrypted Data
    Togan, Mihai
    2016 INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM 2016), 2016, : 291 - 296
  • [9] Searching Encrypted Data with Size-Locked Indexes
    Xu, Min
    Namavari, Armin
    Cash, David
    Ristenpart, Thomas
    PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, 2021, : 4025 - 4042
  • [10] Recent Developments in Searching Over Encrypted Cloud Data
    Mittal, Sneha A.
    Krishna, C. Rama
    2016 5TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO), 2016, : 338 - 342