Multi-User Dynamic Searchable Symmetric Encryption With Corrupted Participants

被引:16
作者
Chamani, Javad Ghareh [1 ,2 ]
Wang, Yun [1 ]
Papadopoulos, Dimitrios [1 ]
Zhang, Mingyang [3 ]
Jalili, Rasool [2 ]
机构
[1] Hong Kong Univ Sci & Technol, Dept Comp Sci & Engn, Hong Kong, Peoples R China
[2] Sharif Univ Technol, Dept Comp Engn, Tehran, Iran
[3] Huawei Technol, Poisson Lab, Beijing 518129, Peoples R China
关键词
Servers; Encryption; Cryptography; Fabrics; Blockchains; Privacy; Outsourcing; Dynamic multi-user searchable symmetric encryption; secure cloud computing; data outsourcing; KEYWORD SEARCH; SUPPORT;
D O I
10.1109/TDSC.2021.3127546
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We study the problem of multi-user dynamic searchable symmetric encryption (DMUSSE) where a data owner stores its encrypted documents on an untrusted remote server and wishes to selectively allow multiple users to access them by issuing keyword search queries. Specifically, we consider the case where some of the users may be corrupted and colluding with the server to extract additional information about the dataset (beyond what they have access to). We provide the first formal security definition for the dynamic setting as well as forward and backward privacy definitions. We then propose mu SE, the first provably secure DMUSSE scheme and instantiate it in two versions, one based on oblivious data structures and one based on update queues, with different performance trade-offs. Furthermore, we extend mu SE to support verifiability of results. To achieve this, users need a secure digest initially computed by the data owner and changed after every update. We efficiently accommodate this, without relying on a trusted third party, by adopting a blockchain-based approach for the digests' dissemination and deploy our schemes over the permissioned Hyperledger Fabric blockchain. We prototype both versions and experimentally evaluate their practical performance, both as stand-alone systems and running on top of Hyperledger Fabric.
引用
收藏
页码:114 / 130
页数:17
相关论文
共 67 条
  • [1] Alderman James, 2017, Financial Cryptography and Data Security. FC 2017 International Workshops WAHC, BITCOIN, VOTING, WTSC, and TA. Revised Selected Papers: LNCS 10323, P35, DOI 10.1007/978-3-319-70278-0_3
  • [2] Forward and Backward Private Searchable Encryption with SGX
    Amjad, Ghous
    Kamara, Seny
    Moataz, Tarik
    [J]. PROCEEDINGS OF THE 12TH EUROPEAN WORKSHOP ON SYSTEMS SECURITY (EUROSEC 2019), 2019,
  • [3] [Anonymous], 2003, OPENSSL PROJ
  • [4] [Anonymous], 2019, HYP FABR
  • [5] Server-Aided Secure Computation with Off-line Parties
    Baldimtsi, Foteini
    Papadopoulos, Dimitrios
    Papadopoulos, Stavros
    Scafuro, Alessandra
    Triandopoulos, Nikos
    [J]. COMPUTER SECURITY - ESORICS 2017, PT I, 2018, 10492 : 103 - 123
  • [6] Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
  • [7] Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives
    Bost, Raphael
    Minaud, Brice
    Ohrimenko, Olga
    [J]. CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 1465 - 1482
  • [8] Σοφοζ - Forward Secure Searchable Encryption
    Bost, Raphael
    [J]. CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 1143 - 1154
  • [9] Enabling Reliable Keyword Search in Encrypted Decentralized Storage with Fairness
    Cai, Chengjun
    Weng, Jian
    Yuan, Xingliang
    Wang, Cong
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (01) : 131 - 144
  • [10] Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation
    Cash, David
    Jaeger, Joseph
    Jarecki, Stanislaw
    Jutla, Charanjit
    Krawczyk, Hugo
    Rosu, Marcel-Catalin
    Steine, Michael
    [J]. 21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,