Encrypted and Compressed Key-Value Store With Pattern-Analysis Security in Cloud Systems

被引:2
作者
Zhang, Chen [1 ]
Ming, Yulong [2 ]
Wang, Mingyue [2 ]
Guo, Yu [3 ]
Jia, Xiaohua [2 ]
机构
[1] Hang Seng Univ Hong Kong, Dept Comp Sci, Hong Kong, Peoples R China
[2] City Univ Hong Kong, Dept Comp Sci, Hong Kong, Peoples R China
[3] Beijing Normal Univ, Sch Artificial Intelligence, Beijing 100875, Peoples R China
关键词
Encryption; Compression; compression; key-value store; packing algorithm; pattern-analysis security;
D O I
10.1109/TIFS.2023.3320612
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the increasing concern about data privacy and data explosion, some encrypted and compressed key-value (KV) stores have been proposed. A remarkable way to combine encryption and compression is to pack KV pairs into packs, and then compress and encrypt each pack separately. Recent research has shown that even if the data is encrypted, adversaries can still use the leaked information about data length and access frequency to launch pattern-analysis attacks. For this problem, some schemes have been proposed to protect the length and frequency distribution of packs. However, existing solutions protect such information at the cost of high storage and bandwidth overhead. In this paper, we propose an encrypted and compressed KV store with pattern-analysis security, which can resist pattern-analysis attacks with minimal overhead. We first devise a secure KV pair packing scheme, which guarantees pack length security with bounded storage overhead. Then we propose a K-indistinguishable pack frequency smoothing scheme. It can protect the distribution of pack frequency with minimal bandwidth overhead. We formally analyze the security of our design and implement our proposed secure KV storage system on Redis and RocksDB. Performance evaluation results demonstrate that our design minimizes the overhead of achieving pattern analysis security.
引用
收藏
页码:221 / 234
页数:14
相关论文
共 49 条
[1]   Encrypted Key-Value Stores [J].
Agarwal, Archita ;
Kamara, Seny .
PROGRESS IN CRYPTOLOGY - INDOCRYPT 2020, 2020, 12578 :62-85
[2]  
Agarwal R., 2015, PROC 12 USENIX C NET, P337
[3]  
[Anonymous], 2013, ANN TECHN C ATC USEN
[4]  
Atikoglu Berk, 2012, Performance Evaluation Review, V40, P53, DOI 10.1145/2318857.2254766
[5]  
Cassandra, about us
[6]  
CipherCloud, about us
[7]  
Cooper Brian F, 2010, P 1 ACM S CLOUD COMP, P143, DOI [10.1145/1807128.1807152, DOI 10.1145/1807128.1807152]
[8]  
DeCandia Giuseppe, 2007, Operating Systems Review, V41, P205, DOI 10.1145/1323293.1294281
[9]  
github, LevelDB
[10]   Software protection and simulation on oblivious RAMs [J].
Goldreich, O ;
Ostrovsky, R .
JOURNAL OF THE ACM, 1996, 43 (03) :431-473