Sorting and Searching Behind the Curtain

被引:37
作者
Baldimtsi, Foteini [1 ,2 ]
Ohrimenko, Olga [3 ]
机构
[1] Boston Univ, Boston, MA 02215 USA
[2] Univ Athens, Athens, Greece
[3] Microsoft Res, Cambridge, England
来源
Financial Cryptography and Data Security (FC 2015) | 2015年 / 8975卷
关键词
Private sort; Privacy in the cloud; Ranked search on encrypted data; ENCRYPTED CLOUD DATA;
D O I
10.1007/978-3-662-47854-7_8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We propose a framework where a user can outsource his data to a cloud server in an encrypted form and then request the server to perform computations on this data and sort the result. Sorting is achieved via a novel protocol where the server is assisted by a secure coprocessor that is required to have only minimal computational and memory resources. The server and the coprocessor are assumed to be honest but curious, i.e., they honestly follow the protocol but are interested in learning more about the user data. We refer to the new protocol as private outsourced sorting since it guarantees that neither the server nor the coprocessor learn anything about user data as long as they are noncolluding. We formally define private outsourced sorting and present an efficient construction that is based on an encryption scheme with semi-homomorphic properties. As an application of our private sort we present MRSE: the first scheme for outsourced search over encrypted data that efficiently answers multi-term queries with the result ranked using frequency of query terms in the data, while maintaining data privacy.
引用
收藏
页码:127 / 146
页数:20
相关论文
共 30 条
[1]  
Adida B, 2007, LECT NOTES COMPUT SC, V4392, P555
[2]  
[Anonymous], 2006, ACM CCS 2006
[3]  
[Anonymous], 2008, Introduction to information retrieval
[4]  
[Anonymous], 2001, FDN CRYPTOGRAPHY
[5]  
[Anonymous], 2012, NDSS
[6]  
ASHAROV G, 2013, ACM CCS, P00535
[7]  
Baldimtsi Foteini, 2014, 20141017 CRYPT EPRIN
[8]  
BATCHER KE, 1968, AFIPS SPRING JOINT C
[9]   Efficient Garbling from a Fixed-Key Blockcipher [J].
Bellare, Mihir ;
Viet Tung Hoang ;
Keelveedhi, Sriram ;
Rogaway, Phillip .
2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2013, :478-492
[10]  
Boldyreva A, 2011, LECT NOTES COMPUT SC, V6841, P578, DOI 10.1007/978-3-642-22792-9_33