A novel searchable encryption scheme to reduce the access pattern leakage

被引:8
作者
Awais, Muhammad [1 ]
Tahir, Shahzaib [1 ]
Khan, Fawad [1 ]
Tahir, Hasan [1 ]
Tahir, Ruhma [2 ]
Latif, Rabia [3 ]
Umair, Mir Yasir [1 ]
机构
[1] Natl Univ Sci & Technol, Dept Informat Secur, Islamabad, Pakistan
[2] Univ Essex, Sch Comp Sci & Elect Engn CSEE, Colchester, Essex, England
[3] Prince Sultan Univ, Coll Comp & Informat Sci, Riyadh, Saudi Arabia
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2022年 / 133卷
关键词
Encoding; Forward index; Trapdoor; Fragments; Privacy preserving;
D O I
10.1016/j.future.2022.03.031
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Searchable symmetric encryption (SSE) is a technology that enables clients to outsource sensitive data in the cloud. The vast usage of cloud and rapid growth in file sharing over the cloud has forced researchers into devising newer searchable encryption (SE) systems that are more secure and robust. This paper explores the effects of leakage of access patterns to an adversary. It is observed that in most of the existing systems, a successful statistical attack can help the adversary learn the access pattern, provide him with the required document and reveal the underlying data. This paper addresses these issues by presenting a novel SE system which hides the search pattern and access pattern. In this paper, we propose a SSE system that uses forward index while lifting the one-time search limitation of the previous solutions. Our system uses a trapdoor obfuscation technique to deceive the 3rd party adversary who is considered as an active entity other than client and server, observing the information being exchanged during the active session of client and the cloud service provider. Compared with the existing techniques, this solution uses keyword analysis to extract limited words from the documents based on the frequency of occurrence. To provide stronger privacy, an encoding technique is used which aims to hide the access pattern from the adversary. In order to eliminate trapdoor linkability, a probabilistic trapdoor generation process is presented. The test results demonstrate that our system is suitable for practical usage with minimal overhead and is more efficient as compared to the state of the art. (c) 2022 Elsevier B.V. All rights reserved.
引用
收藏
页码:338 / 350
页数:13
相关论文
共 32 条
[1]  
[Anonymous], 2009, NATURAL LANGUAGE PRO
[2]  
Arampatzis A., WHAT IS SEARCHABLE S
[3]   Advantages and challenges of adopting cloud computing from an enterprise perspective [J].
Avram , Maricela-Georgiana .
7TH INTERNATIONAL CONFERENCE INTERDISCIPLINARITY IN ENGINEERING (INTER-ENG 2013), 2014, 12 :529-534
[4]  
Bellare M, 2007, LECT NOTES COMPUT SC, V4622, P535
[5]  
Bing Wang, 2015, 2015 IEEE Conference on Computer Communications (INFOCOM). Proceedings, P2092, DOI 10.1109/INFOCOM.2015.7218594
[6]   Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data [J].
Cao, Ning ;
Wang, Cong ;
Li, Ming ;
Ren, Kui ;
Lou, Wenjing .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (01) :222-233
[7]   Structured Encryption and Controlled Disclosure [J].
Chase, Melissa ;
Kamara, Seny .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2010, 2010, 6477 :577-594
[8]  
Chen GX, 2018, IEEE INFOCOM SER, P810, DOI 10.1109/INFOCOM.2018.8486381
[9]   Searchable symmetric encryption: Improved definitions and efficient constructions [J].
Curtmola, Reza ;
Garay, Juan ;
Kamara, Seny ;
Ostrovsky, Rafail .
JOURNAL OF COMPUTER SECURITY, 2011, 19 (05) :895-934
[10]  
Gez D., 2022, TOP 5 CYBER THREATS