Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation

被引:285
作者
Cash, David [1 ]
Jaeger, Joseph [1 ]
Jarecki, Stanislaw [2 ]
Jutla, Charanjit [3 ]
Krawczyk, Hugo [3 ]
Rosu, Marcel-Catalin [3 ]
Steine, Michael [3 ]
机构
[1] Rutgers State Univ, Piscataway, NJ 08854 USA
[2] Univ Calif Irvine, Irvine, CA USA
[3] IBM Res, Armonk, NY USA
来源
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014) | 2014年
关键词
D O I
10.14722/ndss.2014.23264
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We design and implement dynamic symmetric searchable encryption schemes that efficiently and privately search server-held encrypted databases with tens of billions of record-keyword pairs. Our basic theoretical construction supports single-keyword searches and offers asymptotically optimal server index size, fully parallel searching, and minimal leakage. Our implementation effort brought to the fore several factors ignored by earlier coarse-grained theoretical performance analyses, including low-level space utilization, I/O parallelism and goodput. We accordingly introduce several optimizations to our theoretically optimal construction that model the prototype's characteristics designed to overcome these factors. All of our schemes and optimizations are proven secure and the information leaked to the untrusted server is precisely quantified. We evaluate the performance of our prototype using two very large datasets: a synthesized census database with 100 million records and hundreds of keywords per record and a multi-million webpage collection that includes Wikipedia as a subset. Moreover, we report on an implementation that uses the dynamic SSE schemes developed here as the basis for supporting recent SSE advances, including complex search queries (e.g., Boolean queries) and richer operational settings (e.g., query delegation), in the above terabyte-scale databases.
引用
收藏
页数:16
相关论文
共 21 条
[1]  
Bellare M., 1993, P 1 ACM C COMP COMM, P62
[2]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[3]  
Cash D, 2013, LECT NOTES COMPUT SC, V8042, P353, DOI 10.1007/978-3-642-40041-4_20
[4]  
Chang YC, 2005, LECT NOTES COMPUT SC, V3531, P442
[5]   Structured Encryption and Controlled Disclosure [J].
Chase, Melissa ;
Kamara, Seny .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2010, 2010, 6477 :577-594
[6]   Private information retrieval [J].
Chor, B ;
Goldreich, O ;
Kushilevitz, E ;
Sudan, M .
JOURNAL OF THE ACM, 1998, 45 (06) :965-982
[7]  
Curtmola Reza, 2006, P 13 ACM C COMP COMM, DOI DOI 10.1145/1180405.1180417
[8]  
Dietzfelbinger M., 2011, ABS11045111 ARXIV ABS11045111 ARXIV
[9]  
Goh E.-J., 2003, 2003216 EPRINT 2003216 EPRINT
[10]   Software protection and simulation on oblivious RAMs [J].
Goldreich, O ;
Ostrovsky, R .
JOURNAL OF THE ACM, 1996, 43 (03) :431-473