A Security Proxy to Cloud Storage Backends based on an Efficient Wildcard Searchable Encryption

被引:0
作者
Chung, Shen-Ming [1 ]
Shieh, Ming-Der [1 ]
Chiueh, Tzi-Cker [2 ]
机构
[1] Natl Cheng Kung Univ, Dept Elect Engn, Tainan, Taiwan
[2] Ind Technol Res Inst, Informat & Commun Labs, Hsinchu, Taiwan
来源
2018 IEEE 8TH INTERNATIONAL SYMPOSIUM ON CLOUD AND SERVICE COMPUTING (SC2) | 2018年
关键词
cloud storage; security proxy; searchable encryption;
D O I
10.1109/SC2.2018.00026
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud storage backends such as Amazon S3 are a potential storage solution to enterprises. However, to couple enterprises with these backends, at least two problems must be solved: first, how to make these semi-trusted backends as secure as on-premises storage; and second, how to selectively retrieve files as easy as on-premises storage. A security proxy can address both the problems by building a local index from keywords in files before encrypting and uploading files to these backends. But, if the local index is built in plaintext, file content is still vulnerable to local malicious staff. Searchable Encryption (SE) can get rid of this vulnerability by making index into ciphertext; however, its known constructions often require modifications to index database, and, to support wildcard queries, they are not efficient at all In this paper, we present a security proxy that, based on our wildcard SE construction, can securely and efficiently couple enterprises with these backends. In particular, since our SE construction can work directly with existing database systems, it incurs only a little overhead, and when needed, permits the security proxy to run with constantly small storage footprint by readily out-sourcing all built indices to existing cloud databases.
引用
收藏
页码:127 / 130
页数:4
相关论文
共 12 条
[1]  
[Anonymous], P SDM 2011
[2]  
[Anonymous], IEEE T SERVICES COMP
[3]  
[Anonymous], IEEE 34 S REL DISTR
[4]  
[Anonymous], P ICNC 2017
[5]  
[Anonymous], SECURE INDEXES
[6]  
[Anonymous], 2006, CCS 06
[7]  
[Anonymous], P USENIX C FIL STOR
[8]  
Boneh D., A Graduate Course in Applied Cryptography
[9]  
Dongsheng Wang, 2015, 2015 IEEE Conference on Computer Communications (INFOCOM). Proceedings, P2101, DOI 10.1109/INFOCOM.2015.7218595
[10]  
Goldreich O., 2004, Basic Applications