SAP-SSE: Protecting Search Patterns and Access Patterns in Searchable Symmetric Encryption

被引:28
作者
Song, Qiyang [1 ,2 ,3 ]
Liu, Zhuotao [1 ,2 ]
Cao, Jiahao [1 ,2 ]
Sun, Kun [3 ]
Li, Qi [1 ,2 ]
Wang, Cong [4 ]
机构
[1] Tsinghua Univ, Inst Network Sci & Cyberspace, Beijing 100084, Peoples R China
[2] Beijing Natl Res Ctr Informat Sci & Technol, Beijing 100084, Peoples R China
[3] George Mason Univ, Dept Informat Sci & Technol, Fairfax, VA 22030 USA
[4] City Univ Hong Kong, Dept Comp Sci, Hong Kong, Peoples R China
关键词
Indexes; Cryptography; Encryption; Databases; Cloud computing; Protocols; Transforms; Searchable symmetric encryption; access pattern leakage; search pattern leakage; ATTACKS; LEAKAGE;
D O I
10.1109/TIFS.2020.3042058
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Searchable symmetric encryption (SSE) enables users to search over encrypted documents in untrusted clouds without leaking the search keywords to the clouds. Existing SSE schemes achieve high search efficiency at the expense of leaking access patterns and search patterns, where clouds can recover a large percentage of queried keywords using the leaked access patterns and search patterns. To prevent clouds from recovering users' keywords, researchers have proposed a number of solutions to protect either search patterns or access patterns. However, none of them can protect both access patterns and search patterns. Moreover, existing SSE schemes cannot work in the generic database setting that allows multiple users to write or read over encrypted documents. In this paper, we propose an efficient searchable symmetric encryption scheme, called SAP-SSE, which protects both access patterns and search patterns in the generic database setting. The main idea of protecting search patterns is to leverage re-encryption cryptosystems to shuffle index entries over multiple clouds. To protect access patterns, we distribute secure indexes to multiple clouds and then propose an index redistribution protocol that allows users to renew index entries in clouds. Furthermore, SAP-SSE provides a configurable security policy to balance security and efficiency. Formal security analysis and experimental evaluation show that SAP-SSE can prevent pattern leakage with low overhead.
引用
收藏
页码:1795 / 1809
页数:15
相关论文
共 35 条
[1]  
[Anonymous], 2015, IACR Cryptol. ePrint Arch.
[2]  
Asghar M.R., 2013, P ACM WORKSHOP CLOUD, P77
[3]  
Bao F, 2008, LECT NOTES COMPUT SC, V4991, P71
[4]  
Ben-David A, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P257
[5]  
Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122
[6]  
Bösch C, 2014, ANN CONF PRIV SECUR, P330, DOI 10.1109/PST.2014.6890956
[7]   Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives [J].
Bost, Raphael ;
Minaud, Brice ;
Ohrimenko, Olga .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :1465-1482
[8]   Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation [J].
Cash, David ;
Jaeger, Joseph ;
Jarecki, Stanislaw ;
Jutla, Charanjit ;
Krawczyk, Hugo ;
Rosu, Marcel-Catalin ;
Steine, Michael .
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
[9]   Leakage-Abuse Attacks Against Searchable Encryption [J].
Cash, David ;
Grubbs, Paul ;
Perry, Jason ;
Ristenpart, Thomas .
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, :668-679
[10]  
Chen GX, 2018, IEEE INFOCOM SER, P810, DOI 10.1109/INFOCOM.2018.8486381