Dynamic Searchable Encryption via Blind Storage

被引:205
作者
Naveed, Muhammad [1 ]
Prabhakaran, Manoj [1 ]
Gunter, Carl A. [1 ]
机构
[1] Univ Illinois, Champaign, IL 61820 USA
来源
2014 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2014) | 2014年
关键词
D O I
10.1109/SP.2014.47
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Dynamic Searchable Symmetric Encryption allows a client to store a dynamic collection of encrypted documents with a server, and later quickly carry out keyword searches on these encrypted documents, while revealing minimal information to the server. In this paper we present a new dynamic SSE scheme that is simpler and more efficient than existing schemes while revealing less information to the server than prior schemes, achieving fully adaptive security against honest-but-curious servers. We implemented a prototype of our scheme and demonstrated its efficiency on datasets from prior work. Apart from its concrete efficiency, our scheme is also simpler: in particular, it does not require the server to support any operation other than upload and download of data. Thus the server in our scheme can be based solely on a cloud storage service, rather than a cloud computation service as well, as in prior work. In building our dynamic SSE scheme, we introduce a new primitive called Blind Storage, which allows a client to store a set of files on a remote server in such a way that the server does not learn how many files are stored, or the lengths of the individual files; as each file is retrieved, the server learns about its existence (and can notice the same file being downloaded subsequently), but the file's name and contents are not revealed. This is a primitive with several applications other than SSE, and is of independent interest.
引用
收藏
页码:639 / 654
页数:16
相关论文
共 25 条
[1]  
Brudenall P., 2010, Financier Worldwide and Hunton Williams
[2]  
Canetti R., 2001, FOCS 2001
[3]  
Cash D., 2013, CRYPTO
[4]  
Cash D., 2014, Dynamic searchable encryption in very -large databases: Data structures and implementation
[5]  
Chang YC, 2005, LECT NOTES COMPUT SC, V3531, P442
[6]   Structured Encryption and Controlled Disclosure [J].
Chase, Melissa ;
Kamara, Seny .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2010, 2010, 6477 :577-594
[7]  
Curtain RF, 2006, LECT NOTES CONTR INF, V329, P79, DOI 10.1007/11664550_5
[8]   Searchable symmetric encryption: Improved definitions and efficient constructions [J].
Curtmola, Reza ;
Garay, Juan ;
Kamara, Seny ;
Ostrovsky, Rafail .
JOURNAL OF COMPUTER SECURITY, 2011, 19 (05) :895-934
[9]  
Goh E.-J., 2003, Rep. 2003/216
[10]   Software protection and simulation on oblivious RAMs [J].
Goldreich, O ;
Ostrovsky, R .
JOURNAL OF THE ACM, 1996, 43 (03) :431-473