Dynamic Searchable Encryption via Blind Storage

被引:200
作者
Naveed, Muhammad [1 ]
Prabhakaran, Manoj [1 ]
Gunter, Carl A. [1 ]
机构
[1] Univ Illinois, Champaign, IL 61820 USA
来源
2014 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2014) | 2014年
关键词
D O I
10.1109/SP.2014.47
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Dynamic Searchable Symmetric Encryption allows a client to store a dynamic collection of encrypted documents with a server, and later quickly carry out keyword searches on these encrypted documents, while revealing minimal information to the server. In this paper we present a new dynamic SSE scheme that is simpler and more efficient than existing schemes while revealing less information to the server than prior schemes, achieving fully adaptive security against honest-but-curious servers. We implemented a prototype of our scheme and demonstrated its efficiency on datasets from prior work. Apart from its concrete efficiency, our scheme is also simpler: in particular, it does not require the server to support any operation other than upload and download of data. Thus the server in our scheme can be based solely on a cloud storage service, rather than a cloud computation service as well, as in prior work. In building our dynamic SSE scheme, we introduce a new primitive called Blind Storage, which allows a client to store a set of files on a remote server in such a way that the server does not learn how many files are stored, or the lengths of the individual files; as each file is retrieved, the server learns about its existence (and can notice the same file being downloaded subsequently), but the file's name and contents are not revealed. This is a primitive with several applications other than SSE, and is of independent interest.
引用
收藏
页码:639 / 654
页数:16
相关论文
共 25 条
  • [1] Brudenall P., 2010, Financier Worldwide and Hunton Williams
  • [2] Canetti R., 2001, FOCS 2001
  • [3] Cash D., 2013, CRYPTO
  • [4] Cash D., 2014, Dynamic searchable encryption in very -large databases: Data structures and implementation
  • [5] Chang YC, 2005, LECT NOTES COMPUT SC, V3531, P442
  • [6] Structured Encryption and Controlled Disclosure
    Chase, Melissa
    Kamara, Seny
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2010, 2010, 6477 : 577 - 594
  • [7] Curtain RF, 2006, LECT NOTES CONTR INF, V329, P79, DOI 10.1007/11664550_5
  • [8] Searchable symmetric encryption: Improved definitions and efficient constructions
    Curtmola, Reza
    Garay, Juan
    Kamara, Seny
    Ostrovsky, Rafail
    [J]. JOURNAL OF COMPUTER SECURITY, 2011, 19 (05) : 895 - 934
  • [9] Goh E.-J., 2003, Rep. 2003/216
  • [10] Software protection and simulation on oblivious RAMs
    Goldreich, O
    Ostrovsky, R
    [J]. JOURNAL OF THE ACM, 1996, 43 (03) : 431 - 473