Substring search over encrypted data

Tarik Moataz, I. Ray, I. Ray, Abdullatif Shikfa, F. Cuppens, N. Cuppens-Boulahia
{"title":"Substring search over encrypted data","authors":"Tarik Moataz, I. Ray, I. Ray, Abdullatif Shikfa, F. Cuppens, N. Cuppens-Boulahia","doi":"10.5339/QFARC.2018.ICTPP735","DOIUrl":null,"url":null,"abstract":"Our data, be it personal or professional, is increasingly outsourced. This results from the development of cloud computing in the past ten years, a paradigm that shifts computing to a utility. Even without realizing it, cloud computing has entered our lives inexorably: every owner of a smartphone, every user of a social network is using cloud computing, as most IT companies and tech giants in particular are using infrastructure as a service to offer services in the model of software as a service. These services (dropbox, google, facebook, twitter…) are simple to use, flexible…and free! Users just send their data and they get all services without paying. Actually, these companies are making most of their revenues by profiling the users thanks to the data that the users willingly provide. The data is the indirect payment to benefit from these services. This raises privacy concerns at the personal level, as well as confidentiality issues for sensitive documents in a professional environment. The classical way of dealing with confidentiality is to conceal the data through encryption. However, cloud providers need access to data in order to provide useful services, not only to profile users. Take a cloud email service as example, where the emails are stored and archived in the cloud and only downloaded to the user's phone or computer when the user wants to read them. If the emails are encrypted in the cloud, the cloud cannot access them and confidentiality is enforced. However, the cloud can also not provide any useful service to the user such as a search functionality over emails. To meet these conflicting requirements (hiding the data and accessing the data) a solution is to develop mechanisms that allow computation on encrypted data. While generic protocols for computation on encrypted data have been researched developed, such as Gentry's breakthrough fully homomorphic encryption, their performance remains unsatisfactory. On the contrary, tailoring solutions to specific needs result in more practical and efficient solution. In the case of searching over encrypted data, searchable encryptions algorithms have been developed for over decade and achieve now satisfactory performance (linear in the size of the dictionary). Most of the work in this field focus on single keyword search in the symmetric setting. To overcome this limitation, we first proposed a scheme based on letter orthogonalization that allows testing of string membership by performing efficient inner products (AsiaCCS 2013). Going further, we now propose a general solution to the problem of efficient substring search over encrypted data. The solution enhances existing “keyword” searchable encryption schemes by allowing searching for any part of encrypted keywords without requiring one to store all possible combinations of substrings from a given dictionary. The proposed technique is based on the previous idea of letter orthogonalization. We first propose SED-1, the base protocol for substring search. We then identify some attacks on SED-1 that demonstrate the complexity of the substring search problem under different threat scenarios. This leads us to propose our second and main protocol SED-2. The protocol is also efficient in that the search complexity is linear in the size of the keyword dictionary. We run several experiments on a sizeable real world dataset to evaluate the performance of our protocol. This final work has been accepted for publication in the IOS journal of computer security https://content.iospress.com/articles/journal-of-computer-security/jcs14652.","PeriodicalId":142580,"journal":{"name":"J. Comput. Secur.","volume":"119 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"J. Comput. Secur.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5339/QFARC.2018.ICTPP735","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 10

Abstract

Our data, be it personal or professional, is increasingly outsourced. This results from the development of cloud computing in the past ten years, a paradigm that shifts computing to a utility. Even without realizing it, cloud computing has entered our lives inexorably: every owner of a smartphone, every user of a social network is using cloud computing, as most IT companies and tech giants in particular are using infrastructure as a service to offer services in the model of software as a service. These services (dropbox, google, facebook, twitter…) are simple to use, flexible…and free! Users just send their data and they get all services without paying. Actually, these companies are making most of their revenues by profiling the users thanks to the data that the users willingly provide. The data is the indirect payment to benefit from these services. This raises privacy concerns at the personal level, as well as confidentiality issues for sensitive documents in a professional environment. The classical way of dealing with confidentiality is to conceal the data through encryption. However, cloud providers need access to data in order to provide useful services, not only to profile users. Take a cloud email service as example, where the emails are stored and archived in the cloud and only downloaded to the user's phone or computer when the user wants to read them. If the emails are encrypted in the cloud, the cloud cannot access them and confidentiality is enforced. However, the cloud can also not provide any useful service to the user such as a search functionality over emails. To meet these conflicting requirements (hiding the data and accessing the data) a solution is to develop mechanisms that allow computation on encrypted data. While generic protocols for computation on encrypted data have been researched developed, such as Gentry's breakthrough fully homomorphic encryption, their performance remains unsatisfactory. On the contrary, tailoring solutions to specific needs result in more practical and efficient solution. In the case of searching over encrypted data, searchable encryptions algorithms have been developed for over decade and achieve now satisfactory performance (linear in the size of the dictionary). Most of the work in this field focus on single keyword search in the symmetric setting. To overcome this limitation, we first proposed a scheme based on letter orthogonalization that allows testing of string membership by performing efficient inner products (AsiaCCS 2013). Going further, we now propose a general solution to the problem of efficient substring search over encrypted data. The solution enhances existing “keyword” searchable encryption schemes by allowing searching for any part of encrypted keywords without requiring one to store all possible combinations of substrings from a given dictionary. The proposed technique is based on the previous idea of letter orthogonalization. We first propose SED-1, the base protocol for substring search. We then identify some attacks on SED-1 that demonstrate the complexity of the substring search problem under different threat scenarios. This leads us to propose our second and main protocol SED-2. The protocol is also efficient in that the search complexity is linear in the size of the keyword dictionary. We run several experiments on a sizeable real world dataset to evaluate the performance of our protocol. This final work has been accepted for publication in the IOS journal of computer security https://content.iospress.com/articles/journal-of-computer-security/jcs14652.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
对加密数据进行子字符串搜索
我们的数据,无论是个人数据还是专业数据,都越来越多地被外包出去。这是过去十年中云计算发展的结果,这种范式将计算转变为实用程序。即使没有意识到,云计算已经无情地进入了我们的生活:每个智能手机的拥有者,每个社交网络的用户都在使用云计算,因为大多数it公司,尤其是科技巨头都在使用基础设施即服务,以软件即服务的模式提供服务。这些服务(dropbox, google, facebook, twitter…)使用简单,灵活,而且免费!用户只需发送数据,就可以免费获得所有服务。实际上,这些公司的大部分收入都是通过用户自愿提供的数据来分析用户的。数据是从这些服务中获益的间接支付。这引起了个人层面的隐私问题,以及专业环境中敏感文件的保密性问题。处理机密性的经典方法是通过加密来隐藏数据。然而,云提供商需要访问数据以提供有用的服务,而不仅仅是配置用户。以云电子邮件服务为例,电子邮件存储和存档在云中,只有当用户需要阅读时才下载到用户的手机或电脑上。如果电子邮件在云中加密,则云无法访问它们并强制执行机密性。然而,云也不能为用户提供任何有用的服务,比如电子邮件的搜索功能。为了满足这些相互冲突的需求(隐藏数据和访问数据),一种解决方案是开发允许对加密数据进行计算的机制。虽然已经研究开发了加密数据计算的通用协议,如Gentry的突破性全同态加密,但其性能仍然不尽人意。相反,根据特定需求定制解决方案会产生更实用和有效的解决方案。在搜索加密数据的情况下,可搜索的加密算法已经开发了十多年,并且现在实现了令人满意的性能(字典大小呈线性)。该领域的大部分工作集中在对称设置下的单个关键字搜索。为了克服这一限制,我们首先提出了一种基于字母正交的方案,该方案允许通过执行有效的内积来测试字符串成员(AsiaCCS 2013)。更进一步,我们现在提出一个通用的解决方案来解决在加密数据上高效搜索子字符串的问题。该解决方案增强了现有的“关键字”可搜索加密方案,允许搜索加密关键字的任何部分,而不需要存储给定字典中所有可能的子字符串组合。提出的技术是基于前面的字母正交的想法。我们首先提出了子串搜索的基本协议SED-1。然后,我们确定了一些针对SED-1的攻击,这些攻击展示了不同威胁场景下子字符串搜索问题的复杂性。这导致我们提出我们的第二个和主要协议SED-2。该协议的效率还在于,搜索复杂度与关键字字典的大小成线性关系。我们在一个相当大的真实世界数据集上运行了几个实验来评估我们协议的性能。这最后的工作已被接受发表在计算机安全的IOS杂志https://content.iospress.com/articles/journal-of-computer-security/jcs14652。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Data privacy in the Internet of Things based on anonymization: A review A mutation-based approach for the formal and automated analysis of security ceremonies StegEdge: Privacy protection of unknown sensitive attributes in edge intelligence via deception IsaNet: A framework for verifying secure data plane protocols A review on cloud security issues and solutions
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1