Fast Searchable Encryption With Tunable Locality

被引:54
|
作者
Demertzis, Ioannis [1 ]
Papamanthou, Charalampos [1 ]
机构
[1] Univ Maryland, College Pk, MD 20742 USA
基金
美国国家科学基金会;
关键词
D O I
10.1145/3035918.3064057
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Searchable encryption (SE) allows a client to outsource a dataset to an untrusted server while enabling the server to answer keyword queries in a private manner. SE can be used as a building block to support more expressive private queries such as range/point and boolean queries, while providing formal security guarantees. To scale SE to big data using external memory, new schemes with small locality have been proposed, where locality is defined as the number of non-continuous reads that the server makes for each query. Previous space-efficient SE schemes achieve optimal locality by increasing the read-efficiency the number of additional memory locations (false positives) that the server reads per result item. This can hurt practical performance. In this work, we design, formally prove secure, and evaluate the first SE scheme with tunable locality and linear space. Our first scheme has optimal locality and outperforms existing approaches (that have a slightly different leakage profile) by up to 2.5 orders of magnitude in terms of read efficiency, for all practical database sizes. Another version of our construction with the same leakage as previous works can be tuned to have bounded locality, optimal read efficiency and up to 60x more efficient end-to-end search time. We demonstrate that our schemes work fast in in-memory as well, leading to search time savings of up to 1 order of magnitude when compared to the most practical in-memory SE schemes. Finally, our construction can be tuned to achieve trade-offs between space, read efficiency, locality, parallelism and communication overhead.
引用
收藏
页码:1053 / 1067
页数:15
相关论文
共 50 条
  • [21] Cloud Architectures for Searchable Encryption
    Bloemer, Johannes
    Loeken, Nils
    13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,
  • [22] Lightweight Verification for Searchable Encryption
    Wang, Boyang
    Fan, Xinxin
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 932 - 937
  • [23] Research on Searchable Symmetric Encryption
    Wang Yunling
    Chen Xiaofeng
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2020, 42 (10) : 2374 - 2385
  • [24] Searchable Encryption in the Modern Era
    Curran, Kevin
    2017 INTERNATIONAL CONFERENCE ON CYBER SECURITY AND PROTECTION OF DIGITAL SERVICES (CYBER SECURITY), 2017,
  • [25] Searchable Encryption in Apache Cassandra
    Waage, Tim
    Jhajj, Ramaninder Singh
    Wiese, Lena
    FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2015), 2016, 9482 : 286 - 293
  • [26] Deterministic and efficiently searchable encryption
    Bellare, Mihir
    Boldyreva, Alexandra
    O'Neill, Adam
    ADVANCES IN CRYPTOLOGY - CRYPTO 2007, PROCEEDINGS, 2007, 4622 : 535 - +
  • [27] Searchable Encryption with Access Control
    Loeken, Nils
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,
  • [28] Rethinking Searchable Symmetric Encryption
    Gui, Zichen
    Paterson, Kenneth G.
    Patranabis, Sikhar
    2023 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP, 2023, : 1401 - 1418
  • [29] Deniable Searchable Symmetric Encryption
    Li, Huige
    Zhang, Fangguo
    Fan, Chun-I
    INFORMATION SCIENCES, 2017, 402 : 233 - 243
  • [30] Research on Asymmetric Searchable Encryption
    Yu, Zonghua
    Wu, Yudong
    MATERIALS SCIENCE, ENERGY TECHNOLOGY, AND POWER ENGINEERING I, 2017, 1839