Fast Searchable Encryption With Tunable Locality

被引:54
|
作者
Demertzis, Ioannis [1 ]
Papamanthou, Charalampos [1 ]
机构
[1] Univ Maryland, College Pk, MD 20742 USA
基金
美国国家科学基金会;
关键词
D O I
10.1145/3035918.3064057
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Searchable encryption (SE) allows a client to outsource a dataset to an untrusted server while enabling the server to answer keyword queries in a private manner. SE can be used as a building block to support more expressive private queries such as range/point and boolean queries, while providing formal security guarantees. To scale SE to big data using external memory, new schemes with small locality have been proposed, where locality is defined as the number of non-continuous reads that the server makes for each query. Previous space-efficient SE schemes achieve optimal locality by increasing the read-efficiency the number of additional memory locations (false positives) that the server reads per result item. This can hurt practical performance. In this work, we design, formally prove secure, and evaluate the first SE scheme with tunable locality and linear space. Our first scheme has optimal locality and outperforms existing approaches (that have a slightly different leakage profile) by up to 2.5 orders of magnitude in terms of read efficiency, for all practical database sizes. Another version of our construction with the same leakage as previous works can be tuned to have bounded locality, optimal read efficiency and up to 60x more efficient end-to-end search time. We demonstrate that our schemes work fast in in-memory as well, leading to search time savings of up to 1 order of magnitude when compared to the most practical in-memory SE schemes. Finally, our construction can be tuned to achieve trade-offs between space, read efficiency, locality, parallelism and communication overhead.
引用
收藏
页码:1053 / 1067
页数:15
相关论文
共 50 条
  • [31] Searchable encryption on the cloud: a survey
    Nitish Andola
    Raghav Gahlot
    Vijay Kumar Yadav
    S. Venkatesan
    Shekhar Verma
    The Journal of Supercomputing, 2022, 78 : 9952 - 9984
  • [32] Searchable Encryption Taxonomy: Survey
    Noorallahzadeh, M. H.
    Alimoradi, R.
    Gholami, A.
    JOURNAL OF APPLIED SECURITY RESEARCH, 2022, : 880 - 924
  • [33] Searchable Encryption through Dispersion
    Aiello Montandon, Carlos
    Vidal Introini, Luis
    Schwarz S. J., Thomas L. E.
    2014 IEEE CENTRAL AMERICA AND PANAMA CONVENTION (CONCAPAN XXXIV), 2014,
  • [34] Searchable encryption on the cloud: a survey
    Andola, Nitish
    Gahlot, Raghav
    Yadav, Vijay Kumar
    Venkatesan, S.
    Verma, Shekhar
    JOURNAL OF SUPERCOMPUTING, 2022, 78 (07): : 9952 - 9984
  • [35] Broadcast Searchable Keyword Encryption
    Ali, Mohamed Ali Hamza
    Zhong, Ting
    Li, Fagen
    Qin, Zhiguan
    Abdelrahaman, Ahmed A. A.
    2014 IEEE 17TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE), 2014, : 1010 - 1016
  • [36] Searchable Encryption in the Modern Era
    Curran, Kevin
    2017 INTERNATIONAL CONFERENCE ON CYBER SITUATIONAL AWARENESS, DATA ANALYTICS AND ASSESSMENT (CYBER SA), 2017,
  • [37] Verifiable dynamic searchable encryption
    Etemad, Mohammad
    Kupcu, Alptekin
    TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2019, 27 (04) : 2606 - 2623
  • [38] Garbled Searchable Symmetric Encryption
    Kurosawa, Kaoru
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014, 2014, 8437 : 234 - 251
  • [39] Unconditionally Secure Searchable Encryption
    Yoshizawa, Takahiro
    Watanabe, Yohei
    Shikata, Junji
    2017 51ST ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS), 2017,
  • [40] Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption
    Wang, Yunling
    Wang, Jianfeng
    Sun, Shi-Feng
    Liu, Joseph K.
    Susilo, Willy
    Baek, Joonsang
    You, Ilsun
    Chen, Xiaofeng
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2019, 25 (03) : 222 - 244