Fast Searchable Encryption With Tunable Locality

被引:54
|
作者
Demertzis, Ioannis [1 ]
Papamanthou, Charalampos [1 ]
机构
[1] Univ Maryland, College Pk, MD 20742 USA
基金
美国国家科学基金会;
关键词
D O I
10.1145/3035918.3064057
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Searchable encryption (SE) allows a client to outsource a dataset to an untrusted server while enabling the server to answer keyword queries in a private manner. SE can be used as a building block to support more expressive private queries such as range/point and boolean queries, while providing formal security guarantees. To scale SE to big data using external memory, new schemes with small locality have been proposed, where locality is defined as the number of non-continuous reads that the server makes for each query. Previous space-efficient SE schemes achieve optimal locality by increasing the read-efficiency the number of additional memory locations (false positives) that the server reads per result item. This can hurt practical performance. In this work, we design, formally prove secure, and evaluate the first SE scheme with tunable locality and linear space. Our first scheme has optimal locality and outperforms existing approaches (that have a slightly different leakage profile) by up to 2.5 orders of magnitude in terms of read efficiency, for all practical database sizes. Another version of our construction with the same leakage as previous works can be tuned to have bounded locality, optimal read efficiency and up to 60x more efficient end-to-end search time. We demonstrate that our schemes work fast in in-memory as well, leading to search time savings of up to 1 order of magnitude when compared to the most practical in-memory SE schemes. Finally, our construction can be tuned to achieve trade-offs between space, read efficiency, locality, parallelism and communication overhead.
引用
收藏
页码:1053 / 1067
页数:15
相关论文
共 50 条
  • [41] Asymmetric Searchable Encryption from Inner Product Encryption
    Xiao, Siyu
    Ge, Aijun
    Zhang, Jie
    Ma, Chuangui
    Wang, Xu'an
    ADVANCES ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING, 2017, 1 : 123 - 132
  • [42] Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption
    Wang, Yunling
    Wang, Jianfeng
    Sun, Shi-Feng
    Liu, Joseph K.
    Susilo, Willy
    Chen, Xiaofeng
    PROVABLE SECURITY, PROVSEC 2017, 2017, 10592 : 24 - 38
  • [43] Multi-user Boolean searchable encryption supporting fast ranking in mobile clouds
    Chen, Zehong
    Zhang, Fangguo
    Zhang, Peng
    Zhao, Hanbang
    COMPUTER COMMUNICATIONS, 2020, 164 (164) : 100 - 113
  • [44] Fast Multi-User Searchable Encryption with Forward and Backward Private Access Control
    Bulbul, Salim Sabah
    Abduljabbar, Zaid Ameen
    Najem, Duaa Fadhel
    Nyangaresi, Vincent Omollo
    Ma, Junchao
    Aldarwish, Abdulla J. Y.
    JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2024, 13 (01)
  • [45] Searchable Symmetric Encryption: Designs and Challe
    Sen Poh, Geong
    Chin, Ji-Jian
    Yau, Wei-Chuen
    Choo, Kim-Kwang Raymond
    Mohamad, Moesfa Soeheila
    ACM COMPUTING SURVEYS, 2017, 50 (03)
  • [46] Decryptable searchable encryption with a designated tester
    Hu, Chengyu
    Liu, Pengtao
    CEIS 2011, 2011, 15
  • [47] Searchable Symmetric Encryption for Restricted Search
    Horvath, Mate
    Vajda, Istvan
    JOURNAL OF COMMUNICATIONS SOFTWARE AND SYSTEMS, 2018, 14 (01) : 104 - 111
  • [48] Research on Privacy Preserving of Searchable Encryption
    Feng, Tao
    He, Weiyou
    PROCEEDINGS OF THE 2018 2ND HIGH PERFORMANCE COMPUTING AND CLUSTER TECHNOLOGIES CONFERENCE (HPCCT 2018), 2018, : 58 - 68
  • [49] Flexible Wildcard Searchable Encryption System
    Yang, Yang
    Liu, Ximeng
    Deng, Robert H.
    Weng, Jian
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2020, 13 (03) : 464 - 477
  • [50] Passive Attacks Against Searchable Encryption
    Ning, Jianting
    Xu, Jia
    Liang, Kaitai
    Zhang, Fan
    Chang, Ee-Chien
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (03) : 789 - 802