Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1007/11496137_30guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Privacy preserving keyword searches on remote encrypted data

Published: 07 June 2005 Publication History

Abstract

We consider the following problem: a user $\mathcal{U}$ wants to store his files in an encrypted form on a remote file server $\mathcal{S}$. Later the user $\mathcal{U}$ wants to efficiently retrieve some of the encrypted files containing (or indexed by) specific keywords, keeping the keywords themselves secret and not jeopardizing the security of the remotely stored files. For example, a user may want to store old e-mail messages encrypted on a server managed by Yahoo or another large vendor, and later retrieve certain messages while travelling with a mobile device.
In this paper, we offer solutions for this problem under well-defined security requirements. Our schemes are efficient in the sense that no public-key cryptosystem is involved. Indeed, our approach is independent of the encryption method chosen for the remote files. They are also incremental, in that $\mathcal{U}$ can submit new files which are secure against previous queries but still searchable against future queries.

References

[1]
B. Bloom, "Space/time trade-offs in hash coding with allowable errors," in Communications of the ACM, Vol. 13(7), pp. 422-426, 1970.
[2]
M. Bellare, R. Canetti, and H. Krawczyk, "Keying hash functions for message authentication," in Proceedings of CRYPTO'96, Lecture Notes in Computer Science 1109, pp. 1-15.
[3]
D. Boneh, G. Crescenzo, R. Ostrovsky, and G. Persiano, "Public key encryption with keyword search," in Proceedings of Eurocrypt 2004, Lecture Notes in Computer Science 3027, pp. 506-522.
[4]
K. Bennett, C. Grothoff, T. Horozov, and I. Patrascu, "Efficient sharing of encrypted data," in Proceedings of ACISP 2002, Lecture Notes in Computer Science 2384, pp. 107-120.
[5]
O. Goldreich, Foundations of Cryptography: Basic Tools, Cambridge University Press, 2001.
[6]
E.-J. Goh, "Secure indexes," in Cryptology ePrint Archive: Report 2003/216 (http://eprint.iacr.org/2003/216/).
[7]
O. Goldreich and R. Ostrovsky, "Software protection and simulation on oblivious RAMs," in Journal of ACM, Vol. 43(3), pp. 431-473, 1996.
[8]
M. Luby and C. Rackoff, "How to construct pseudo-random permutations from pseudo-random functions (abstract)," in Proceedings of CRYPTO'85, Lecture Notes in Computer Science 218, pp. 447.
[9]
F. Mish (editor in chief), Merriam-Webster's Collegiate Dictionary, 11th edition, Merriam-Webster, Inc., 2003.
[10]
M. Naor and O. Reingold, "On the construction of pseudo-random permutations: Luby-Rackoff revisited (extended abstract)," in Proceedings of ACM STOC'97, pp. 189-199.
[11]
D. Song, D.Wagner, and A. Perrig, "Practical techniques for searches on encrypted data," in Proceedings of IEEE Symposium on Security and Privacy 2000, pp. 44-55.

Cited By

View all
  • (2025)MMKFB: multi-client and multi-keyword searchable symmetric encryption with forward and backward privacyFrontiers of Computer Science: Selected Publications from Chinese Universities10.1007/s11704-024-3390-z19:3Online publication date: 1-Mar-2025
  • (2024)Secure query processing for smart grid data using searchable symmetric encryptionThe Journal of Supercomputing10.1007/s11227-024-06326-z80:16(24173-24211)Online publication date: 1-Nov-2024
  • (2024)Post-quantum Multi-client Conjunctive Searchable Symmetric Encryption from IsogeniesSecurity, Privacy, and Applied Cryptography Engineering10.1007/978-3-031-80408-3_15(225-257)Online publication date: 13-Dec-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
ACNS'05: Proceedings of the Third international conference on Applied Cryptography and Network Security
June 2005
528 pages
ISBN:3540262237
  • Editors:
  • John Ioannidis,
  • Angelos Keromytis,
  • Moti Yung

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 07 June 2005

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 03 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2025)MMKFB: multi-client and multi-keyword searchable symmetric encryption with forward and backward privacyFrontiers of Computer Science: Selected Publications from Chinese Universities10.1007/s11704-024-3390-z19:3Online publication date: 1-Mar-2025
  • (2024)Secure query processing for smart grid data using searchable symmetric encryptionThe Journal of Supercomputing10.1007/s11227-024-06326-z80:16(24173-24211)Online publication date: 1-Nov-2024
  • (2024)Post-quantum Multi-client Conjunctive Searchable Symmetric Encryption from IsogeniesSecurity, Privacy, and Applied Cryptography Engineering10.1007/978-3-031-80408-3_15(225-257)Online publication date: 13-Dec-2024
  • (2024)Privacy Preserving Adjacency Query Supporting Homoionym Search over Medical Graph Data in Cloud ComputingCLOUD Computing – CLOUD 202410.1007/978-3-031-77153-8_5(46-55)Online publication date: 16-Nov-2024
  • (2024)Secure Similar Adjacent Vertex Query on Sparse Graph Data in Cloud EnvironmentEdge Computing – EDGE 202410.1007/978-3-031-77069-2_8(95-104)Online publication date: 16-Nov-2024
  • (2023)A Survey on Searchable Symmetric EncryptionACM Computing Surveys10.1145/361799156:5(1-42)Online publication date: 27-Nov-2023
  • (2023)Survey on Secure Keyword Search over Outsourced Data: From Cloud to Blockchain-assisted ArchitectureACM Computing Surveys10.1145/361782456:3(1-40)Online publication date: 5-Oct-2023
  • (2023)Too Close for Comfort? Measuring Success of Sampled-Data Leakage Attacks Against Encrypted SearchProceedings of the 2023 on Cloud Computing Security Workshop10.1145/3605763.3625243(3-15)Online publication date: 26-Nov-2023
  • (2023)Private Web Search with TiptoeProceedings of the 29th Symposium on Operating Systems Principles10.1145/3600006.3613134(396-416)Online publication date: 23-Oct-2023
  • (2023)Blockchain-based verifiable and dynamic multi-keyword ranked searchable encryption scheme in cloud computingJournal of Information Security and Applications10.1016/j.jisa.2022.10335371:COnline publication date: 8-Feb-2023
  • Show More Cited By

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media