Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1109/SP.2014.47guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Dynamic Searchable Encryption via Blind Storage

Published: 18 May 2014 Publication History
  • Get Citation Alerts
  • Abstract

    Dynamic Searchable Symmetric Encryption allows a client to store a dynamic collection of encrypted documents with a server, and later quickly carry out keyword searches on these encrypted documents, while revealing minimal information to the server. In this paper we present a new dynamic SSE scheme that is simpler and more efficient than existing schemes while revealing less information to the server than prior schemes, achieving fully adaptive security against honest-but-curious servers. We implemented a prototype of our scheme and demonstrated its efficiency on datasets from prior work. Apart from its concrete efficiency, our scheme is also simpler: in particular, it does not require the server to support any operation other than upload and download of data. Thus the server in our scheme can be based solely on a cloud storage service, rather than a cloud computation service as well, as in prior work. In building our dynamic SSE scheme, we introduce a new primitive called Blind Storage, which allows a client to store a set of files on a remote server in such a way that the server does not learn how many files are stored, or the lengths of the individual files, as each file is retrieved, the server learns about its existence (and can notice the same file being downloaded subsequently), but the file's name and contents are not revealed. This is a primitive with several applications other than SSE, and is of independent interest.

    Cited By

    View all
    • (2023)Longshot: Indexing Growing Databases Using MPC and Differential PrivacyProceedings of the VLDB Endowment10.14778/3594512.359452916:8(2005-2018)Online publication date: 1-Apr-2023
    • (2023)Private Web Search with TiptoeProceedings of the 29th Symposium on Operating Systems Principles10.1145/3600006.3613134(396-416)Online publication date: 23-Oct-2023
    • (2022)A Blockchain-Based Privacy Preservation Scheme in Mobile MedicalSecurity and Communication Networks10.1155/2022/98892632022Online publication date: 1-Jan-2022
    • Show More Cited By

    Index Terms

    1. Dynamic Searchable Encryption via Blind Storage
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image Guide Proceedings
        SP '14: Proceedings of the 2014 IEEE Symposium on Security and Privacy
        May 2014
        694 pages
        ISBN:9781479946860

        Publisher

        IEEE Computer Society

        United States

        Publication History

        Published: 18 May 2014

        Author Tag

        1. dynamic searchable encryption, secure cloud storage, cloud security

        Qualifiers

        • Article

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)0
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 27 Jul 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2023)Longshot: Indexing Growing Databases Using MPC and Differential PrivacyProceedings of the VLDB Endowment10.14778/3594512.359452916:8(2005-2018)Online publication date: 1-Apr-2023
        • (2023)Private Web Search with TiptoeProceedings of the 29th Symposium on Operating Systems Principles10.1145/3600006.3613134(396-416)Online publication date: 23-Oct-2023
        • (2022)A Blockchain-Based Privacy Preservation Scheme in Mobile MedicalSecurity and Communication Networks10.1155/2022/98892632022Online publication date: 1-Jan-2022
        • (2022)Practical Volume-Hiding Encrypted Multi-Maps with Optimal Overhead and BeyondProceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security10.1145/3548606.3559345(2825-2839)Online publication date: 7-Nov-2022
        • (2022)IncShrink: Architecting Efficient Outsourced Databases using Incremental MPC and Differential PrivacyProceedings of the 2022 International Conference on Management of Data10.1145/3514221.3526151(818-832)Online publication date: 10-Jun-2022
        • (2021)Efficient forward secure searchable encryption supporting multi-keyword queryThe 2nd International Conference on Computing and Data Science10.1145/3448734.3450464(1-9)Online publication date: 28-Jan-2021
        • (2021)DP-Sync: Hiding Update Patterns in Secure Outsourced Databases with Differential PrivacyProceedings of the 2021 International Conference on Management of Data10.1145/3448016.3457306(1892-1905)Online publication date: 9-Jun-2021
        • (2021)Don't fool yourself with Forward Privacy, Your queries STILL belong to us!Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy10.1145/3422337.3447838(131-142)Online publication date: 26-Apr-2021
        • (2020)Efficiency Enhancements for Practical Techniques for Searches on Encrypted DataProceedings of the 2020 4th International Conference on Cryptography, Security and Privacy10.1145/3377644.3377661(13-18)Online publication date: 10-Jan-2020
        • (2020)Index Obfuscation for Oblivious Document Retrieval in a Trusted Execution EnvironmentProceedings of the 29th ACM International Conference on Information & Knowledge Management10.1145/3340531.3412035(1345-1354)Online publication date: 19-Oct-2020
        • Show More Cited By

        View Options

        View options

        Get Access

        Login options

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media