efficient dynamic searchable encryption
play

Efficient Dynamic Searchable Encryption with Forward Privacy - PowerPoint PPT Presentation

Efficient Dynamic Searchable Encryption with Forward Privacy Mohammad Alptekin Charalampos David Kp Etemad Papamanthou Evans Efficient Dynamic Searchable Encryption with Forward Privacy Etemad, Kp , Papamanthou, Evans, PETS


  1. Efficient Dynamic Searchable Encryption with Forward Privacy Mohammad Alptekin Charalampos David Küpçü Etemad Papamanthou Evans Efficient Dynamic Searchable Encryption with Forward Privacy – Etemad, Küpçü , Papamanthou, Evans, PETS 2018 1

  2. Problem Definition  Outsourced data should be encrypted for confidentiality.  The user want to perform search to access a particular data or selectively retrieve the outsourced files.  Search over the encrypted data? Efficient Dynamic Searchable Encryption with Forward Privacy – Etemad, Küpçü , Papamanthou, Evans, PETS 2018 4

  3. Trivial Secure but Inefficient Solution Efficient Dynamic Searchable Encryption with Forward Privacy – Etemad, Küpçü , Papamanthou, Evans, PETS 2018 7

  4. Trivial Secure but Inefficient Solution Encrypt Efficient Dynamic Searchable Encryption with Forward Privacy – Etemad, Küpçü , Papamanthou, Evans, PETS 2018 8

  5. Trivial Secure but Inefficient Solution Efficient Dynamic Searchable Encryption with Forward Privacy – Etemad, Küpçü , Papamanthou, Evans, PETS 2018 9

  6. Trivial Secure but Inefficient Solution Efficient Dynamic Searchable Encryption with Forward Privacy – Etemad, Küpçü , Papamanthou, Evans, PETS 2018 10

  7. Trivial Secure but Inefficient Solution Efficient Dynamic Searchable Encryption with Forward Privacy – Etemad, Küpçü , Papamanthou, Evans, PETS 2018 11

  8. Trivial Secure but Inefficient Solution Decrypt Efficient Dynamic Searchable Encryption with Forward Privacy – Etemad, Küpçü , Papamanthou, Evans, PETS 2018 12

  9. Trivial Secure but Inefficient Solution Decrypt Local Search Efficient Dynamic Searchable Encryption with Forward Privacy – Etemad, Küpçü , Papamanthou, Evans, PETS 2018 13

  10. Searchable Encryption  Index-based solutions Efficiency Security Efficient Dynamic Searchable Encryption with Forward Privacy – Etemad, Küpçü , Papamanthou, Evans, PETS 2018 15

  11. Searchable Encryption  Index-based solutions Efficiency  Files f = {f 1 , f 2 , …, f n } Security  Dictionary W = {w 1 , w 2 , …, w m } Efficient Dynamic Searchable Encryption with Forward Privacy – Etemad, Küpçü , Papamanthou, Evans, PETS 2018 16

  12. Searchable Encryption  Index-based solutions Efficiency  Files f = {f 1 , f 2 , …, f n } Security  Dictionary W = {w 1 , w 2 , …, w m }  For each keyword w i in dictionary W:  F w i = {identifiers of all files containing w i } Efficient Dynamic Searchable Encryption with Forward Privacy – Etemad, Küpçü , Papamanthou, Evans, PETS 2018 17

  13. Searchable Encryption  Index-based solutions Efficiency  Files f = {f 1 , f 2 , …, f n } Security  Dictionary W = {w 1 , w 2 , …, w m }  For each keyword w i in dictionary W:  F w i = {identifiers of all files containing w i }  Generate a key K w i = F(K, w i ) Pseudo Random Function  Encrypt F w i under K w i Efficient Dynamic Searchable Encryption with Forward Privacy – Etemad, Küpçü , Papamanthou, Evans, PETS 2018 18

  14. Searchable Encryption  Index-based solutions Efficiency  Files f = {f 1 , f 2 , …, f n } Security  Dictionary W = {w 1 , w 2 , …, w m }  For each keyword w i in dictionary W:  F w i = {identifiers of all files containing w i }  Generate a key K w i = F(K, w i ) Pseudo Random Function  Encrypt F w i under K w i  Store them at (random) locations in the index  Outsource the encrypted index together with the encrypted files Efficient Dynamic Searchable Encryption with Forward Privacy – Etemad, Küpçü , Papamanthou, Evans, PETS 2018 19

  15. Searchable Encryption Efficient Dynamic Searchable Encryption with Forward Privacy – Etemad, Küpçü , Papamanthou, Evans, PETS 2018 20

  16. Searchable Encryption PreComputation Efficient Dynamic Searchable Encryption with Forward Privacy – Etemad, Küpçü , Papamanthou, Evans, PETS 2018 21

  17. Searchable Encryption PreComputation Efficient Dynamic Searchable Encryption with Forward Privacy – Etemad, Küpçü , Papamanthou, Evans, PETS 2018 22

  18. Searchable Encryption PreComputation Efficient Dynamic Searchable Encryption with Forward Privacy – Etemad, Küpçü , Papamanthou, Evans, PETS 2018 23

  19. Searchable Encryption PreComputation Efficient Dynamic Searchable Encryption with Forward Privacy – Etemad, Küpçü , Papamanthou, Evans, PETS 2018 24

  20. Searchable Encryption Efficient Dynamic Searchable Encryption with Forward Privacy – Etemad, Küpçü , Papamanthou, Evans, PETS 2018 25

  21. Searchable Encryption Efficient Dynamic Searchable Encryption with Forward Privacy – Etemad, Küpçü , Papamanthou, Evans, PETS 2018 26

  22. Searchable Encryption Retrieve the files containing a keyword w i Efficient Dynamic Searchable Encryption with Forward Privacy – Etemad, Küpçü , Papamanthou, Evans, PETS 2018 27

  23. Searchable Encryption Retrieve the files containing a keyword w i w i Efficient Dynamic Searchable Encryption with Forward Privacy – Etemad, Küpçü , Papamanthou, Evans, PETS 2018 28

  24. Searchable Encryption Retrieve the files containing a keyword w i Efficient Dynamic Searchable Encryption with Forward Privacy – Etemad, Küpçü , Papamanthou, Evans, PETS 2018 29

  25. Searchable Encryption Retrieve the files containing a keyword w i Decrypt Efficient Dynamic Searchable Encryption with Forward Privacy – Etemad, Küpçü , Papamanthou, Evans, PETS 2018 30

  26. The Leakages  Search leakage  The set of encrypted files containing w i (Access pattern: f wi,t )  Needed for efficient response  Server does not know the keyword or the contents of files! Efficient Dynamic Searchable Encryption with Forward Privacy – Etemad, Küpçü , Papamanthou, Evans, PETS 2018 33

  27. The Leakages  Search leakage  The set of encrypted files containing w i (Access pattern: f wi,t )  Needed for efficient response  Server does not know the keyword or the contents of files!  How many times a keyword is searched for (Search pattern: SP )  The tokens are deterministic! Efficient Dynamic Searchable Encryption with Forward Privacy – Etemad, Küpçü , Papamanthou, Evans, PETS 2018 34

  28. The Leakages  File Insertion leakage (for dynamic schemes without forward privacy)  File identifier ( e j )  File size (| f j |) Efficient Dynamic Searchable Encryption with Forward Privacy – Etemad, Küpçü , Papamanthou, Evans, PETS 2018 35

  29. The Leakages  File Insertion leakage (for dynamic schemes without forward privacy)  File identifier ( e j )  File size (| f j |)  Number of keywords in the file and if any of them was previously queried  They are encrypted under a key that is already revealed to the server.  If all keywords of a new file have already been queried, the server knows all its (encrypted) keywords upon insertion! Efficient Dynamic Searchable Encryption with Forward Privacy – Etemad, Küpçü , Papamanthou, Evans, PETS 2018 36

  30. Exploiting Leakage  The leakages can be used to compromise confidentiality of the data and queries  Access pattern attacks [IKK12, NKW15, CGPR15]  Search pattern attacks [LZWT14]  File injection attacks [ZKP16] Efficient Dynamic Searchable Encryption with Forward Privacy – Etemad, Küpçü , Papamanthou, Evans, PETS 2018 37

  31. Exploiting Leakage  The leakages can be used to compromise confidentiality of the data and queries  Access pattern attacks [IKK12, NKW15, CGPR15]  Search pattern attacks [LZWT14]  File injection attacks [ZKP16]  Without forward privacy, the server can link a new file to the previously queried keywords upon insertion for free! Efficient Dynamic Searchable Encryption with Forward Privacy – Etemad, Küpçü , Papamanthou, Evans, PETS 2018 38

  32. Exploiting Leakage  The leakages can be used to compromise confidentiality of the data and queries  Access pattern attacks [IKK12, NKW15, CGPR15]  Search pattern attacks [LZWT14]  File injection attacks [ZKP16]  Without forward privacy, the server can link a new file to the previously queried keywords upon insertion for free!  Forward privacy prevents this leakage.  Makes adaptive injection attacks less effective [ZKP16]. Efficient Dynamic Searchable Encryption with Forward Privacy – Etemad, Küpçü , Papamanthou, Evans, PETS 2018 39

  33. Forward Privacy  With forward privacy, the insertion leakage is limited to:  File identifier  File size  Number of keywords in the file and if any of them was previously queried  The server cannot link the new file to the previous searches Efficient Dynamic Searchable Encryption with Forward Privacy – Etemad, Küpçü , Papamanthou, Evans, PETS 2018 40

  34. Our Scheme  Upon a search:  Client reveals the respective key to the server,  Server deletes all accessed index entries,  Client re-inserts them encrypted under a fresh key at new random locations in the index. Efficient Dynamic Searchable Encryption with Forward Privacy – Etemad, Küpçü , Papamanthou, Evans, PETS 2018 41

  35. Our Scheme  Upon a search:  Client reveals the respective key to the server,  Server deletes all accessed index entries,  Client re-inserts them encrypted under a fresh key at new random locations in the index.  Slides:  Honest-but-curious server  Small but non-constant client storage Efficient Dynamic Searchable Encryption with Forward Privacy – Etemad, Küpçü , Papamanthou, Evans, PETS 2018 42

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend