Structured Encryption and Controlled Disclosure Melissa Chase Seny - - PowerPoint PPT Presentation

structured encryption and
SMART_READER_LITE
LIVE PREVIEW

Structured Encryption and Controlled Disclosure Melissa Chase Seny - - PowerPoint PPT Presentation

Structured Encryption and Controlled Disclosure Melissa Chase Seny Kamara Microsoft Research Cloud Storage Security for Cloud Storage o Main concern: will my data be safe? o it will be encrypted o it will be authenticated o it will be backed


slide-1
SLIDE 1

Structured Encryption and Controlled Disclosure

Melissa Chase Seny Kamara Microsoft Research

slide-2
SLIDE 2

Cloud Storage

slide-3
SLIDE 3
  • Main concern: will my data be safe?
  • it will be encrypted
  • it will be authenticated
  • it will be backed up
  • access will be controlled
  • Security only vs.
  • outsiders
  • other tenants
  • Q: can we provide security against the cloud operator?

Security for Cloud Storage

slide-4
SLIDE 4
  • How do we preserve confidentiality of data in the cloud?
  • Encryption!
  • What happens when I need to retrieve my data?
  • e.g., search over emails or pictures

Confidentiality in Cloud Storage

slide-5
SLIDE 5

Two Simple Solutions

?

Large comm. complexity

id2

Large local storage

Q: can we achieve O(1) storage at client and ``small” comm. complexity?

slide-6
SLIDE 6

Searchable Symmetric Encryption

[Song-Wagner-Perrig01]

tw

EncK EncK

slide-7
SLIDE 7
  • Two-party computation [Yao82]
  • O(|data|) OTs & poly(|data|) server computation
  • Oblivious RAMs [Goldreich-Ostrovsky96]
  • O(log n) rounds & polylog(n) server computation
  • Fully-homomorphic encryption [Gentry09]
  • 1 round & poly(|data|) server computation
  • Searchable encryption
  • [SWP01,Goh03,Chang-Mitzenmacher05,Boneh-diCrescenzo-Ostrovsky-

Persiano04,…]: 1 round & O(n) server computation

  • [Curtmola-Garay-K-Ostrovsky06]: 1 round & O(# of docs w/ word)

server computation

Related Work

slide-8
SLIDE 8
  • Private keyword search over encrypted text data
  • Q: can we privately query other types of encrypted data?
  • maps
  • image collections
  • social networks
  • web page archives

Limits of Searchable Encryption

slide-9
SLIDE 9
  • Communications
  • email headers, phone logs
  • Networks
  • Social networks
  • Web crawlers
  • Maps

Graph Data

slide-10
SLIDE 10

Structured Encryption

t

EncK EncK EncK

slide-11
SLIDE 11
  • Structured Encryption
  • Formal security definition
  • simulation-based
  • Constructions
  • Adjacency queries on encrypted graphs
  • Neighbor queries on encrypted graphs
  • Focused subgraph queries on encrypted web graphs
  • Controlled disclosure
  • Application to cloud-based data brokering

Our Results

slide-12
SLIDE 12

Structured Encryption

slide-13
SLIDE 13
  • Email archive = Index + Email text

Structured Data

slide-14
SLIDE 14
  • Social network = Graph + Profiles

Structured Data

slide-15
SLIDE 15
  • Gen(1𝑙) K
  • Enc𝐿 𝜀, 𝑛

(𝛿, 𝑑 )

  • Token𝐿(𝑟) 𝑢
  • Query(𝛿, 𝑢) 𝐽
  • Dec𝐿(𝑑𝑗) 𝑛𝑗

Structured Encryption

t

𝑑

𝛿

slide-16
SLIDE 16
  • Security against adaptive chosen query attacks
  • generalizes CKA2-security from [Curtmola-Garay-K-Ostrovsky06]
  • Simulation-based definition
  • ``given the ciphertext and the tokens no adversary can learn any

information about the data and the queries, even if the queries are made adaptively”

  • Too strong
  • e.g., SSE constructions leak some information
  • access pattern: pointers to documents that contain keyword
  • search pattern: whether two queries were for the same keyword

CQA2-Security

slide-17
SLIDE 17
  • Security is parameterized by 2 stateful leakage functions
  • Simulation-based definition
  • ``given the ciphertext and the tokens no adversary can learn any

information about the data and the queries other than what can be deduced from the L1 and L2 leakages…”

  • “…even if queries are made adaptively”

CQA2-Security

slide-18
SLIDE 18
  • 2 leakage functions
  • L1: leakage about data items
  • L2: leakage about data items and queries
  • Previous work on SSE -- except [Goldreich-Ostrovsky96]
  • L1: number of items and length of each item
  • L2: access pattern and search pattern
  • This work:
  • L1: number of items and length of each item
  • L2: intersection pattern and query pattern
  • intersection pattern ≪ access pattern

Leakage Functions

slide-19
SLIDE 19
  • Access pattern
  • Pointers to relevant data items (i.e., result of query)
  • Intersection pattern
  • Replace each pointer in access pattern with random value in [1,n]
  • Note:
  • access pattern could reveal information about query

Access vs. Intersection Patterns

slide-20
SLIDE 20

CQA2-Security

Real World Ideal World

EncK

q t

?$&$#&$#&$s!l)

t

L1

q L2 ,q

slide-21
SLIDE 21
  • Simulator “commits” to encryptions before queries are made
  • requires equivocation and some form of non-committing encryption
  • Lower bound on token length ≈ [Nielsen02]
  • Ω log 𝑜

𝜇

(w/o ROs)

  • n: # of data items
  • 𝜇: # of relevant items
  • All our constructions achieve lower bound

Adaptiveness

slide-22
SLIDE 22
  • Functional encryption
  • token can be used on multiple ciphertexts
  • Indistinguishability-based definitions
  • Simulation-based definitions are impossible (w/o ROs)
  • Currently can handle: inner products (i.e., polynomial predicates,

AND, OR, boolean DNF & CNF)

  • Structured encryption
  • token can be used on a single ciphertext
  • Simulation-based definition
  • Currently can handle: keyword search on text data; neighbor &

adjacency queries on graphs; focused subgraph queries on web graphs; …

  • vs. Functional Encryption

[Boneh-Sahai-Waters10]

slide-23
SLIDE 23

Constructions

slide-24
SLIDE 24
  • Adjacency queries on encrypted graphs
  • from lookup queries on encrypted matrices
  • Neighbor queries on encrypted graphs
  • from keyword search on encrypted text (i.e., SSE)
  • Focused subgraph queries on encrypted web graphs
  • from keyword search on encrypted text
  • from neighbor queries on encrypted graphs

Constructions

slide-25
SLIDE 25

Neighbor Queries on Graphs

t

EncK EncK EncK

slide-26
SLIDE 26
  • Building blocks
  • Dictionary (i.e., key-value store)
  • Pseudo-random function
  • Non-committing symmetric encryption
  • PRF + XOR ⟹ tokens are as long as query answer
  • RO + XOR ⟹ tokens are as long as security parameter

Neighbor Queries on Graphs

slide-27
SLIDE 27

Neighbor Queries on Graphs

t = FK(N1) & K

= 𝛿

EncK(N4, … ) N4, …

1 3 2 4

N1: N2, N3, N4

N4: N1, N3 FK(N1): EncK(N2, … )

FK(Nn): EncK(N1, … )

slide-28
SLIDE 28
  • Web graphs
  • Text data -- pages
  • Graph data --- hyperlinks
  • Simple queries on web graphs
  • All pages linked from P
  • All pages that link to P
  • Complex queries on web graphs
  • ``mix” both text and graph structure
  • search engine algorithms based on link-analysis
  • Kleinberg’s HITS [Kleinberg99]
  • SALSA [LM01]

FSQ on Web Graphs

slide-29
SLIDE 29
  • HITS algorithm
  • Step 1: compute focused subgraph
  • Step 2: run iterative algorithm on focused subgraph

Focused Subgraph Queries

Singapore

slide-30
SLIDE 30
  • Encrypt
  • pages with SE-KW
  • graph with SE-NQ
  • does not work!
  • Chaining technique
  • combine SE schemes (e.g., SE-KW with SE-NQ)
  • preserves token size of first SE scheme
  • Requires associative SE
  • message space: private data items and semi-private information
  • answer: pointers to data items + associated semi-private information
  • [Curtmola-Garay-K-Ostrovsky06]: associative SE-KW but not

CQA2-secure!

FSQ on Encrypted Graphs

slide-31
SLIDE 31
  • Gen(1𝑙) K
  • Enc𝐿 𝜀, 𝑛

(𝛿, 𝑑 )

  • Token𝐿(𝑟) 𝑢
  • Query(𝛿, 𝑢) 𝐽
  • Dec𝐿(𝑑𝑗) 𝑛𝑗

Associativity

slide-32
SLIDE 32
  • Gen(1𝑙) K
  • Enc𝐿 𝜀, 𝑛

, 𝑤 (𝛿, 𝑑 )

  • Token𝐿(𝑟) 𝑢
  • Query(𝛿, 𝑢) (𝐽, 𝑤𝑗: 𝑗 ∈ 𝐽 )
  • Dec𝐿(𝑑𝑗) 𝑛𝑗

Associativity

slide-33
SLIDE 33

FSQ on Web Graphs

t

EncK EncK EncK

slide-34
SLIDE 34

FSQ on Web Graphs

FSQK

tNQ tNQ tNQ tNQ

, tNQ , … , , tNQ NQK KWK

slide-35
SLIDE 35

FSQ on Web Graphs

3 1 2 4

KWK , tNQ , … , , tNQ NQK

tw

(4, tNQ) 1, 3

slide-36
SLIDE 36

Controlled Disclosure

slide-37
SLIDE 37
  • Structured encryption
  • Private queries on encrypted data
  • Q: what about computing on encrypted data?
  • Two-party computation
  • Fully-homomorphic encryption
  • 2PC & FHE don’t scale to massive datasets (e.g., Petabytes)
  • Do we give up security?

Limitations of Structured Encryption

slide-38
SLIDE 38
  • Compromise
  • reveal only what is necessary for the computation
  • Local algorithms
  • Don’t need to ``see” all their input
  • e.g., simulated annealing, hill climbing, genetic algorithms, graph

algorithms, link-analysis algorithms, …

Controlled Disclosure

Family Colleagues

slide-39
SLIDE 39

Controlled Disclosure

t q

EncK

f

slide-40
SLIDE 40
  • Microsoft Azure Marketplace
  • Infochimps

Cloud-based Data Brokerage

slide-41
SLIDE 41

Secure Data Brokerage

  • Producer
  • accurate count of

data usage

  • Collusions b/w
  • Cloud
  • Consumer

EncK t t q

slide-42
SLIDE 42

The End