TY - GEN
T1 - Distributed searchable symmetric encryption
AU - Bösch, Christoph
AU - Peter, Andreas
AU - Leenders, Bram
AU - Lim, Hoon Wei
AU - Tang, Qiang
AU - Wang, Huaxiong
AU - Hartel, Pieter
AU - Jonker, Willem
PY - 2014
Y1 - 2014
N2 - Searchable Symmetric Encryption (SSE) allows a client to store encrypted data on a storage provider in such a way, that the client is able to search and retrieve the data selectively without the storage provider learning the contents of the data or the words being searched for. Practical SSE schemes usually leak (sensitive) information during or after a query (e.g., the search pattern). Secure schemes on the other hand are not practical, namely they are neither efficient in the computational search complexity, nor scalable with large data sets. To achieve efficiency and security at the same time, we introduce the concept of distributed SSE (DSSE), which uses a query proxy in addition to the storage provider. We give a construction that combines an inverted index approach (for efficiency) with scrambling functions used in private information retrieval (PIR) (for security). The proposed scheme, which is entirely based on XOR operations and pseudo-random functions, is efficient and does not leak the search pattern. For instance, a secure search in an index over one million documents and 500 keywords is executed in less than 1 second.
AB - Searchable Symmetric Encryption (SSE) allows a client to store encrypted data on a storage provider in such a way, that the client is able to search and retrieve the data selectively without the storage provider learning the contents of the data or the words being searched for. Practical SSE schemes usually leak (sensitive) information during or after a query (e.g., the search pattern). Secure schemes on the other hand are not practical, namely they are neither efficient in the computational search complexity, nor scalable with large data sets. To achieve efficiency and security at the same time, we introduce the concept of distributed SSE (DSSE), which uses a query proxy in addition to the storage provider. We give a construction that combines an inverted index approach (for efficiency) with scrambling functions used in private information retrieval (PIR) (for security). The proposed scheme, which is entirely based on XOR operations and pseudo-random functions, is efficient and does not leak the search pattern. For instance, a secure search in an index over one million documents and 500 keywords is executed in less than 1 second.
KW - Practical Efficiency
KW - Search Pattern Hiding
KW - Searchable Encryption
KW - Semi-Honest Model
UR - http://www.scopus.com/inward/record.url?scp=84910093538&partnerID=8YFLogxK
U2 - 10.1109/PST.2014.6890956
DO - 10.1109/PST.2014.6890956
M3 - Conference proceeding contribution
AN - SCOPUS:84910093538
T3 - Annual Conference on Privacy Security and Trust-PST
SP - 330
EP - 337
BT - 2014 Twelfth Annual Conference on Privacy, Security and Trust
A2 - Miri, Ali
A2 - Hengartner, Urs
A2 - Huang, Nen-Fu
A2 - Jøsang, Audun
A2 - Garcia-Alfaro, Joaquin
PB - Institute of Electrical and Electronics Engineers (IEEE)
CY - Piscataway, NJ
T2 - 2014 12th Annual Conference on Privacy, Security and Trust, PST 2014
Y2 - 23 July 2014 through 24 July 2014
ER -