计算机科学 ›› 2024, Vol. 51 ›› Issue (3): 340-350.doi: 10.11896/jsjkx.230100016

• 信息安全 • 上一篇    下一篇

基于可更新加密的保护搜索模式的动态可搜索加密方案

徐承志1, 徐磊2, 许春根2   

  1. 1 南京理工大学计算机科学与工程学院 南京210094
    2 南京理工大学数学与统计学院 南京210094
  • 收稿日期:2023-01-03 修回日期:2023-05-23 出版日期:2024-03-15 发布日期:2024-03-13
  • 通讯作者: 徐磊(leixu@njust.edu.cn)
  • 作者简介:(xcz@njust.edu.cn)
  • 基金资助:
    国家自然科学基金(62202228,62072240);江苏省自然科学基金(BK20210330)

Dynamic Searchable Symmetric Encryption Based on Protected Search Mode of Updatable Encryption

XU Chengzhi1, XU Lei2, XU Chungen2   

  1. 1 School of Computer Science and Technology,Nanjing University of Science and Technology,Nanjing 210094,China
    2 School of Mathematics and Statistics,Nanjing University of Science and Technology,Nanjing 210094,China
  • Received:2023-01-03 Revised:2023-05-23 Online:2024-03-15 Published:2024-03-13
  • About author:XU Chengzhi,born in 1998,postgra-duate,is a student member of CCF(No.96688G).His main research interests include cryptography and searchable encryption.XU Lei,born in 1990,Ph.D,associate professor,is a member of CCF(No.72575M).His main research interests include applied cryptography and information security.
  • Supported by:
    National Natural Science Foundation of China(62202228,62072240) and Natural Science Foundation of Jiangsu Province(BK20210330).

摘要: 动态可搜索对称加密(Dynamic Searchable Symmetric Encryption,DSSE)技术作为静态可搜索加密技术的拓展,因解决了数据密态场景下的安全检索问题并支持数据动态更新而备受关注。众所周知,目前大多数DSSE方案会泄露一些额外的信息以寻求更好的效率,如搜索模式与访问模式。最近的研究表明,这些泄露的信息面临着严重的安全问题,拥有数据库背景知识的敌手可能利用这些泄露信息恢复查询或重构数据库。由于这些泄露是伴随着查询的过程泄露出来的,因此不少学者提出在搜索时更新加密数据库来降低上述潜在的风险,即用户下载搜索到的密文数据到本地,解密后重新加密再上传到云服务器端。但这种方法会导致巨大的客户端通信、存储和计算开销。针对这一问题,提出了一种基于可更新加密的保护搜索模式的DSSE方案,该方案可以在不泄露数据隐私的情况下直接在服务器端进行数据更新,从而降低传统更新方法的通信开销以及客户端的计算开销。安全性分析表明,所提方案能有效保护搜索模式泄露;性能分析表明,所提方案相比传统利用更新密文方法保护搜索模式的方案能有效降低通信开销。在关键词匹配100个文档的情况下,与下载到本地重加密重传方式相比,所提方案的通信开销降低了70.92%。

关键词: 动态可搜索加密, 可更新加密, 前向安全, 搜索模式

Abstract: Dynamic searchable symmetric encryption(DSSE) technology,as an extension of static searchable encryption,has attracted much attention because it solves the problem of secure retrieval over encrypted data and supports data dynamicity.For practicality concerns,most current DSSE schemes leak extra information(e.g.,search patterns and access patterns) to fast search.Recent studies show that this leaked information poses serious security problems,the adversary with background know-ledge of the database may exploit the leaked information to recover the query or reconstruct the database.Since this information reveals along with the query process,scholars propose to refresh the encrypted database after the query to reduce the above potential risks.However,this approach leads to huge client-side communication,storage,and computation overheads.Because the client needs to download the results locally,decrypt them,re-encrypt them and finally upload them to the cloud.To address this problem,this paper proposes a new updatable DSSE scheme that hides all the above information including access pattern,search pattern.The scheme can update data directly at the server side without disclosing data privacy,thus reducing the communication overhead of traditional update methods of the client side.The security analysis shows that this scheme can hide the search pattern effectively.In addition,the communication cost of the proposed scheme is also significantly degraded when compared with the traditional scheme that executes ciphertext refreshing by the client.For example,in the case of keywords matching 100 documents,compared with downloading to local re-encryption and retransmission,the communication overhead of this scheme is reduced by 70.92%.

Key words: Dynamic searchable encryption, Updatable encryption, Forward secure, Search pattern

中图分类号: 

  • TP309
[1]SONG D X,WAGNER D,PERRIG A.Practical techniques for searches on encrypted data[C]//Proceedings of IEEE Sympo-sium on Security and Privacy.California:IEEE Computer Society,2000:44-55.
[2]BONEH D,CRESCENZO G D,OSTROVSKY R,et al.Publickey encryption with keyword search[C]//Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques.Interlaken:Springer,2004:506-522.
[3]XU L,XU C G,YU X L.Secure and Efficient Data Retrieval Scheme Using Searchable Encryption in Cloud[J].Journal of Cryptologic Research.2016,3(4):330-339.
[4]KAMARA S,PAPAMANTHOU C.Parallel and dynamic sear-chable symmetric encryption[C]//Proceedings of International Conference on Financial Cryptography and Data Security.Okinawa:Springer,2013:258-274.
[5]CURTMOLA R,GARAY J,KAMARA S,et al.Searchablesymmetric encryption:improved definitions and efficient constructions[C]//Proceedings of ACM Conference on Computer and Communications Security.Alexandria:ACM,2006:79-88.
[6]ISLAM M S,KUZU M,KANTARCIOGLU M.Access pattern disclosure on searchable encryption:ramification,attack and mi-tigation[C]//Proceedings of Annual Network and Distributed System Security Symposium.San Diego:The Internet Society,2012.
[7]LIU C,ZHU L,WANG M,et al.Search pattern leakage insearchable encryption:Attacks and new construction[J].Information Sciences,2014,265:176-188.
[8]OYA S,KERSCHBAUM F.Hiding the access pattern is notenough:Exploiting search pattern leakage in searchable encryption[C]//Proceedings of USENIX Security Symposium.USENIX Association,2021:127-142.
[9]ZHANG Y,KATZ J,PAPAMANTHOU C.All your queries are belong to us:the power of File-Injection attacks on searchable encryption[C]//Proceedings of USENIX Security Symposium.Austin:USENIX Association,2016:707-720.
[10]BONEH D,LEWI K,MONTGOMERY H,et al.Key homomorphic PRFs and their applications[C]//Proceedings of Annual Cryptology Conference.Santa Barbara:Springer,2013:410-428.
[11]GOH E J.Secure indexes[J/OL].http://eprint.iacr.org/2003/216.
[12]STEFANOV E,PAPAMANTHOU C,SHI E.Practical dynamic searchable encryption with small leakage[C]//Proceedings of Annual Network and Distributed System Security Symposium.The Internet Society,2014:72-75.
[13]GOLDREICH O,OSTROVSKY R.Software protection andsimulation on oblivious RAMs[J].Journal of the ACM(JACM),1996,43(3):431-473.
[14]HE K,CHEN J,ZHOU Q,et al.Secure dynamic searchablesymmetric encryption with constant client storage cost[J].IEEE Transactions on Information Forensics and Security,2020,16:1538-1549.
[15]CHEN T,XU P,WANG W,et al.Bestie:Very practical sear-chable encryption with forward and backward security[C]//Proceedings of European Symposium on Research in Computer Security.Darmstadt:Springer,2021:3-23.
[16]BOST R,MINAUD B,OHRIMENKO O.Forward and back-ward private searchable encryption from constrained cryptographic primitives[C]//Proceedings of ACM SIGSAC Confe-rence on Computer and Communications Security.Dallas:ACM,2017:1465-1482.
[17]SUN S F,YUAN X,LIU J K,et al.Practical backward-secure searchable encryption from symmetric puncturable encryption[C]//Proceedings of ACM SIGSAC Conference on Computer and Communications Security.Toronto:ACM,2018:763-780.
[18]SUN S F,STEINFELD R,LAI S,et al.Practical Non-Interactive Searchable Encryption with Forward and Backward Privacy[C]//Proceedings of Annual Network and Distributed System Security Symposium.The Internet Society,2021.
[19]WANG Y L,CHEN X F.Research on Searchable Symmetric Encryption[J].Journal of Electronics & Information Technology,2020,42(10):2374-2385.
[20]LU B J,ZHOU J,CAO Z F.A multi-user forward secure dynamic symmetric searchable encryption with enhanced security [J].Journal of Computer Research and Development,2020,57(10):2104-2116.
[21]CASH D,JARECKI S,JUTLA C,et al.Highly-scalable sear-chable symmetric encryption with support for boolean queries[C]//Proceedings of Annual Cryptology Conference.Santa Barbara:Springer,2013:353-373.
[22]XU L,YUAN X L,ZHENG X Z,et al.Towards efficient cryptographic data validation service in edge computing[J].IEEE Transactions on Services Computing,2021,16(1):656-669.
[23]CASH D,GRUBBS P,PERRY J,et al.Leakage-abuse attacksagainst searchable encryption[C]//Proceedings of ACM SIGSAC Conference on Computer and Communications Security.Denver:ACM,2015:668-679.
[24]OYA S,KERSCHBAUM F.IHOP:Improved Statistical Query Recovery against Searchable Symmetric Encryption through Quadratic Optimization[C]//Proceedings of USENIX Security Symposium.Boston:USENIX Association,2022:2407-2424.
[25]DAMIE M,HAHN F,PETER A.A Highly Accurate Query-Recovery Attack againstSearchable Encryption using Non-Indexed Documents[C]//Proceedings of USENIX Security Symposium.USENIX Association,2021:143-160.
[26]XU L,DUAN H,ZHOU A,et al.Interpreting and mitigating leakage-abuse attacks in searchable symmetric encryption[J].IEEE Transactions on Information Forensics and Security,2021,16:5310-5325.
[27]CHEN G,LAI T H,REITER M K,et al.Differentially private access patterns for searchable symmetric encryption[C]//Proceedings of IEEE Conference on Computer Communications.Honolulu:IEEE,2018:810-818.
[28]KAMARA S,MOATAZ T.Computationally volume-hidingstructured encryption[C]//Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques.Darmstadt:Springer,2019:183-213.
[29]GRUBBS P,KHANDELWAL A,LACHARITÉ M S,et al.Pancake:Frequency smoothing for encrypted data stores[C]//Proceedings of USENIX Security Symposium.USENIX Association,2020:2451-2468.
[30]ZHAO Z T,XU Y,SONG X F,et al.A Multi-Pattern Hiding Dynamic Symmetric Searchable Encryption Based on Differential Privacy[J].Journal of Computer Research and Development,2021,58(10):2287-2300.
[31]ZHENG W,DAVE A,BEEKMAN J G,et al.Opaque:An obli-vious and encrypted distributed analytics platform[C]//Procee-dings of USENIX Symposium on Networked Systems Design and Implementation.Boston:USENIX Association,2017:283-298.
[32]EVERSPAUGH A,PATERSON K,RISTENPART T,et al.Key rotation for authenticated encryption[C]//Proceedings of Annual International Cryptology Conference.Santa Barbara:Springer,2017:98-129.
[33]LEHMANN A,TACKMANN B.Updatable encryption withpost-compromise security[C]//Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques.Tel Aviv:Springer,2018:685-716.
[34]KLOOß M,LEHMANN A,RUPP A.(R) CCA secure updatable encryption with integrity protection[C]//Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques.Darmstadt:Springer,2019:68-99.
[35]BOYD C,DAVIES G T,GJØSTEEN K,et al.Fast and secure updatable encryption[C]//Proceedings of Annual International Cryptology Conference.Santa Barbara:Springer,2020:464-493.
[36]SONG X F,DONG C,YUAN D,et al.Forward private searchable symmetric encryption with optimized I/O efficiency[J].IEEE Transactions on Dependable and Secure Computing,2018,17(5):912-927.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!