Computer Science ›› 2024, Vol. 51 ›› Issue (3): 340-350.doi: 10.11896/jsjkx.230100016

• Information Security • Previous Articles     Next Articles

Dynamic Searchable Symmetric Encryption Based on Protected Search Mode of Updatable Encryption

XU Chengzhi1, XU Lei2, XU Chungen2   

  1. 1 School of Computer Science and Technology,Nanjing University of Science and Technology,Nanjing 210094,China
    2 School of Mathematics and Statistics,Nanjing University of Science and Technology,Nanjing 210094,China
  • Received:2023-01-03 Revised:2023-05-23 Online:2024-03-15 Published:2024-03-13
  • About author:XU Chengzhi,born in 1998,postgra-duate,is a student member of CCF(No.96688G).His main research interests include cryptography and searchable encryption.XU Lei,born in 1990,Ph.D,associate professor,is a member of CCF(No.72575M).His main research interests include applied cryptography and information security.
  • Supported by:
    National Natural Science Foundation of China(62202228,62072240) and Natural Science Foundation of Jiangsu Province(BK20210330).

Abstract: Dynamic searchable symmetric encryption(DSSE) technology,as an extension of static searchable encryption,has attracted much attention because it solves the problem of secure retrieval over encrypted data and supports data dynamicity.For practicality concerns,most current DSSE schemes leak extra information(e.g.,search patterns and access patterns) to fast search.Recent studies show that this leaked information poses serious security problems,the adversary with background know-ledge of the database may exploit the leaked information to recover the query or reconstruct the database.Since this information reveals along with the query process,scholars propose to refresh the encrypted database after the query to reduce the above potential risks.However,this approach leads to huge client-side communication,storage,and computation overheads.Because the client needs to download the results locally,decrypt them,re-encrypt them and finally upload them to the cloud.To address this problem,this paper proposes a new updatable DSSE scheme that hides all the above information including access pattern,search pattern.The scheme can update data directly at the server side without disclosing data privacy,thus reducing the communication overhead of traditional update methods of the client side.The security analysis shows that this scheme can hide the search pattern effectively.In addition,the communication cost of the proposed scheme is also significantly degraded when compared with the traditional scheme that executes ciphertext refreshing by the client.For example,in the case of keywords matching 100 documents,compared with downloading to local re-encryption and retransmission,the communication overhead of this scheme is reduced by 70.92%.

Key words: Dynamic searchable encryption, Updatable encryption, Forward secure, Search pattern

CLC Number: 

  • TP309
[1]SONG D X,WAGNER D,PERRIG A.Practical techniques for searches on encrypted data[C]//Proceedings of IEEE Sympo-sium on Security and Privacy.California:IEEE Computer Society,2000:44-55.
[2]BONEH D,CRESCENZO G D,OSTROVSKY R,et al.Publickey encryption with keyword search[C]//Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques.Interlaken:Springer,2004:506-522.
[3]XU L,XU C G,YU X L.Secure and Efficient Data Retrieval Scheme Using Searchable Encryption in Cloud[J].Journal of Cryptologic Research.2016,3(4):330-339.
[4]KAMARA S,PAPAMANTHOU C.Parallel and dynamic sear-chable symmetric encryption[C]//Proceedings of International Conference on Financial Cryptography and Data Security.Okinawa:Springer,2013:258-274.
[5]CURTMOLA R,GARAY J,KAMARA S,et al.Searchablesymmetric encryption:improved definitions and efficient constructions[C]//Proceedings of ACM Conference on Computer and Communications Security.Alexandria:ACM,2006:79-88.
[6]ISLAM M S,KUZU M,KANTARCIOGLU M.Access pattern disclosure on searchable encryption:ramification,attack and mi-tigation[C]//Proceedings of Annual Network and Distributed System Security Symposium.San Diego:The Internet Society,2012.
[7]LIU C,ZHU L,WANG M,et al.Search pattern leakage insearchable encryption:Attacks and new construction[J].Information Sciences,2014,265:176-188.
[8]OYA S,KERSCHBAUM F.Hiding the access pattern is notenough:Exploiting search pattern leakage in searchable encryption[C]//Proceedings of USENIX Security Symposium.USENIX Association,2021:127-142.
[9]ZHANG Y,KATZ J,PAPAMANTHOU C.All your queries are belong to us:the power of File-Injection attacks on searchable encryption[C]//Proceedings of USENIX Security Symposium.Austin:USENIX Association,2016:707-720.
[10]BONEH D,LEWI K,MONTGOMERY H,et al.Key homomorphic PRFs and their applications[C]//Proceedings of Annual Cryptology Conference.Santa Barbara:Springer,2013:410-428.
[11]GOH E J.Secure indexes[J/OL].http://eprint.iacr.org/2003/216.
[12]STEFANOV E,PAPAMANTHOU C,SHI E.Practical dynamic searchable encryption with small leakage[C]//Proceedings of Annual Network and Distributed System Security Symposium.The Internet Society,2014:72-75.
[13]GOLDREICH O,OSTROVSKY R.Software protection andsimulation on oblivious RAMs[J].Journal of the ACM(JACM),1996,43(3):431-473.
[14]HE K,CHEN J,ZHOU Q,et al.Secure dynamic searchablesymmetric encryption with constant client storage cost[J].IEEE Transactions on Information Forensics and Security,2020,16:1538-1549.
[15]CHEN T,XU P,WANG W,et al.Bestie:Very practical sear-chable encryption with forward and backward security[C]//Proceedings of European Symposium on Research in Computer Security.Darmstadt:Springer,2021:3-23.
[16]BOST R,MINAUD B,OHRIMENKO O.Forward and back-ward private searchable encryption from constrained cryptographic primitives[C]//Proceedings of ACM SIGSAC Confe-rence on Computer and Communications Security.Dallas:ACM,2017:1465-1482.
[17]SUN S F,YUAN X,LIU J K,et al.Practical backward-secure searchable encryption from symmetric puncturable encryption[C]//Proceedings of ACM SIGSAC Conference on Computer and Communications Security.Toronto:ACM,2018:763-780.
[18]SUN S F,STEINFELD R,LAI S,et al.Practical Non-Interactive Searchable Encryption with Forward and Backward Privacy[C]//Proceedings of Annual Network and Distributed System Security Symposium.The Internet Society,2021.
[19]WANG Y L,CHEN X F.Research on Searchable Symmetric Encryption[J].Journal of Electronics & Information Technology,2020,42(10):2374-2385.
[20]LU B J,ZHOU J,CAO Z F.A multi-user forward secure dynamic symmetric searchable encryption with enhanced security [J].Journal of Computer Research and Development,2020,57(10):2104-2116.
[21]CASH D,JARECKI S,JUTLA C,et al.Highly-scalable sear-chable symmetric encryption with support for boolean queries[C]//Proceedings of Annual Cryptology Conference.Santa Barbara:Springer,2013:353-373.
[22]XU L,YUAN X L,ZHENG X Z,et al.Towards efficient cryptographic data validation service in edge computing[J].IEEE Transactions on Services Computing,2021,16(1):656-669.
[23]CASH D,GRUBBS P,PERRY J,et al.Leakage-abuse attacksagainst searchable encryption[C]//Proceedings of ACM SIGSAC Conference on Computer and Communications Security.Denver:ACM,2015:668-679.
[24]OYA S,KERSCHBAUM F.IHOP:Improved Statistical Query Recovery against Searchable Symmetric Encryption through Quadratic Optimization[C]//Proceedings of USENIX Security Symposium.Boston:USENIX Association,2022:2407-2424.
[25]DAMIE M,HAHN F,PETER A.A Highly Accurate Query-Recovery Attack againstSearchable Encryption using Non-Indexed Documents[C]//Proceedings of USENIX Security Symposium.USENIX Association,2021:143-160.
[26]XU L,DUAN H,ZHOU A,et al.Interpreting and mitigating leakage-abuse attacks in searchable symmetric encryption[J].IEEE Transactions on Information Forensics and Security,2021,16:5310-5325.
[27]CHEN G,LAI T H,REITER M K,et al.Differentially private access patterns for searchable symmetric encryption[C]//Proceedings of IEEE Conference on Computer Communications.Honolulu:IEEE,2018:810-818.
[28]KAMARA S,MOATAZ T.Computationally volume-hidingstructured encryption[C]//Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques.Darmstadt:Springer,2019:183-213.
[29]GRUBBS P,KHANDELWAL A,LACHARITÉ M S,et al.Pancake:Frequency smoothing for encrypted data stores[C]//Proceedings of USENIX Security Symposium.USENIX Association,2020:2451-2468.
[30]ZHAO Z T,XU Y,SONG X F,et al.A Multi-Pattern Hiding Dynamic Symmetric Searchable Encryption Based on Differential Privacy[J].Journal of Computer Research and Development,2021,58(10):2287-2300.
[31]ZHENG W,DAVE A,BEEKMAN J G,et al.Opaque:An obli-vious and encrypted distributed analytics platform[C]//Procee-dings of USENIX Symposium on Networked Systems Design and Implementation.Boston:USENIX Association,2017:283-298.
[32]EVERSPAUGH A,PATERSON K,RISTENPART T,et al.Key rotation for authenticated encryption[C]//Proceedings of Annual International Cryptology Conference.Santa Barbara:Springer,2017:98-129.
[33]LEHMANN A,TACKMANN B.Updatable encryption withpost-compromise security[C]//Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques.Tel Aviv:Springer,2018:685-716.
[34]KLOOß M,LEHMANN A,RUPP A.(R) CCA secure updatable encryption with integrity protection[C]//Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques.Darmstadt:Springer,2019:68-99.
[35]BOYD C,DAVIES G T,GJØSTEEN K,et al.Fast and secure updatable encryption[C]//Proceedings of Annual International Cryptology Conference.Santa Barbara:Springer,2020:464-493.
[36]SONG X F,DONG C,YUAN D,et al.Forward private searchable symmetric encryption with optimized I/O efficiency[J].IEEE Transactions on Dependable and Secure Computing,2018,17(5):912-927.
[1] PANG Yuxiang, CHEN Zemao. Security Scheme of UAV Flight Control Based on Attribute Access Control Policy [J]. Computer Science, 2024, 51(4): 366-372.
[2] WANG Degang, SUN Yi, GAO Qi. Active Membership Inference Attack Method Based on Multiple Redundant Neurons [J]. Computer Science, 2024, 51(4): 373-380.
[3] HE Jiaojun, CAI Manchun, LU Tianliang. Android Malware Detection Method Based on GCN and BiLSTM [J]. Computer Science, 2024, 51(4): 388-395.
[4] WANG Xin, HUANG Weikou, SUN Lingyun. Survey of Incentive Mechanism for Cross-silo Federated Learning [J]. Computer Science, 2024, 51(3): 20-29.
[5] CAI Mengnan, SHEN Guohua, HUANG Zhiqiu, YANG Yang. High-dimensional Data Publication Under Local Differential Privacy [J]. Computer Science, 2024, 51(2): 322-332.
[6] LIU Zechao, LIANG Tao, SUN Ruochen, HAO Zhiqiang, LI Jun. Research and Implementation of MQTT Security Mechanism Based on Domestic CryptographicAlgorithms [J]. Computer Science, 2024, 51(2): 333-342.
[7] XIE Qiong, WANG Weiqiong, XU Haojie. Secure Multiparty Computation of Set Intersection and Union [J]. Computer Science, 2024, 51(2): 371-377.
[8] MA Zongshuai, WU Zehui, YAN Chenyu, WEI Qiang. Survey of Vulnerability Benchmark Construction Technique [J]. Computer Science, 2024, 51(1): 316-326.
[9] WANG Zhousheng, YANG Geng, DAI Hua. Lightweight Differential Privacy Federated Learning Based on Gradient Dropout [J]. Computer Science, 2024, 51(1): 345-354.
[10] WANG Yi, HU Xuexian, WEI Jianghong. Two-factor Authentication Scheme for Blind Cloud Storage System Based on Password and SmartCard [J]. Computer Science, 2024, 51(1): 363-370.
[11] GUO Caicai, JIN Yu. CASESC:A Cloud Auditing Scheme Based on Ethereum Smart Contracts [J]. Computer Science, 2023, 50(12): 368-376.
[12] WU Tong, ZHOU Dawei, OU Qingyu, CHU Weiyu. Review of Relationship Between Side-channel Attacks and Fault Attacks [J]. Computer Science, 2023, 50(11A): 220700223-7.
[13] SUN Min, SHAN Tong, XU Senwei. Hybrid Encryption Algorithm Based on I-SM4 and SM2 [J]. Computer Science, 2023, 50(11A): 221100116-4.
[14] ZHANG Xuejun, YANG Yixing, LI Jiale, TIAN Feng, HUANG Haiyan, HUANG Shan. Dummy Location Generation Algorithm Against Side Information Inference Attack [J]. Computer Science, 2023, 50(11A): 221000036-9.
[15] WANG Zichen, YUAN Chengsheng, WANG Yili, GUO Ping, FU Zhangjie. Lightweight Group Key Agreement for Industrial Internet of Things [J]. Computer Science, 2023, 50(11A): 230700075-10.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!