Dynamic Searchable Encryption in Very Large Databases: Data Structures and Implementation



Similar documents
An Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud

An Efficient Multi-Keyword Ranked Secure Search On Crypto Drive With Privacy Retaining

SECURITY FOR ENCRYPTED CLOUD DATA BY USING TOP-KEY TREE TECHNOLOGIES

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD

Secure cloud access system using JAR ABSTRACT:

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA

preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.

Verifiable Delegation of Computation over Large Datasets

SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS

Data Integrity Check using Hash Functions in Cloud environment

Side channels in cloud services, the case of deduplication in cloud storage

PRIVACY ASSURED IMAGE STACK MANAGEMENT SERVICE IN CLOUD

A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA

Information Security

How To Ensure Correctness Of Data In The Cloud

Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG

Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment

Advanced Authentication

Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing.

Secure Computation Martin Beck

Patient Controlled Encryption: Ensuring Privacy of Electronic Medical Records

SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING

Key Management Issues in the Cloud Infrastructure

Database Security. The Need for Database Security

Cloud Security Who do you trust?

3-6 Toward Realizing Privacy-Preserving IP-Traceback

A Comprehensive Data Forwarding Technique under Cloud with Dynamic Notification

Energy Efficiency in Secure and Dynamic Cloud Storage

An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud

New Constructions and Practical Applications for Private Stream Searching (Extended Abstract)

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

Secure Way of Storing Data in Cloud Using Third Party Auditor

Seclusion Search over Encrypted Data in Cloud Storage Services

A Performance Analysis of Distributed Indexing using Terrier

Privacy-preserving Ranked Multi-Keyword Search Leveraging Polynomial Function in Cloud Computing

Volume 3, Issue 2, February 2015 International Journal of Advance Research in Computer Science and Management Studies

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY

An Efficient and Secure Data Sharing Framework using Homomorphic Encryption in the Cloud

Flash Research Assignment: Virtualization and Cloud Computing

Study Plan for the Bachelor Degree in Computer Information Systems

How To Protect Your Data From Being Hacked On Security Cloud

Developing and Investigation of a New Technique Combining Message Authentication and Encryption

Privacy Preserving String Pattern Matching on Outsourced Data

SAP HANA In-Memory Database Sizing Guideline

Data Storage Security in Cloud Computing

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Computing on Encrypted Data

VoteID 2011 Internet Voting System with Cast as Intended Verification

TELE 301 Network Management. Lecture 18: Network Security

Query Services in Cost Efficient Cloud Using Query Analysis

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

Sample Electronic Discovery Request for Proposal

FPGAs for Trusted Cloud Computing

Discovery of Electronically Stored Information ECBA conference Tallinn October 2012

Improving data integrity on cloud storage services

Keywords: cloud computing, multiple keywords, service provider, search request, ranked search

Efficient Prevention of Credit Card Leakage from Enterprise Networks

Cryptography & Network Security. Introduction. Chester Rebeiro IIT Madras

CS377: Database Systems Data Security and Privacy. Li Xiong Department of Mathematics and Computer Science Emory University

Privacy preserving technique to secure cloud

RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM

Overview of Storage and Indexing. Data on External Storage. Alternative File Organizations. Chapter 8

Multi-User Searchable Encryption in the Cloud. Cédric Van Rompay, Refik Molva, and Melek Önen ISC 2015 September 10, 2015 Trondheim, Norway

Privacy and Verifiability for Data Storage in Cloud Computing. Melek Ӧnen August 17, 2015 IFIP Summer School, Edinburgh

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

ISSN Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability

Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds

VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui

Ranked Search over Encrypted Cloud Data using Multiple Keywords

IBM Software Information Management Creating an Integrated, Optimized, and Secure Enterprise Data Platform:

Lecture 1: Data Storage & Index

Cloud Security Who do you trust?

Data Integrity for Secure Dynamic Cloud Storage System Using TPA

An Oracle White Paper June High Performance Connectors for Load and Access of Data from Hadoop to Oracle Database

Development of Monitoring and Analysis Tools for the Huawei Cloud Storage

Storage in Database Systems. CMPSCI 445 Fall 2010

Parallel and Dynamic Searchable Symmetric Encryption

Privacy and Security in library RFID Issues, Practices and Architecture

Protegrity Tokenization

Security Aspects of. Database Outsourcing. Vahid Khodabakhshi Hadi Halvachi. Dec, 2012

Rfid Authentication Protocol for security and privacy Maintenance in Cloud Based Employee Management System

Facilitating Efficient Encrypted Document Storage and Retrieval in a Cloud Framework

Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm

A Survey of Different Encryption Techniques for Secure Cloud Storage

Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System

Secure Storage. Lost Laptops

Privacy, Security and Cloud

Information Security in Big Data using Encryption and Decryption

Transcription:

Dynamic Searchable Encryption in Very Large Databases: Data Structures and Implementation David Cash, Joseph Jaeger, Stanislaw Jarecki, Charanjit Jutla, Hugo Krawczyk, Marcel Roşu and Michael Steiner Rutgers University, U.C. Irvine, IBM Research 1

Searchable Symmetric Encryption (SSE) Definition Client encrypts its own data (with its own keys): DB EDB Outsources EDB to a cloud server, keeps a single cryptographic key K Later, using K only, performs keyword-based searches by sending the cloud encrypted queries, and receiving back the encrypted matching records Security goal: Cloud does not learn plaintext data or queries Some forms of statistical leakage allowed: data access patterns (e.g. repeated retrieval, size info), query patterns (e.g., repeated queries), etc. Plaintext data/queries never directly exposed, but statistical inference possible Security argued on the basis of formal leakage profiles and well defined adv s Application: outsourced private data repositories (email, file system, backup, database, ) 2

With SSE The cloud cannot disclose your data... not even at gun point! ENC owner (DB) 3

Practical Goals and Trade-offs Tens of Billions of distinct (keyword, recid) pairs DB: Relational tables or document collections EDB Workload dominated by searches Encrypted Search Performance should be comparable to Clear-Text Search DB->EDB (pre-processing) done periodically Moderate Hardware requirements (set by the funding entity) 4-12 CPU cores, ~100GB RAM, ~10TB additional storage Tradeoff: extensive pre-processing to speed-up encrypted searches Updates separated from the encrypted database Pre-process to integrate updates or to limit leakage 4

Prototype Aux. tables Client Pre-processing Application EDB Updates DB (cleartext data) Client Application Cloud Server Carefully designed to scale beyond RAM Big challenge: Security implies maximal randomization yet efficiency calls for maximal sequentialization in disk and DB access!! Code: 65+k lines of C, lex/yacc & Perl 5

Quantifying Leakage Static SSE Scheme for Single Keyword Search (SKS) Setup(DB): Encrypting clear-text data (pre-processing) Search(w): Querying encrypted data Static SSE Schemes: Π bas, Π pack, Π ptr, Π 2lev Leakage functions L bas, L pack, L ptr, L 2lev Each scheme Π is proven L-secure against adaptive attacks!! 6

Quantifying Leakage contd. Dynamic SSE Scheme for Single Keyword Search (SKS) Setup(DB): Encrypting clear-text data (pre-processing) Search(w): Querying encrypted data Update: Inserting, Deleting, Modifying records Dynamic schemes Π +, Π dyn and leakage functions L +, L dyn Each scheme Π is proven L-secure against adaptive attacks!! Integrated formal protocol and system design! Π pack and Π 2lev implemented and evaluated! 7

EDB Data Structures Aux. tables Clear-text Data Client Pre-processing Client Application EDB: Π bas, Π pack, Π ptr, Π 2lev Cloud Server Updates Big challenge: Security implies maximal randomization yet efficiency calls for maximal sequentialization in disk and DB access! Π pack [Crypto 2013] 100x larger datasets than previous work Π 2lev [NDSS 2014] another 100x over Π pack EDB as SKS dictionary: (Enc (w), EDB(w)) w, where EDB(w)={Enc K 1 K2 (Id) w record Id } 8

Complex Functional Settings Multi-Client SKS SSE: data owner shares its cloud data with friends EDB MC : (Enc K 1 (w), EDB MC(w)), where EDB MC (w) = {Enc K 2 (Id, RDK Id) w record Id } [CCS 2013] Multi-Client, Conjunctive Search (OXT) in SSE setting EDB OXT : (Enc K 1 (w), EDB OXT(w)), where EDB OXT (w) = {Enc (Id, RDK K 2 Id, xind, y ) w record Id }, xind and y are required for conjunctive queries [Crypto 2013] Outsourced Symmetric PIR: data owner authorizes clients to perform queries (policy) without learning the search terms she authorizes Data owner is malicious but she does not collude with Cloud server Data owner Cloud server separation crucial to avoid PIR cost. 9

Outsourced Symmetric PIR Setting A i r l i n e, Data owner ( blind authorization ) Data owner authorizes query according to policy without learning what the query is! Enc D (DB * ) e t c Cloud server query := zip=10598 & age=(22,50) & name=xxxx Client 5: decrypts matching records 10

OSPIR w/ Warrant-based Authorization Judge 2: K j Associated Press DB 3: Suspects (query) FBI 4: Warrant =f Kj (query) 7: Enc FBI (token) 8:Enc FBI (rec 1 ),, Enc FBI (rec n ) Enc AP (DB) s e r v e r 9: decrypts rec 1,, rec n 11

Faster Pre-Processing and Better Goodput Π pack : Bucket (Paged) Hash (PH) Π 2lev : Two Levels (2L) Low storage utilization (~60%) Cuckoo Hash fix (~90% util): sensitive to insertion history Low goodput Multi-modal keyword distribution Good storage utilization (92%) High goodput.

Pre-processing Scalability Π 2lev vs. Π pack on ClueWeb (OXT) Π 2lev on Census Data (SKS) RAM saturation in Π pack Linear growth in Π 2lev with lower slope ClueWeb: Subsets of ClueWeb09 data set, crawled web-pages including wikipedia. Census Data: Lincoln Lab's database.

SKS Query Scalability: Π 2lev vs. Π pack 13% of db faster in Π 2lev than 1% of db for Π pack!

Acknowledgements and Future Work Supported by the Intelligence Advanced Research Projects Activity (IARPA) under the Security and Privacy Assurance Research (SPAR) program In the News: President Obama announcing plans for moving Telephone Data away from NSA (speech Jan 17 th 2014) The review group recommended that our current approach be replaced by one in which the providers or a third party retain the bulk records, with government accessing information as needed. Both of these options pose difficult problems. [ ] During the review process, some suggested that we may also be able to preserve the capabilities we need through a combination of existing authorities, better information sharing, and recent technological advances. But more work needs to be done to determine exactly how this system might work. IARPA SPAR Program 15

Thanks! 16