New Constructions and Practical Applications for Private Stream Searching (Extended Abstract)



Similar documents
Survey on Efficient Information Retrieval for Ranked Query in Cost-Efficient Clouds

Query Services in Cost Efficient Cloud Using Query Analysis

Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG

Associate Prof. Dr. Victor Onomza Waziri

3-6 Toward Realizing Privacy-Preserving IP-Traceback

Feasibility Study of Searchable Image Encryption System of Streaming Service based on Cloud Computing Environment

Improving data integrity on cloud storage services

A COMPARATIVE STUDY OF SECURE SEARCH PROTOCOLS IN PAY- AS-YOU-GO CLOUDS

Private Searching On Streaming Data

Public Key Encryption that Allows PIR Queries

EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD

Peer-to-peer Cooperative Backup System

CRYPTOGRAPHIC SECURE CLOUD STORAGE MODEL WITH ANONYMOUS AUTHENTICATION AND AUTOMATIC FILE RECOVERY

Secure Data Transfer and Replication Mechanisms in Grid Environments p. 1

Fully homomorphic encryption equating to cloud security: An approach

preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.

Efficient Similarity Search over Encrypted Data

A Fully Homomorphic Encryption Implementation on Cloud Computing

Data Security in Cloud Using Elliptic Curve Crytography

Secure and Efficient Data Retrieval Process based on Hilbert Space Filling Curve

Data Integrity by Aes Algorithm ISSN

SubmitedBy: Name Reg No Address. Mirza Kashif Abrar T079 kasmir07 (at) student.hh.se

An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud

PSG College of Technology, Coimbatore Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS.

How To Create A Multi-Keyword Ranked Search Over Encrypted Cloud Data (Mrse)

A Secure RFID Ticket System For Public Transport

EXAMINING OF HEALTH SERVICES BY UTILIZATION OF MOBILE SYSTEMS. Dokuri Sravanthi 1, P.Rupa 2

Secure cloud access system using JAR ABSTRACT:

See Criminal Internet Communication as it Happens.

Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing.

Secure Way of Storing Data in Cloud Using Third Party Auditor

F-Secure Internet Security 2014 Data Transfer Declaration

A Time Efficient Algorithm for Web Log Analysis

Computer System Management: Hosting Servers, Miscellaneous

Cryptography & Network Security. Introduction. Chester Rebeiro IIT Madras

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY

Verifying Correctness of Trusted data in Clouds

Michael Seltzer COMP 116: Security Final Paper. Client Side Encryption in the Web Browser Mentor: Ming Chow

SECURITY FOR ENCRYPTED CLOUD DATA BY USING TOP-KEY TREE TECHNOLOGIES

Privacy and Security in Cloud Computing

DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION

Cloud Computing at Google. Architecture

What s New in Centrify DirectAudit 2.0

A Survey on Secure Auditing and Deduplicating Data in Cloud

Security of Cloud Storage: - Deduplication vs. Privacy

Homomorphic Encryption Method Applied to Cloud Computing

Distributing, Ensuring and Recovery of Data Stored in Cloud

Secure Computation Martin Beck

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA

Hypertable Architecture Overview

Electronic Mail Security. Security. is one of the most widely used and regarded network services currently message contents are not secure

Dynamic Searchable Encryption in Very Large Databases: Data Structures and Implementation

Technical Overview Simple, Scalable, Object Storage Software

A Comprehensive Data Forwarding Technique under Cloud with Dynamic Notification

Secure Data transfer in Cloud Storage Systems using Dynamic Tokens.

Computing on Encrypted Data

Data De-duplication Methodologies: Comparing ExaGrid s Byte-level Data De-duplication To Block Level Data De-duplication

Data Integrity for Secure Dynamic Cloud Storage System Using TPA

Privacy, Security and Cloud

Secure Network Communication Part II II Public Key Cryptography. Public Key Cryptography

Developing and Investigation of a New Technique Combining Message Authentication and Encryption

CS 3251: Computer Networking 1 Security Protocols I

Facebook: Cassandra. Smruti R. Sarangi. Department of Computer Science Indian Institute of Technology New Delhi, India. Overview Design Evaluation

3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol

Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment

Paillier Threshold Encryption Toolbox

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Tertiary Backup objective is automated offsite backup of critical data

Data Storage Security in Cloud Computing

RSA Attacks. By Abdulaziz Alrasheed and Fatima

Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm

Inside Dropbox: Understanding Personal Cloud Storage Services

ESPRESSO: An Encryption as a Service for Cloud Storage Systems

Cumulus: filesystem backup to the Cloud

Cryptographic Data Security over Cloud

Verifiable Delegation of Computation over Large Datasets

SECURE BACKUP SYSTEM DESKTOP AND MOBILE-PHONE SECURE BACKUP SYSTEM HOSTED ON A STORAGE CLOUD

Privacy Patterns in Public Clouds

PiCsMu: A Cloud Overlay to Store and Manage Data

Transcription:

New Constructions and Practical Applications for Private Stream Searching (Extended Abstract)???? John Bethencourt CMU Dawn Song CMU Brent Waters SRI 1

Searching for Information Too much on-line info to download WWW pages Message boards Web email, USENET I'm looking for... Search User specifies search criteria Textual keywords Server returns relevant content Here it is... 2

Motivation for Private Searches What if keywords are secret? Personal privacy (example query: lice removal ) Commercial interests ( takeover bid ) Intelligence gathering ( Al Qaeda ) They'll know what I'm looking for! We want private searches Client gives server encrypted query Server runs search algorithm, returns data Client recovers matching content Server does not know what client searched for 3

Practical Example: Google News Alerts Google News Google continuously crawls 4,500 news sources Estimated 135,000 news articles each day Alerts service User registers search keywords Matching articles emailed as they are discovered 4

Private Google News Alerts What about a private alerts service? User registers encrypted search keywords Periodically receives matching articles Google remains oblivious! Google doesn't know what I want, but they can still give it to me! Our techniques enable private alerts service Previous schemes not practical for this scenario Our results later in talk 5

Contributions New scheme for private stream searching Several novel constructions Reconstructing matching documents by solving linear systems Encrypted Bloom filters Practical analysis demonstrating feasibility Orders of magnitude more efficient than previous work [Ostrovsky-Skeith CRYPTO 2005] 6

Basic Architecture: Overview Foo Zim See See bar blip spot Oops spot who. fop. run. that The is. red run. fox. See rover, spot spot run.???? server client 7

Basic Architecture Step 1: Query Construction Client runs QueryConstruction algorithm to produce encrypted query Queries are disjunctions of textual keywords (simplest case) Variations and extensions possible Sends encrypted query to server rover, spot QueryConstruction raw keyword list encrypted query 8

Basic Architecture Step 2: Executing the Search Server gets encrypted query Server runs StreamSearch algorithm Processes documents to produce encrypted buffers Server remains unaware of search keywords documents (not encrypted) See spot run. encrypted query opaque, encrypted results StreamSearch? 9

Basic Architecture Step 3: Recovering the documents Client gets encrypted results Runs FileReconstruction algorithm Uses private key Recovers original matching documents client's private key encrypted results matching document? FileReconstruction See spot run. 10

Scheme Highlights: Homomorphic Encryption How is this accomplished? Scheme in full paper Just highlights, general flavor here Homomorphic encryption Paillier cryptosystem Public key system Additive homomorphism: E a E b = E a b Allows rudimentary computations on encrypted data Lets server meaningfully use encrypted query 11

Scheme Highlights: Encrypted Queries Queries are encrypted hash table Each cell is encryption of zero or one Probabilistic encryption Homomorphic encryption encrypted query h( rover ) E(1) rover, spot h( spot ) E(1) raw keyword list hash function 12

Scheme Highlights: Conducting the Search Server can then obtain encryption of number of keyword matches Used to bootstrap rest of algorithm See spot run. document encrypted query E(1) E(1) Document doesn't match: Get an encryption of 0. E(0 + 1 + 0) = E(c) Document matches: Get an encryption of the number matching keywords, c. 13

Scheme Highlights: Recovering the Documents Client decrypts returned data with private key Can construct linear system in the matching documents Special metadata returned from server Encrypted Bloom filter Solves linear system for documents System solveable if random 0,1 matrix is non-singular Almost always the case d 1 d 2 d 3 d 4 Singular with exponentially low probability with respect to size! [Komlós, Tao-Vu STOC 2005] random (0,1) matrix = 1 0 1 1 0 1 1 0 1 0 0 1 1 1 0 1 1 contents of decrypted buffer a 1 a 2 4 a 3 a 14

Communication Complexity Performance / robustness tradeoffs in size of queries and results New scheme O(n) in the size of the returned content for the bulk content of the matching files Some metadata is O(n log(t/n)) or O(n log n) Previous scheme O(n log n) for bulk content Much higher multiplicative constants 15

Practical Analysis: Private News Alerts Private news alerts scenario 135,000 news articles searched each day Retrieve results four times per day 5KB article size (text only, compressed) Up to 2000 matching articles per day Performance of our scheme Query size: 4-30MB Server processing time: 500ms per article Communication size: 500KB 7MB per time period Client reconstruction time: 0 15min 16

Communication Overhead: Our Scheme Low overhead Factor of 1.2 before inflation due to Paillier 2.4 after 17

Communication Overhead: Previous Scheme Previous scheme impractical Communication overhead: 40 times Reconstruction time: 4.7 hours 18

Conclusion Efficient system for private stream searching Low communication overhead Factor of 2.4 over actual matching documents Previous system up to factor of 40 Extensions also developed Arbitrary length documents More complex queries Other stuff For more info see full version of paper http://www.cs.cmu.edu/~bethenco/search.ps Includes details of actual scheme! Also security proofs, etc. 19