Multi-User Searchable Encryption in the Cloud. Cédric Van Rompay, Refik Molva, and Melek Önen ISC 2015 September 10, 2015 Trondheim, Norway



Similar documents
Privacy and Verifiability for Data Storage in Cloud Computing. Melek Ӧnen August 17, 2015 IFIP Summer School, Edinburgh

Privacy and Security in Cloud Computing

On the Limits of Anonymous Password Authentication

An Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud

AN EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA IN TEGRITY IN CLOUDS

An Efficient Multi-Keyword Ranked Secure Search On Crypto Drive With Privacy Retaining

Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment

Secure Data Management Scheme using One-Time Trapdoor on Cloud Storage Environment

Publicly Verifiable Conjunctive Keyword Search in Outsourced Databases

New Efficient Searchable Encryption Schemes from Bilinear Pairings

An Efficient and Secure Data Sharing Framework using Homomorphic Encryption in the Cloud

preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.

Dynamic Query Updation for User Authentication in cloud Environment

Patient Controlled Encryption: Ensuring Privacy of Electronic Medical Records

IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD

An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud

Verifiable Delegation of Computation over Large Datasets

Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm By Mihir Bellare and Chanathip Namprempre

EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE

DELEGATING LOG MANAGEMENT TO THE CLOUD USING SECURE LOGGING

Keywords: Authentication, Third party audit, cloud storage, cloud service provider, Access control.

A Proxy-Based Data Security Solution in Mobile Cloud

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD

Keywords: cloud computing, multiple keywords, service provider, search request, ranked search

Multi Layered Securing of Health Records using Public and Private Model in Cloud

Dynamic Searchable Encryption in Very Large Databases: Data Structures and Implementation

Efficient and Secure Dynamic Auditing Protocol for Integrity Verification In Cloud Storage

Improving data integrity on cloud storage services

A Road Map on Security Deliverables for Mobile Cloud Application

How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System

Comments on "public integrity auditing for dynamic data sharing with multi-user modification"

Seclusion Search over Encrypted Data in Cloud Storage Services

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction

RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM

50 ways to break RFID privacy

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY

SURVEY ON: CLOUD DATA RETRIEVAL FOR MULTIKEYWORD BASED ON DATA MINING TECHNOLOGY

SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTING SECURITY ENVIRONMENT

Query Services in Cost Efficient Cloud Using Query Analysis

Data management using Virtualization in Cloud Computing

IGI Portal architecture and interaction with a CA- online

Providing Access Permissions to Legitimate Users by Using Attribute Based Encryption Techniques In Cloud

Distributed Attribute Based Encryption for Patient Health Record Security under Clouds

A Secure Decentralized Access Control Scheme for Data stored in Clouds

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA

A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA

Cloud Data Storage Services Considering Public Audit for Security

Secrecy Maintaining Public Inspecting For Secure Cloud Storage

Identity-based Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud Applications and Sensor Networks

Secure and Efficient Data Retrieval Process based on Hilbert Space Filling Curve

DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION

A Practical Security Framework for Cloud Storage and Computation

KEY-POLICY ATTRIBUTE BASED ENCRYPTION TO SECURE DATA STORED IN CLOUD

Public Key Encryption with keyword Search

SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE

Identity-Based Encryption from the Weil Pairing


Secure Authentication of Distributed Networks by Single Sign-On Mechanism

Public Key Encryption with keyword Search

Side channels in cloud services, the case of deduplication in cloud storage

An Efficient Secure Multi Owner Data Sharing for Dynamic Groups in Cloud Computing

Searchable encryption

Security of Cloud Storage: - Deduplication vs. Privacy

Secure Data transfer in Cloud Storage Systems using Dynamic Tokens.

ISSN Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability

EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM

Implementation of Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage

ENABLING AUDITABILITY FOR SECURE CLOUD STORAGE USING TPA

Efficient Unlinkable Secret Handshakes for Anonymous Communications

RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES

Deployment Scenarios

Security Aspects of. Database Outsourcing. Vahid Khodabakhshi Hadi Halvachi. Dec, 2012

Maple: Scalable Multi-Dimensional Range Search over Encrypted Cloud Data with Tree-based Index

CryptoVerif Tutorial

A COMPARATIVE STUDY OF SECURE SEARCH PROTOCOLS IN PAY- AS-YOU-GO CLOUDS

Security/Privacy Models for "Internet of things": What should be studied from RFID schemes? Daisuke Moriyama and Shin ichiro Matsuo NICT, Japan

Public Auditing For Shared Data with Symposium on Security in the Cloud

A Survey on Optimistic Fair Digital Signature Exchange Protocols

A Survey on Cloud Computing Architectures for Healthcare

Provable-Security Analysis of Authenticated Encryption in Kerberos

Elements of Applied Cryptography. Key Distribution. Trusted third party: KDC, KTC Diffie-Helmann protocol The man-in-the-middle attack

Privacy Aspects in Big Data Integration: Challenges and Opportunities

Transcription:

Multi-User Searchable Encryption in the Cloud Cédric Van Rompay, Refik Molva, and Melek Önen ISC 2015 th September 10, 2015 Trondheim, Norway

Outline Searchable Encryption Multi-User Scenarios State of the Art Privacy Issue Challenge Solution Conclusion Cédric Van Rompay 2015-09-10 slide 2

Searchable Encryption Data upload Cédric Van Rompay 2015-09-10 slide 3

Searchable Encryption Data upload Honest-but-curious Cloud Cédric Van Rompay 2015-09-10 slide 4

Searchable Encryption Data upload Honest-but-curious Cloud Encryption for Privacy Cédric Van Rompay 2015-09-10 slide 5

Searchable Encryption Data upload Honest-but-curious Cloud Encryption for Privacy Remote word search queries Cédric Van Rompay 2015-09-10 slide 6

Multi-User Scenarios - PEKS Single Reader Multiple Writers Cédric Van Rompay 2015-09-10 slide 7

Multi-User Scenarios Delegated SE Multiple Readers Single Reader Cédric Van Rompay 2015-09-10 slide 8

Multi-User Scenarios MUSE Multiple Readers Multiple Writers + Search Scalability Cédric Van Rompay 2015-09-10 slide 9

State of the Art for MUSE [Bao2008], [Yang2011], [Popa2014] Scalability through query transformation Cédric Van Rompay 2015-09-10 slide 10

State of the Art for MUSE [Bao2008], [Yang2011], [Popa2014] Scalability through query transformation Data Privacy Cédric Van Rompay 2015-09-10 slide 11

State of the Art for MUSE [Bao2008], [Yang2011], [Popa2014] Scalability through query transformation Data Privacy Search Pattern Privacy (query indistinguishability) Cédric Van Rompay 2015-09-10 slide 12

State of the Art for MUSE [Bao2008], [Yang2011], [Popa2014] Scalability through query transformation Data Privacy Search Pattern Privacy (query indistinguishability) No Access Pattern Privacy (result privacy) Privacy Issue if collusions Cédric Van Rompay 2015-09-10 slide 13

Privacy Issue Cédric Van Rompay 2015-09-10 slide 14

Privacy Issue Access Pattern Similarities Cédric Van Rompay 2015-09-10 slide 15

Privacy Issue Access Pattern Similarities Collusion Data leakage Cédric Van Rompay 2015-09-10 slide 16

Privacy Issue Access Pattern Similarities Collusion Data leakage Privacy Breach: Data Privacy Broken Search Privacy Broken Cédric Van Rompay 2015-09-10 slide 17

Challenge Access Pattern Similarities Collusion Data leakage Privacy Breach: Data Privacy Broken Search Privacy Broken New Adversary Model Cédric Van Rompay 2015-09-10 slide 18

Idea of Solution Private Information Retrieval (PIR) for Privacy Cédric Van Rompay 2015-09-10 slide 19

Idea of Solution Private Information Retrieval (PIR) for Privacy Query Transformation through Proxy Proxy Cédric Van Rompay 2015-09-10 slide 20

Idea of Solution Private Information Retrieval (PIR) for Privacy Query Transformation through Proxy Proxy not Trusted Single Assumption: No collusion between Proxy and Cloud Cédric Van Rompay 2015-09-10 slide 21

Protocol Description Encrypted words upload Cédric Van Rompay 2015-09-10 slide 22

Protocol Description Encrypted words upload Authorization Cédric Van Rompay 2015-09-10 slide 23

Protocol Description Encrypted words upload Authorization Querying Cédric Van Rompay 2015-09-10 slide 24

Protocol Description Encrypted words upload Authorization Querying Query Transformation with bilinear pairings Cédric Van Rompay 2015-09-10 slide 25

Protocol Description Encrypted words upload Authorization Querying Query Transformation with bilinear pairings PIR Querying Cédric Van Rompay 2015-09-10 slide 26

Protocol Description Encrypted words upload Authorization Querying Query Transformation with bilinear pairings PIR Querying (Cheap) PIR Processing Cédric Van Rompay 2015-09-10 slide 27

Protocol Description Encrypted words upload Authorization Querying Query Transformation with bilinear pairings PIR Querying (Cheap) PIR Processing PIR Response Cédric Van Rompay 2015-09-10 slide 28

Achievements Scalable Search New Adv. Model Privacy in new model Access Pattern Privacy Safe against collusion Cédric Van Rompay 2015-09-10 slide 29

Conclusion Multi-User Searchable Encryption with: Extended Adversary Model: Collusions among Cloud (resp. Proxy) and any number of (non authorized) users. Privacy Properties: Data Privacy, Search Pattern Privacy, Access Pattern Privacy Proved external Diffie-Hellman (XDH), PIR Security (IND-CCA2), Random Oracle Model Cédric Van Rompay 2015-09-10 slide 30

Questions? Cédric Van Rompay 2015-09-10 slide 31

References [Bao2008] Bao, F., Deng, R.H., Ding, X., Yang, Y.: Private query on encrypted data in multi-user settings. In: Information Security Practice and Experience, pp. 71 85. Springer (2008) [Yang2011] Yang, Yanjiang, Haibing Lu, and Jian Weng. "Multi-user private keyword search for cloud computing." Cloud Computing Technology and Science (CloudCom), 2011 IEEE Third International Conference on. IEEE, 2011. [Popa2014] Popa, R.A., Zeldovich, N.: Multi-Key Searchable Encryption (2013), http://people.csail.mit.edu/nickolai/papers/popa-multikey-eprint.pdf Cédric Van Rompay 2015-09-10 slide 32

Privacy Definitions Games Cédric Van Rompay 2015-09-10 slide 33

Privacy Definitions Games Cédric Van Rompay 2015-09-10 slide 34

Transition Game 0 1 Cédric Van Rompay 2015-09-10 slide 35

Transition Game 2 3 Cédric Van Rompay 2015-09-10 slide 36