4.5 Article

Privacy preserving search services against online attack

Journal

COMPUTERS & SECURITY
Volume 95, Issue -, Pages -

Publisher

ELSEVIER ADVANCED TECHNOLOGY
DOI: 10.1016/j.cose.2020.101836

Keywords

Keyword search; Encrypted data; Security; Online keyword guessing attack

Funding

  1. National Key R&D Program of China [2017YFB08020 0 0]
  2. National Natural Science Foundation of China [61772326, 61802242, 61802241, 61972094]
  3. Fundamental Research Funds for the Central Universities, CHD [300102240102]
  4. Natural Science Basic Research Plan in Shaanxi Province of China [2018JQ6088]
  5. National Cryptography Development Fund during the 13th Five-year Plan Period [MMJJ20180217]

Ask authors/readers for more resources

Searchable functionality is provided in many online services such as mail services or outsourced data storage. To protect users privacy, data in these services is usually stored after being encrypted using searchable encryption. This enables the data user to securely search encrypted data from a remote server without leaking data and query information. Public key encryption with keyword search is one of the research branches of searchable encryption; this provides privacy-preserving searchable functionality for applications such as encrypted email systems. However, it has an inherent vulnerability in that the information of a query may be leaked using a keyword guessing attack. Most of existing works aim to make the system resistant to offline keyword guessing, but this does not protect against online attacks on real world services. In this paper, we move a step forward to present a generic framework able to resist online keyword guessing attack using a server-assisted model. Specifically, we design a novel primitive C mirrored all-but-one lossy encryption, which can prevent a specific user from generating valid encryptions. This primitive can be seen as an access control on encryption ability. Combining searchable encryption technique with the new primitive makes online keyword guessing attack impossible for the specified user, even if the attack is launched online. We further give formal security analysis for the generic framework, and a concrete implementation with efficiency analysis to show that our design is practical. (C) 2020 Elsevier Ltd. All rights reserved.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available