Enabling Search Over Encrypted Cloud Data With Concealed Search Pattern

Jing Yao, Yifeng Zheng, Cong Wang*, Xiaolin Gui*

*Corresponding author for this work

Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

12 Citations (Scopus)
45 Downloads (CityUHK Scholars)

Abstract

Searchable symmetric encryption (SSE) is a widely popular cryptographic technique that supports the search functionality over encrypted data on the cloud. Despite the usefulness, however, most of existing SSE schemes leak the search pattern, from which an adversary is able to tell whether two queries are for the same keyword. In recent years, it has been shown that the search pattern leakage can be exploited to launch attacks to compromise the confidentiality of the client's queried keywords. In this paper, we present a new SSE scheme which enables the client to search encrypted cloud data without disclosing the search pattern. Our scheme uniquely bridges together the advanced cryptographic techniques of chameleon hashing and indistinguishability obfuscation. In our scheme, the secure search tokens for plaintext keywords are generated in a randomized manner, so it is infeasible to tell whether the underlying plaintext keywords are the same given two secure search tokens. In this way, our scheme well avoids using deterministic secure search tokens, which is the root cause of the search pattern leakage. We provide rigorous security proofs to justify the security strengths of our scheme. In addition, we also conduct extensive experiments to demonstrate the performance. Although our scheme for the time being is not immediately applicable due to the current inefficiency of indistinguishability obfuscation, we are aware that research endeavors on making indistinguishability obfuscation practical is actively ongoing and the practical efficiency improvement of indistinguishability obfuscation will directly lead to the applicability of our scheme. Our paper is a new attempt that pushes forward the research on SSE with concealed search pattern.
Original languageEnglish
Pages (from-to)11112-11122
JournalIEEE Access
Volume6
Online published28 Feb 2018
DOIs
Publication statusPublished - 2018

Research Keywords

  • chameleon hashing
  • cloud computing
  • indistinguishability obfuscation
  • search pattern leakage
  • Searchable symmetric encryption

Publisher's Copyright Statement

  • COPYRIGHT TERMS OF DEPOSITED FINAL PUBLISHED VERSION FILE: © 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

Fingerprint

Dive into the research topics of 'Enabling Search Over Encrypted Cloud Data With Concealed Search Pattern'. Together they form a unique fingerprint.

Cite this