Title :
Nothing is for Free: Security in Searching Shared and Encrypted Data
Author_Institution :
Appl. Security & Inf. Assurance Group, Univ. of Luxembourg, Luxembourg, Luxembourg
Abstract :
Most existing symmetric searchable encryption schemes aim at allowing a user to outsource her encrypted data to a cloud server and delegate the latter to search on her behalf. These schemes do not qualify as a secure and scalable solution for the multiparty setting, where users outsource their encrypted data to a cloud server and selectively authorize each other to search. Due to the possibility that the cloud server may collude with some malicious users, it is a challenge to have a secure and scalable multiparty searchable encryption (MPSE) scheme. This is shown by our analysis on the Popa-Zeldovich scheme, which says that an honest user may leak all her search patterns even if she shares only one of her documents with another malicious user. Based on our analysis, we present a new security model for MPSE by considering the worst case and average-case scenarios, which capture different server-user collusion possibilities. We then propose a MPSE scheme by employing the bilinear property of Type-3 pairings and prove its security based on the bilinear Diffie-Hellman variant and symmetric external Diffie-Hellman assumptions in the random oracle model.
Keywords :
cloud computing; cryptography; data privacy; information retrieval; network servers; MPSE scheme; Popa-Zeldovich scheme; Type-3 pairings; average-case scenarios; bilinear Diffie-Hellman variant; bilinear property; cloud server; encrypted data searching; malicious users; multiparty setting; random oracle model; scalable multiparty searchable encryption scheme; search patterns; server-user collusion possibilities; shared data searching; symmetric external Diffie-Hellman assumptions; symmetric searchable encryption schemes; Authorization; Data privacy; Encryption; Indexes; Servers; Multi-party searchable encryption (MPSE); data privacy; pairing; trapdoor privacy;
Journal_Title :
Information Forensics and Security, IEEE Transactions on
DOI :
10.1109/TIFS.2014.2359389