Shared and searchable encrypted data for untrusted servers

被引:129
作者
Dong, Changyu [1 ]
Russello, Giovanni [2 ]
Dulay, Naranker [1 ]
机构
[1] Imperial Coll London, Dept Comp, London, England
[2] Create Net, Secur Area, Trento, Italy
基金
英国工程与自然科学研究理事会;
关键词
Searchable encryption; secure data outsourcing; proxy encryption;
D O I
10.3233/JCS-2010-0415
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Current security mechanisms are not suitable for organisations that outsource their data management to untrusted servers. Encrypting and decrypting sensitive data at the client side is the normal approach in this situation but has high communication and computation overheads if only a subset of the data is required, for example, selecting records in a database table based on a keyword search. New cryptographic schemes have been proposed that support encrypted queries over encrypted data. But they all depend on a single set of secret keys, which implies single user access or sharing keys among multiple users, with key revocation requiring costly data re-encryption. In this paper, we propose an encryption scheme where each authorised user in the system has his own keys to encrypt and decrypt data. The scheme supports keyword search which enables the server to return only the encrypted data that satisfies an encrypted query without decrypting it. We provide a concrete construction of the scheme and give formal proofs of its security. We also report on the results of our implementation.
引用
收藏
页码:367 / 397
页数:31
相关论文
共 25 条
[1]  
Agrawal R., 2004, P SIGMOID 04, P563, DOI DOI 10.1145/1007568.1007632
[2]  
Ateniese Giuseppe, 2005, NDSS
[3]  
Blackwood J., IS STORAGE OUTSOURCI
[4]  
Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122
[5]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[6]  
Boneh D, 2007, LECT NOTES COMPUT SC, V4622, P50
[7]  
Connor D., 2007, STORAGE OUTSOURCING
[8]  
Curtmola R., 2006, P 13 ACM C COMP COMM, DOI DOI 10.1145/1180405.1180417
[9]  
Damiani E, 2003, P 10 ACM C COMP COMM, P93
[10]  
Dong CY, 2008, LECT NOTES COMPUT SC, V5094, P127