Storage Efficient Substring Searchable Symmetric Encryption
نویسندگان
چکیده
We address the problem of substring searchable encryption. A single user produces a big stream of data and later on wants to learn the positions in the string that some patterns occur. Although current techniques exploit auxiliary data structures to achieve efficient substring search on the server side, the cost at the user side may be prohibitive. We revisit the work of substring searchable encryption in order to reduce the storage cost of auxiliary data structures. Our solution entails suffix array which allows optimal storage cost O(n) with small hidden factor at the size of the string n. On top of that we build an encrypted index that allows the server to answer substring queries without learning neither the query nor the result. We identify the leakages of the scheme following the work of Curtmola et al. [12] and we analyze the security of the protocol in the real ideal framework. Moreover, we demonstrate the practicality of the protocol by searching a one million characters data stream in less than one second within the GPU computing paradigm. The total speedup approximates a factor of 4x, compared with naive CPU implementation.
منابع مشابه
Shen Substring - Searchable Symmetric Encryption
In this paper, we consider a setting where a client wants to outsource storage of a large amount of private data and then perform substring search queries on the data – given a data string s and a search string p, find all occurrences of p as a substring of s. First, we formalize an encryption paradigm that we call queryable encryption, which generalizes searchable symmetric encryption (SSE) an...
متن کاملEmily Shen Substring - Searchable Symmetric Encryption
In this paper, we consider a setting where aclient wants to outsource storage of a large amount ofprivate data and then perform substring search querieson the data – given a data string s and a search stringp, find all occurrences of p as a substring of s. First, weformalize an encryption paradigm that we call queryableencryption, which generalizes searchable symmetric e...
متن کاملSubstring-Searchable Symmetric Encryption
In this paper, we consider a setting where a client wants to outsource storage of a large amount of private data and then perform substring search queries on the data – given a data string s and a search string p, find all occurrences of p as a substring of s. First, we formalize an encryption paradigm that we call queryable encryption, which generalizes searchable symmetric encryption (SSE) an...
متن کاملand Emily Shen Substring - Searchable Symmetric Encryption
In this paper, we consider a setting where aclient wants to outsource storage of a large amount ofprivate data and then perform substring search querieson the data – given a data string s and a search stringp, find all occurrences of p as a substring of s. First, weformalize an encryption paradigm that we call queryableencryption, which generalizes searchable symmetric e...
متن کاملFuzzy retrieval of encrypted data by multi-purpose data-structures
The growing amount of information that has arisen from emerging technologies has caused organizations to face challenges in maintaining and managing their information. Expanding hardware, human resources, outsourcing data management, and maintenance an external organization in the form of cloud storage services, are two common approaches to overcome these challenges; The first approach costs of...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2017 شماره
صفحات -
تاریخ انتشار 2016