This paper presents the first searchable encryption scheme whose updates leak no more information than the access pattern, that still has asymptotically optimal search time, linear, very small and asymptonically optimal index size and can be implemented without storage on the client (except the key).
Abstract:
Searchable (symmetric) encryption allows encryption while still enabling search for keywords. Its immediate application is cloud storage where a client outsources its files while the (cloud) service provider should search and selectively retrieve those. Searchable encryption is an active area of research and a number of schemes with different efficiency and security characteristics have been proposed in the literature. Any scheme for practical adoption should be efficient -- i.e. have sub-linear search time --, dynamic -- i.e. allow updates -- and semantically secure to the most possible extent. Unfortunately, efficient, dynamic searchable encryption schemes suffer from various drawbacks. Either they deteriorate from semantic security to the security of deterministic encryption under updates, they require to store information on the client and for deleted files and keywords or they have very large index sizes. All of this is a problem, since we can expect the majority of data to be later added or changed. Since these schemes are also less efficient than deterministic encryption, they are currently an unfavorable choice for encryption in the cloud. In this paper we present the first searchable encryption scheme whose updates leak no more information than the access pattern, that still has asymptotically optimal search time, linear, very small and asymptotically optimal index size and can be implemented without storage on the client (except the key). Our construction is based on the novel idea of learning the index for efficient access from the access pattern itself. Furthermore, we implement our system and show that it is highly efficient for cloud storage.
TL;DR: The architecture and features of fog computing are reviewed and critical roles of fog nodes are studied, including real-time services, transient storage, data dissemination and decentralized computation, which are expected to draw more attention and efforts into this new architecture.
TL;DR: A blockchain based searchable encryption scheme for EHRs is proposed that ensures the integrity, anti-tampering, and traceability of EHR’s’ index as only the index is migrated to the blockchain to facilitate propagation.
TL;DR: This paper introduces a new form of symmetric encryption, named symmetric puncturable encryption (SPE), and construct a generic primitive from simple cryptographic tools, and presents a backward-secure SSE scheme that can revoke a server's searching ability on deleted data.
TL;DR: This paper utilizes the secure k-Nearest Neighbor (kNN) and Attribute-Based Encryption (ABE) techniques to construct a dynamic searchable symmetric encryption scheme, which can achieve forward privacy and backward privacy simultaneously.
TL;DR: This paper designs and implements a forward secure DSSE scheme with optimal search and update complexity, and proposes a new, simple, theoretical data structure, called dual dictionary, which allows to delete data explicitly and in real time, which greatly improves efficiency compared to previous works.
TL;DR: This work describes the cryptographic schemes for the problem of searching on encrypted data and provides proofs of security for the resulting crypto systems, and presents simple, fast, and practical algorithms that are practical to use today.
TL;DR: This work defines and construct a mechanism that enables Alice to provide a key to the gateway that enables the gateway to test whether the word “urgent” is a keyword in the email without learning anything else about the email.
TL;DR: This work describes schemes that enable a user to access k replicated copies of a database and privately retrieve information stored in the database, so that each individual server gets no information on the identity of the item retrieved by the user.
TL;DR: This paper shows how to do an on-line simulation of an arbitrary RAM by a probabilistic oblivious RAM with a polylogaithmic slowdown in the running time, and shows that a logarithmic slowdown is a lower bound.
TL;DR: Schemes that enable a user to access k replicated copies of a database and privately retrieve information stored in the database and get no information on the identity of the item retrieved by the user are described.
Q1. What are the contributions mentioned in the paper "Searchable encryption with secure and efficient updates" ?
Its immediate application is cloud storage where a client outsources its files while the ( cloud ) service provider should search and selectively retrieve those. In this paper the authors present the first searchable encryption scheme whose updates leak no more information than the access pattern, that still has asymptotically optimal search time, linear, very small and asymptotically optimal index size and can be implemented without storage on the client ( except the key ). Furthermore, the authors implement their system and show that it is highly efficient for cloud storage. All of this is a problem, since the authors can expect the majority of data to be later added or changed.
Q2. What is the important reason why searchable encryption is useful?
Deterministic encryption is useful for searching in outsourced databases, since it does not require to modify the database engine for queries or updates [16, 17].
Q3. What is the problem the authors consider in this paper?
The problem the authors consider in this paper is whether the authors can update an outsourced storage without leaking anything except the access pattern and with minimal storage overhead.
Q4. What is the function that can be used to encrypt the pointer?
The service provider can then insert the new ciphertext at the beginning of the list and encrypt the pointer using the token key.
Q5. What is the key holder's ability to identify a ciphertext?
The storage service provider can identify all ciphertexts for a keyword using this search token and the ciphertext(s) in the search operation.
Q6. What is the first scheme with asymptotically optimal search time?
The scheme proposed in this paper is the first with asymptotically optimal search time, asymptotically optimal storage cost and no leakage on updates.
Q7. What effect does the inverted index have on the search history?
On the other hand, this results in decreasing search time, because already searched tokens can be looked up in this inverted index.