img

Notice détaillée

Access Pattern Hiding in Searchable Encryption

Article Ecrit par: Kechid, Samir ; Nouali, Omar ; Adi, Kamel ; Boucenna, Fateh ;

Résumé: Cloud computing is a technology that provides users with a large storage space and an enormous computing power. For privacy purpose, the sensitive data should be encrypted before being outsourced to the cloud. To search over the outsourced data, searchable encryption (SE) schemes have been proposed in the literature. An SE scheme should perform searches over encrypted data without causing any sensitive information leakage. To this end, a few security constraints were elaborated to guarantee the security of the SE schemes, namely, the keyword privacy, the trapdoor unlinkability, and the access pattern. The latter is very hard to be respected and most approaches fail to guarantee the access pattern constraint when performing a search. This constraint consists in hiding from the server the search result returned to the user. The non respect of this constraint may cause sensitive information leakage as demonstrated in the literature. To fix this security lack, we propose a method that allows to securely request and receive the needed documents from the server after performing a search. The proposed method that we call the access pattern hiding (APH) technique allows to respect the access pattern constraint. An experimental study is conducted to validate the APH technique.


Langue: Anglais
Thème Informatique

Mots clés:
Privacy
encryption
cloud computing
Servers
Internet of Things (IoT)
data privacy
Search problems

Access Pattern Hiding in Searchable Encryption

Sommaire