[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3243734.3278509acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
poster

Hardware Acceleration of Searchable Encryption

Published: 15 October 2018 Publication History

Abstract

Searchable symmetric encryption (SSE) allows a client to outsource the storage of her data to an (untrusted) server in a private manner, while maintaining the ability to selectively search over it. A key feature of all existing SSE schemes is the tradeoff between security (in terms of the information leakage to the server) and efficiency (in terms of the operational and storage overhead on the server and client sides). The premise of this work is that SSE schemes typically offer scope for massively parallel implementations with improved efficiency without compromising security. Based on this idea, we propose a highly scalable framework for parallelized SSE implementations using hardware-based crypto-accelerators, interfaced with a software-based control unit and a memory controller unit. We choose field programmable gate arrays (FPGAs) as the platform for the crypto-accelerators due to their flexibility, reconfigurability, low time-to-market and low maintenance overheads. As a case study, we illustrate how the recently proposed SSE scheme of Lai et al. (CCS'18) may be implemented as per our framework, and the benefits thereof, including shorter preprocessing time and reduced query-response latency as compared to a software implementation.

References

[1]
C-K. Chu, W.T. Zhu, J. Han, J.K. Liu, J. Xu, and J. Zhou. Security concerns in popular cloud storage services. IEEE Pervasive Computing, 12 (4): 50--57, 2013.
[2]
D.X. Song, D. Wagner, and A. Perrig. Practical techniques for searches on encrypted data. In IEEE S&P 2000, pages 44--55, 2000.
[3]
E. Goh. Secure indexes. IACR Cryptology ePrint Archive, 2003: 216, 2003.
[4]
R. Curtmola, J.A. Garay, S. Kamara, and R. Ostrovsky. Searchable symmetric encryption: improved definitions and efficient constructions. In ACM CCS'06, pages 79--88, 2006.
[5]
R.A. Popa, C.M.S. Redfield, N. Zeldovich, and H. Balakrishnan. Cryptdb: protecting confidentiality with encrypted query processing. In ACM SOSP'11, pages 85--100, 2011.
[6]
D. Cash, S. Jarecki, C.S. Jutla, H. Krawczyk, M-C. Rosu, and M. Steiner. Highly-scalable searchable symmetric encryption with support for boolean queries. In CRYPTO'13, pages 353--373, 2013.
[7]
D. Cash, J. Jaeger, S. Jarecki, C.S. Jutla, H. Krawczyk, M-C. Rosu, and M. Steiner. Dynamic searchable encryption in very-large databases: Data structures and implementation. In NDSS'14, 2014.
[8]
S. Faber, S. Jarecki, H. Krawczyk, Q. Nguyen, M-C. Rosu, and M. Steiner. Rich queries on encrypted data: Beyond exact matches. In ESORICS 2015, pages 123--145, 2015.
[9]
S. Sun, J.K. Liu, A. Sakzad, R. Steinfeld, and T.H. Yuen. An efficient non-interactive multi-client searchable encryption with support for boolean queries. In ESORICS 2016, pages 154--172, 2016.
[10]
Shangqi Lai, Sikhar Patranabis, Amin Sakzad, Joseph Liu, Debdeep Mukhopadhyay, Ron Steinfeld, Shifeng Sun, and Dongxi Liu. Result pattern hiding searchable encryption for conjunctive queries. In Proceedings of the 2018 ACM conference on Computer and communications security textnormal(To Appear), 2018.
[11]
Daniel J Bernstein. Introduction to post-quantum cryptography. In Post-quantum cryptography, pages 1--14. Springer, 2009.
[12]
Morris J Dworkin. Sha-3 standard: Permutation-based hash and extendable-output functions. Technical report, 2015.
[13]
Daniel J. Bernstein. Curve25519: New diffie-hellman speed records. In Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24--26, 2006, Proceedings, pages 207--228, 2006.

Cited By

View all
  • (2021)Enhancing the security of data in cloud computing environments using Remote Data Auditing2021 6th International Conference on Innovative Technology in Intelligent System and Industrial Applications (CITISIA)10.1109/CITISIA53721.2021.9719899(1-10)Online publication date: 24-Nov-2021
  • (2020)A privacy-preserving multi-keyword ranked retrieval scheme in cloud computingInformation Security Journal: A Global Perspective10.1080/19393555.2020.1767241(1-13)Online publication date: 23-May-2020
  • (2020)Hardware Security in India: The Journey so FarCyber Security in India10.1007/978-981-15-1675-7_8(71-96)Online publication date: 18-Mar-2020

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
CCS '18: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security
October 2018
2359 pages
ISBN:9781450356930
DOI:10.1145/3243734
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 15 October 2018

Check for updates

Author Tags

  1. fpgas
  2. hardware acceleration
  3. security
  4. symmetric searchable encryption

Qualifiers

  • Poster

Funding Sources

Conference

CCS '18
Sponsor:

Acceptance Rates

CCS '18 Paper Acceptance Rate 134 of 809 submissions, 17%;
Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)22
  • Downloads (Last 6 weeks)2
Reflects downloads up to 13 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2021)Enhancing the security of data in cloud computing environments using Remote Data Auditing2021 6th International Conference on Innovative Technology in Intelligent System and Industrial Applications (CITISIA)10.1109/CITISIA53721.2021.9719899(1-10)Online publication date: 24-Nov-2021
  • (2020)A privacy-preserving multi-keyword ranked retrieval scheme in cloud computingInformation Security Journal: A Global Perspective10.1080/19393555.2020.1767241(1-13)Online publication date: 23-May-2020
  • (2020)Hardware Security in India: The Journey so FarCyber Security in India10.1007/978-981-15-1675-7_8(71-96)Online publication date: 18-Mar-2020

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media