Leakage-Suppressed Encrypted Keyword Queries over Multiple Cloud Servers

Research output: Journal article publicationJournal articleAcademic researchpeer-review

Abstract

Searchable encryption is a technique that can support operations on encrypted data directly. However, searchable encryption is still vulnerable to attacks that exploit the leakages from encrypted query results. This article presents an effective multi-server searchable encryption scheme to prevent volume and access pattern leakages. To hide the volume leakage of a keyword, a new index construction is proposed to compress multiple results into one index. To prevent the attacker from observing the access pattern of injected records, the update and search phases are executed in batches, such that the server can only retrieve multiple numbers of fixed volumes. To reduce the co-occurrence leakage, we propose our index distribution algorithm. Both records and queries are dispatched among cloud servers such that the attacker cannot recover the trapdoor values by only observing one cloud server. We use the minimum s-ts-t cut algorithm to find the optimal assignment strategy that can diminish the query response time and the information disclosure at the same time. We formally analyze the security strengths and conduct evaluations. The experimental results indicate that our designs can strike a good balance between security and efficiency.

Original languageEnglish
Pages (from-to)26-39
Number of pages14
JournalIEEE Transactions on Cloud Computing
Volume12
Issue number1
DOIs
Publication statusPublished - 1 Jan 2024

Keywords

  • Access pattern
  • cloud security
  • distributed cloud storage
  • searchable encryption
  • volume leakage

ASJC Scopus subject areas

  • Software
  • Information Systems
  • Hardware and Architecture
  • Computer Science Applications
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Leakage-Suppressed Encrypted Keyword Queries over Multiple Cloud Servers'. Together they form a unique fingerprint.

Cite this