Skip to main content
Log in

Searchable symmetric encryption over multiple servers

  • Published:
Cryptography and Communications Aims and scope Submit manuscript

Abstract

Searchable Symmetric Encryption (SSE) allows a user to store encrypted documents on server(s) and later efficiently searches these documents in a private manner. So far most existing works have focused on a single storage server. Therefore in this paper we consider the natural extension of SSE to multiple servers. We believe it is of practical interest, given that a user may choose to distribute documents to various cloud storage that are now readily available. The main benefit compared to a single server scheme is that a server can be set to hold only subset of encrypted documents/blocks. A server learns only content of documents/blocks that it stores in the event of successful leakage attack or ciphertext cryptanalysis, provided servers do not collude. We define formally an extension of single server SSE to multiserver and instantiate provably secure schemes that provide the above feature. Our main scheme hides total number of documents and document size even after retrieval, achieving less leakages compared to prior work, while maintaining sublinear search time for each server. We further study leakages under the new setting of non-colluding and colluding servers.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Notes

  1. We believe this is the case in most of the practical scenario, as a provider would not simply share customers’ data with other providers.

References

  1. Boneh, D., Crescenzo, G.D., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J. (eds.) EUROCRYPT 2004, Springer Berlin / Heidelberg, LNCS, vol. 3027, pp 506–522 (2004)

    Google Scholar 

  2. Bösch, C., Hartel, P., Jonker, W., Peter, A.: A survey of provably secure searchable encryption. ACM Comput. Surv. 47(2), 18:1–18:51 (2014)

    Article  Google Scholar 

  3. Bösch, C., Peter, A., Leenders, B., Lim, H.W., Tang, Q., Wang, H., Hartel, P.H., Jonker, W., Jøsang, A., García-Alfaro, J.: Distributed searchable symmetric encryption. In: Miri, A., Hengartner, U., Huang, N. (eds.) PST 2014, IEEE, pp 330–337 (2014)

    Google Scholar 

  4. Cash, D., Jarecki, S., Jutla, C.S., Krawczyk, H., Rosu, M.C., Steiner, M.: Highly-scalable searchable symmetric encryption with support for boolean queries. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013 and IACR Eprint Archive (2013:169), Springer, LNCS, vol. 8042, pp 353–373 (2013)

    Chapter  Google Scholar 

  5. Cash, D., Jaeger, J., Jarecki, S., Jutla, C., Krawczyk, H., Rosu, M.C., Steiner, M.: Dynamic searchable encryption in very large databases: data structures and implementation NDSS 2014 and IACR Eprint Archive (2014:853), Internet Society, vol. 2014 (2014)

  6. Chang, Y., Mitzenmacher, M.: Privacy preserving keyword searches on remote encrypted data. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005, Springer, LNCS, vol. 3531, pp 442–455 (2005)

    Google Scholar 

  7. Chase, M., Kamara, S.: Structured encryption and controlled disclosure. In: Abe, M. (ed.) ASIACRYPT 2010, Springer, LNCS, vol. 6477, pp 577–594 (2010)

    Google Scholar 

  8. Cheng, R., Yan, J., Guan, C., Zhang, F., Ren, K.: Verifiable searchable symmetric encryption from indistinguishability obfuscation. In: Bao, F., Miller, S., Zhou, J., Ahn, G. (eds.) ACM ASIA CCS 2015, 1, pp 621–626 (2015)

    Google Scholar 

  9. Chor, B., Kushilevitz, E., Goldreich, O., Sudan, M.: Private information retrieval. J. ACM 45(6), 965–981 (1998)

    Article  MathSciNet  MATH  Google Scholar 

  10. Curtmola, R., Garay, J.A., Kamara, S., Ostrovsky, R.: Searchable Symmetric encryption: Improved definitions and efficient constructions. In: Juels, A., Wright, R.N., di Vimercati, S.D.C. (eds.) ACM CCS 2006, 1, pp 79–88 (2006)

    Google Scholar 

  11. Faber, S., Jarecki, S., Krawczyk, H., Nguyen, Q., Rosu, M., Steiner, M.: Rich queries on encrypted data: beyond exact matches. IACR ePrint Archive 2015:927. http://eprint.iacr.org/2015/927 (2015)

  12. Gentry, C.: A fully homomorphic encryption scheme. PhD thesis. Stanford University (2009)

  13. Goh, E.J.: Secure indexes. IACR ePrint Archive, Report 2003/216. http://eprint.iacr.org/2003/216/ (2003)

  14. Goldreich, O., Ostrovsky, R.: Software protection and simulation on oblivious RAMs. J. ACM 43(3), 431–473 (1996)

    Article  MathSciNet  MATH  Google Scholar 

  15. Hahn, F., Kerschbaum, F.: Searchable encryption with secure and efficient updates. In: Ahn, G., Yung, M., Li, N. (eds.) ACM SIGSAC 2014, 1, pp 310–320 (2014)

    Google Scholar 

  16. Ishal, Y., Kushilevitz, E., Lu, S., Ostrovsky, R.: Private large-scale databases with distributed searchable symmetric encryption. IACR ePrint Archive (and CT-RSA 2016) 2015:1190 (2015)

  17. Islam, M.S., Kuzu, M., Kantarcioglu, M.: Access pattern disclosure on searchable encryption: Ramification, attack and mitigation NDSS 2012, The Internet Society (2012)

  18. Jarecki, S., Jutla, C.S., Krawczyk, H., Rosu, M.C., Steiner, M.: Outsourced Symmetric Private Information Retrieval. In: Sadeghi, A.R., Gligor, V.D., Yung, M. (eds.) ACM CCS 2013, 1, pp 875–888 (2013)

    Google Scholar 

  19. Kamara, S., Papamanthou, C.: Parallel and dynamic searchable symmetric encryption. In: Sadeghi, A.R. (ed.) FC 2013, Springer, LNCS, vol. 7859, pp 258–274 (2013)

    Google Scholar 

  20. Kamara, S., Papamanthou, C., Roeder, T.: Dynamic Searchable Symmetric Encryption. In: Yu, T., Danezis, G., Gligor, V.D. (eds.) ACM CCS 2012, 1, pp 965–976 (2012)

    Google Scholar 

  21. Katz, J., Lindell, Y.: Introduction to modern cryptography. Chapman & Hall/CRC (2007)

  22. Kurosawa, K., Ohtaki, Y., Keromytis, A.D.: UC-Secure searchable symmetric encryption FC 2012, Springer, LNCS, vol. 7397, pp 285–298 (2012)

    Google Scholar 

  23. Kurosawa, K., Ohtaki, Y.: How to construct UC-secure searchable symmetric encryption scheme. IACR ePrint Archive 2015:251 (2015)

  24. Kuzu, M., Islam, M.S., Kantarcioglu, M.: Distributed search over encrypted big data. In: Park, J., Squicciarini, A.C. (eds.) ACM CODASPY 2015, 1, pp 271–278 (2015)

    Google Scholar 

  25. Moataz, T., Shikfa, A.: Boolean symmetric searchable encryption. In: Chen, K., Xie, Q., Qiu, W., Li, N., Tzeng, W.G. (eds.) ASIACCS 2013, ACM, pp 265–276 (2013)

    Google Scholar 

  26. Mohamad, M.S., Poh, G.S.: Verifiable structured encryption. In: Kutylowski, M., Yung, M. (eds.) Inscrypt 2012, Springer, LNCS, vol. 7763, pp 137–156 (2012)

    Google Scholar 

  27. Mohamad, M.S., Poh, G.S., Chin, J.J.: Securing outsourced storage Cryptology 2016, Institute for Mathematical Research, UPM, pp 111–119 (2016)

    Google Scholar 

  28. Naveed, M., Prabhakaran, M., Gunter, C.A.: Dynamic searchable encryption via blind storage IEEE S & P 2014, IEEE Computer Society, pp 639–654 (2014)

    Google Scholar 

  29. Orencik, C., Selcuk, A., Savas, E., Kantarcioglu, M.: Multi-keyword search over encrypted data with scoring and search pattern obfuscation. Int. J. Inf. Sec. (Online: 23-05-15) pp 1–19 (2015)

  30. Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data IEEE S & P 2000, IEEE Computer Society, p 44 (2000)

    Google Scholar 

  31. Stefanov, E., Shi, E.: ObliviStore: High performance oblivious cloud storage. In: IEEE S & P 2013, IEEE Computer Society, pp 253–267 (2013)

    Google Scholar 

  32. Stefanov, E., Papamanthou, C., Shi, E.: Practical dynamic searchable encryption with small leakage. In: NDSS 2014, The Internet Society. http://www.internetsociety.org/events/ndss-symposium-2014 (2014)

Download references

Acknowledgements

The authors thank the anonymous reviewers for their constructive comments that have helped to improve this paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Geong Sen Poh.

Additional information

This article is part of the Topical Collection on Recent Trends in Cryptography.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Poh, G.S., Mohamad, M.S. & Chin, JJ. Searchable symmetric encryption over multiple servers. Cryptogr. Commun. 10, 139–158 (2018). https://doi.org/10.1007/s12095-017-0232-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12095-017-0232-y

Keywords

Mathematics Subject Classification (2010)

Navigation