Abstract
Searchable Symmetric Encryption (SSE) allows a user to store encrypted documents on server(s) and later efficiently searches these documents in a private manner. So far most existing works have focused on a single storage server. Therefore in this paper we consider the natural extension of SSE to multiple servers. We believe it is of practical interest, given that a user may choose to distribute documents to various cloud storage that are now readily available. The main benefit compared to a single server scheme is that a server can be set to hold only subset of encrypted documents/blocks. A server learns only content of documents/blocks that it stores in the event of successful leakage attack or ciphertext cryptanalysis, provided servers do not collude. We define formally an extension of single server SSE to multiserver and instantiate provably secure schemes that provide the above feature. Our main scheme hides total number of documents and document size even after retrieval, achieving less leakages compared to prior work, while maintaining sublinear search time for each server. We further study leakages under the new setting of non-colluding and colluding servers.
Similar content being viewed by others
Notes
We believe this is the case in most of the practical scenario, as a provider would not simply share customers’ data with other providers.
References
Boneh, D., Crescenzo, G.D., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J. (eds.) EUROCRYPT 2004, Springer Berlin / Heidelberg, LNCS, vol. 3027, pp 506–522 (2004)
Bösch, C., Hartel, P., Jonker, W., Peter, A.: A survey of provably secure searchable encryption. ACM Comput. Surv. 47(2), 18:1–18:51 (2014)
Bösch, C., Peter, A., Leenders, B., Lim, H.W., Tang, Q., Wang, H., Hartel, P.H., Jonker, W., Jøsang, A., García-Alfaro, J.: Distributed searchable symmetric encryption. In: Miri, A., Hengartner, U., Huang, N. (eds.) PST 2014, IEEE, pp 330–337 (2014)
Cash, D., Jarecki, S., Jutla, C.S., Krawczyk, H., Rosu, M.C., Steiner, M.: Highly-scalable searchable symmetric encryption with support for boolean queries. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013 and IACR Eprint Archive (2013:169), Springer, LNCS, vol. 8042, pp 353–373 (2013)
Cash, D., Jaeger, J., Jarecki, S., Jutla, C., Krawczyk, H., Rosu, M.C., Steiner, M.: Dynamic searchable encryption in very large databases: data structures and implementation NDSS 2014 and IACR Eprint Archive (2014:853), Internet Society, vol. 2014 (2014)
Chang, Y., Mitzenmacher, M.: Privacy preserving keyword searches on remote encrypted data. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005, Springer, LNCS, vol. 3531, pp 442–455 (2005)
Chase, M., Kamara, S.: Structured encryption and controlled disclosure. In: Abe, M. (ed.) ASIACRYPT 2010, Springer, LNCS, vol. 6477, pp 577–594 (2010)
Cheng, R., Yan, J., Guan, C., Zhang, F., Ren, K.: Verifiable searchable symmetric encryption from indistinguishability obfuscation. In: Bao, F., Miller, S., Zhou, J., Ahn, G. (eds.) ACM ASIA CCS 2015, 1, pp 621–626 (2015)
Chor, B., Kushilevitz, E., Goldreich, O., Sudan, M.: Private information retrieval. J. ACM 45(6), 965–981 (1998)
Curtmola, R., Garay, J.A., Kamara, S., Ostrovsky, R.: Searchable Symmetric encryption: Improved definitions and efficient constructions. In: Juels, A., Wright, R.N., di Vimercati, S.D.C. (eds.) ACM CCS 2006, 1, pp 79–88 (2006)
Faber, S., Jarecki, S., Krawczyk, H., Nguyen, Q., Rosu, M., Steiner, M.: Rich queries on encrypted data: beyond exact matches. IACR ePrint Archive 2015:927. http://eprint.iacr.org/2015/927 (2015)
Gentry, C.: A fully homomorphic encryption scheme. PhD thesis. Stanford University (2009)
Goh, E.J.: Secure indexes. IACR ePrint Archive, Report 2003/216. http://eprint.iacr.org/2003/216/ (2003)
Goldreich, O., Ostrovsky, R.: Software protection and simulation on oblivious RAMs. J. ACM 43(3), 431–473 (1996)
Hahn, F., Kerschbaum, F.: Searchable encryption with secure and efficient updates. In: Ahn, G., Yung, M., Li, N. (eds.) ACM SIGSAC 2014, 1, pp 310–320 (2014)
Ishal, Y., Kushilevitz, E., Lu, S., Ostrovsky, R.: Private large-scale databases with distributed searchable symmetric encryption. IACR ePrint Archive (and CT-RSA 2016) 2015:1190 (2015)
Islam, M.S., Kuzu, M., Kantarcioglu, M.: Access pattern disclosure on searchable encryption: Ramification, attack and mitigation NDSS 2012, The Internet Society (2012)
Jarecki, S., Jutla, C.S., Krawczyk, H., Rosu, M.C., Steiner, M.: Outsourced Symmetric Private Information Retrieval. In: Sadeghi, A.R., Gligor, V.D., Yung, M. (eds.) ACM CCS 2013, 1, pp 875–888 (2013)
Kamara, S., Papamanthou, C.: Parallel and dynamic searchable symmetric encryption. In: Sadeghi, A.R. (ed.) FC 2013, Springer, LNCS, vol. 7859, pp 258–274 (2013)
Kamara, S., Papamanthou, C., Roeder, T.: Dynamic Searchable Symmetric Encryption. In: Yu, T., Danezis, G., Gligor, V.D. (eds.) ACM CCS 2012, 1, pp 965–976 (2012)
Katz, J., Lindell, Y.: Introduction to modern cryptography. Chapman & Hall/CRC (2007)
Kurosawa, K., Ohtaki, Y., Keromytis, A.D.: UC-Secure searchable symmetric encryption FC 2012, Springer, LNCS, vol. 7397, pp 285–298 (2012)
Kurosawa, K., Ohtaki, Y.: How to construct UC-secure searchable symmetric encryption scheme. IACR ePrint Archive 2015:251 (2015)
Kuzu, M., Islam, M.S., Kantarcioglu, M.: Distributed search over encrypted big data. In: Park, J., Squicciarini, A.C. (eds.) ACM CODASPY 2015, 1, pp 271–278 (2015)
Moataz, T., Shikfa, A.: Boolean symmetric searchable encryption. In: Chen, K., Xie, Q., Qiu, W., Li, N., Tzeng, W.G. (eds.) ASIACCS 2013, ACM, pp 265–276 (2013)
Mohamad, M.S., Poh, G.S.: Verifiable structured encryption. In: Kutylowski, M., Yung, M. (eds.) Inscrypt 2012, Springer, LNCS, vol. 7763, pp 137–156 (2012)
Mohamad, M.S., Poh, G.S., Chin, J.J.: Securing outsourced storage Cryptology 2016, Institute for Mathematical Research, UPM, pp 111–119 (2016)
Naveed, M., Prabhakaran, M., Gunter, C.A.: Dynamic searchable encryption via blind storage IEEE S & P 2014, IEEE Computer Society, pp 639–654 (2014)
Orencik, C., Selcuk, A., Savas, E., Kantarcioglu, M.: Multi-keyword search over encrypted data with scoring and search pattern obfuscation. Int. J. Inf. Sec. (Online: 23-05-15) pp 1–19 (2015)
Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data IEEE S & P 2000, IEEE Computer Society, p 44 (2000)
Stefanov, E., Shi, E.: ObliviStore: High performance oblivious cloud storage. In: IEEE S & P 2013, IEEE Computer Society, pp 253–267 (2013)
Stefanov, E., Papamanthou, C., Shi, E.: Practical dynamic searchable encryption with small leakage. In: NDSS 2014, The Internet Society. http://www.internetsociety.org/events/ndss-symposium-2014 (2014)
Acknowledgements
The authors thank the anonymous reviewers for their constructive comments that have helped to improve this paper.
Author information
Authors and Affiliations
Corresponding author
Additional information
This article is part of the Topical Collection on Recent Trends in Cryptography.
Rights and permissions
About this article
Cite this article
Poh, G.S., Mohamad, M.S. & Chin, JJ. Searchable symmetric encryption over multiple servers. Cryptogr. Commun. 10, 139–158 (2018). https://doi.org/10.1007/s12095-017-0232-y
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12095-017-0232-y