Title | Access Pattern Hiding in Searchable Encryption |
Publication Type | Conference Paper |
Year of Publication | 2021 |
Authors | Boucenna, Fateh, Nouali, Omar, Adi, Kamel, Kechid, Samir |
Conference Name | 2021 8th International Conference on Future Internet of Things and Cloud (FiCloud) |
Keywords | access pattern, cloud computing, composability, data privacy, Encryption, Internet of Things, privacy, pubcrawl, resilience, Resiliency, search problems, Searchable encryption, Security and Privacy, security constraints, Servers |
Abstract | Cloud computing is a technology that provides users with a large storage space and an enormous computing power. For privacy purpose, the sensitive data should be encrypted before being outsourced to the cloud. To search over the outsourced data, searchable encryption (SE) schemes have been proposed in the literature. An SE scheme should perform searches over encrypted data without causing any sensitive information leakage. To this end, a few security constraints were elaborated to guarantee the security of the SE schemes, namely, the keyword privacy, the trapdoor unlinkability, and the access pattern. The latter is very hard to be respected and most approaches fail to guarantee the access pattern constraint when performing a search. This constraint consists in hiding from the server the search result returned to the user. The non respect of this constraint may cause sensitive information leakage as demonstrated in the literature. To fix this security lack, we propose a method that allows to securely request and receive the needed documents from the server after performing a search. The proposed method that we call the access pattern hiding (APH) technique allows to respect the access pattern constraint. An experimental study is conducted to validate the APH technique. |
DOI | 10.1109/FiCloud49777.2021.00023 |
Citation Key | boucenna_access_2021 |