Visible to the public A Security Proxy to Cloud Storage Backends Based on an Efficient Wildcard Searchable Encryption

TitleA Security Proxy to Cloud Storage Backends Based on an Efficient Wildcard Searchable Encryption
Publication TypeConference Paper
Year of Publication2018
AuthorsChung, S., Shieh, M., Chiueh, T.
Conference Name2018 IEEE 8th International Symposium on Cloud and Service Computing (SC2)
ISBN Number978-1-7281-0236-8
KeywordsAmazon S3, Buildings, cloud computing, cloud databases, cloud storage, cloud storage backends, composability, constantly small storage footprint, cryptography, database indexing, efficient encryption, efficient wildcard searchable encryption, Encryption, enterprises, file content, index database, Indexes, information retrieval, local index, local malicious staff, on-premises storage, potential storage solution, pubcrawl, resilience, Resiliency, Searchable encryption, security proxy, storage management, wildcard SE construction
Abstract

Cloud storage backends such as Amazon S3 are a potential storage solution to enterprises. However, to couple enterprises with these backends, at least two problems must be solved: first, how to make these semi-trusted backends as secure as on-premises storage; and second, how to selectively retrieve files as easy as on-premises storage. A security proxy can address both the problems by building a local index from keywords in files before encrypting and uploading files to these backends. But, if the local index is built in plaintext, file content is still vulnerable to local malicious staff. Searchable Encryption (SE) can get rid of this vulnerability by making index into ciphertext; however, its known constructions often require modifications to index database, and, to support wildcard queries, they are not efficient at all. In this paper, we present a security proxy that, based on our wildcard SE construction, can securely and efficiently couple enterprises with these backends. In particular, since our SE construction can work directly with existing database systems, it incurs only a little overhead, and when needed, permits the security proxy to run with constantly small storage footprint by readily out-sourcing all built indices to existing cloud databases.

URLhttps://ieeexplore.ieee.org/document/8567384
DOI10.1109/SC2.2018.00026
Citation Keychung_security_2018