skip to main content
10.1145/3183713.3183754acmconferencesArticle/Chapter ViewAbstractPublication PagesmodConference Proceedingsconference-collections
research-article

Practical and Secure Substring Search

Published: 27 May 2018 Publication History

Abstract

In this paper we address the problem of outsourcing sensitive strings while still providing the functionality of substring searches. While security is one important aspect that requires careful system design, the practical application of the solution depends on feasible processing time and integration efforts into existing systems. That is, searchable symmetric encryption (SSE) allows queries on encrypted data but makes common indexing techniques used in database management systems for fast query processing impossible. As a result, the overhead for deploying such functional and secure encryption schemes into database systems while maintaining acceptable processing time requires carefully designed special purpose index structures. Such structures are not available on common database systems but require individual modifications depending on the deployed SSE scheme.
Our technique transforms the problem of secure substring search into range queries that can be answered efficiently and in a privacy-preserving way on common database systems without further modifications using frequency-hiding order-preserving encryption. We evaluated our prototype implementation deployed in a real-world scenario, including the consideration of network latency, we demonstrate the practicability of our scheme with 98.3 ms search time for 10,000 indexed emails. Further, we provide a practical security evaluation of this transformation based on the bucketing attack that is the best known published attack against this kind of property-preserving encryption.

References

[1]
The enron email dataset. https://www.cs.cmu.edu/~./enron/.
[2]
R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu. Order preserving encryption for numeric data. In Proceedings of the ACM International Conference on Management of Data, SIGMOD, 2004.
[3]
M. Bellare, A. Boldyreva, and A. O'Neill. Deterministic and efficiently searchable encryption. In Proceedings of the 27th International Conference on Advances in Cryptology, CRYPTO, 2007.
[4]
M. Bellare, M. Fischlin, A. O'Neill, and T. Ristenpart. Deterministic encryption: Definitional equivalences and constructions without random oracles. Lecture Notes in Computer Science, 2008.
[5]
A. Boldyreva, N. Chenette, Y. Lee, and A. O'Neill. Order-preserving symmetric encryption. In Proceedings of the 28th International Conference on Advances in Cryptology, EUROCRYPT, 2009.
[6]
A. Boldyreva, N. Chenette, and A. O'Neill. Order-preserving encryption revisited: improved security analysis and alternative solutions. In Proceedings of the 31st International Conference on Advances in Cryptology, CRYPTO, 2011.
[7]
D. Boneh, K. Lewi, M. Raykova, A. Sahai, M. Zhandry, and J. Zimmerman. Semantically secure order-revealing encryption: Multi-input functional encryption without obfuscation. In Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT, 2015.
[8]
D. Boneh and B. Waters. Conjunctive, subset, and range queries on encrypted data. In Proceedings of the 4th Theory of Cryptography Conference, TCC, 2007.
[9]
D. Cash, J. Jaeger, S. Jarecki, C. Jutla, H. Krawczyk, M.-C. Rosu, and M. Steiner. Dynamic searchable encryption in very large databases: Data structures and implementation. In Proc. of NDSS, volume~14, 2014.
[10]
D. Cash, S. Jarecki, C. Jutla, H. Krawczyk, M.-C. Roşu, and M. Steiner. Highly-scalable searchable symmetric encryption with support for boolean queries. In Advances in Cryptology, CRYPTO, 2013.
[11]
M. Chase and E. Shen. Substring-searchable symmetric encryption. Proceedings on Privacy Enhancing Technologies, 2015.
[12]
N. Chenette, K. Lewi, S. A. Weis, and D. J. Wu. Practical order-revealing encryption with limited leakage. In Proceedings of International Conference on Fast Software Encryption, pages 474--493. Springer, 2016.
[13]
R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky. Searchable symmetric encryption: improved definitions and efficient constructions. In Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS, 2006.
[14]
S. Faber, S. Jarecki, H. Krawczyk, Q. Nguyen, M. Rosu, and M. Steiner. Rich queries on encrypted data: Beyond exact matches. In "Computer Security -- ESORICS 2015: 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II", ESORICS.
[15]
E.-J. Goh. Secure indexes. IACR Cryptology ePrint Archive, (216), 2003.
[16]
P. Grubbs, K. Sekniqi, V. Bindschaedler, M. Naveed, and T. Ristenpart. Leakage-abuse attacks against order-revealing encryption. Cryptology ePrint Archive, Report 2016/895, 2016. http://eprint.iacr.org/2016/895.
[17]
H. Hacigümücs, B. Iyer, C. Li, and S. Mehrotra. Executing sql over encrypted data in the database-service-provider model. In Proceedings of the ACM SIGMOD Conference on Management of Data, SIGMOD. ACM, 2002.
[18]
H. Hacigumus, B. Iyer, and S. Mehrotra. Providing database as a service. In Proceedings of the 18th International Conference on Data Engineering, ICDE. IEEE, 2002.
[19]
F. Hahn and F. Kerschbaum. Poly-logarithmic range queries on encrypted data with small leakage. In 8th ACM Cloud Computing Security Workshop, CCSW, 2016.
[20]
S. Kamara, C. Papamanthou, and T. Roeder. Dynamic searchable symmetric encryption. In Proceedings of the 19th ACM Conference on Computer and Communications Security, CCS, 2012.
[21]
F. Kerschbaum. Frequency-hiding order-preserving encryption. In Proceedings of the 22nd ACM Conference on Computer and Communications Security, CCS, 2015.
[22]
F. Kerschbaum and A. Schröpfer. Optimal average-complexity ideal-security order-preserving encryption. In Proceedings of the 21st ACM SIGSAC Conference on Computer and Communications Security, CCS, 2014.
[23]
K. Lewi and D. J. Wu. Order-revealing encryption: New constructions, applications, and lower bounds. In Proceedings of the 23rd ACM SIGSAC Conference on Computer and Communications Security, CCS, 2016.
[24]
Y. Lu. Privacy-preserving logarithmic-time search on encrypted data in cloud. In Proceedings of the 19th Network and Distributed System Security Symposium, NDSS, 2012.
[25]
C. Mavroforakis, N. Chenette, A. O'Neill, G. Kollios, and R. Canetti. Modular order-preserving encryption, revisited. In Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, SIGMOD, 2015.
[26]
M. Naveed, S. Kamara, and C. V. Wright. Inference attacks on property-preserving encrypted databases. In Proceedings of the 22nd ACM Conference on Computer and Communications Security, CCS, 2015.
[27]
M. Naveed, M. Prabhakaran, and C. A. Gunter. Dynamic searchable encryption via blind storage. In Proceedings of the 35th Symposium on Security and Privacy, S&P, 2014.
[28]
R. A. Popa, F. H. Li, and N. Zeldovich. An ideal-security protocol for order-preserving encoding. In Proceedings of the 2013 Symposium on Security and Privacy, S &P, 2013.
[29]
R. A. Popa, C. Redfield, N. Zeldovich, and H. Balakrishnan. CryptDB: protecting confidentiality with encrypted query processing. In Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, SOSP. ACM, 2011.
[30]
D. S. Roche, D. Apon, S. G. Choi, and A. Yerukhimovich. Pope: Partial order preserving encoding. In Proceedings of the 23rd ACM SIGSAC Conference on Computer and Communications Security, CCS, 2016.
[31]
E. Shi, J. Bethencourt, H. T.-H. Chan, D. X. Song, and A. Perrig. Multi-dimensional range query over encrypted data. In Proceedings of the 2007 Symposium on Security and Privacy, S&P, 2007.
[32]
D. X. Song, D. Wagner, and A. Perrig. Practical techniques for searches on encrypted data. In Proceedings of the 21st IEEE Symposium on Security and Privacy, S&P, 2000.
[33]
E. Stefanov, C. Papamanthou, and E. Shi. Practical dynamic searchable encryption with small leakage. 2013, 2013.

Cited By

View all
  • (2024)Build Feature Vector for String Supporting Pattern Matching on Encrypted Character DataProceedings of the International Conference on Intelligent Systems and Networks10.1007/978-981-97-5504-2_41(345-354)Online publication date: 1-Sep-2024
  • (2023)Frequency-Revealing Attacks against Frequency-Hiding Order-Preserving EncryptionProceedings of the VLDB Endowment10.14778/3611479.361151316:11(3124-3136)Online publication date: 24-Aug-2023
  • (2023)A Survey on Searchable Symmetric EncryptionACM Computing Surveys10.1145/361799156:5(1-42)Online publication date: 27-Nov-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SIGMOD '18: Proceedings of the 2018 International Conference on Management of Data
May 2018
1874 pages
ISBN:9781450347037
DOI:10.1145/3183713
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 27 May 2018

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. encrypted databases
  2. secure substring search

Qualifiers

  • Research-article

Funding Sources

  • Horizon 2020

Conference

SIGMOD/PODS '18
Sponsor:

Acceptance Rates

SIGMOD '18 Paper Acceptance Rate 90 of 461 submissions, 20%;
Overall Acceptance Rate 785 of 4,003 submissions, 20%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)31
  • Downloads (Last 6 weeks)6
Reflects downloads up to 01 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Build Feature Vector for String Supporting Pattern Matching on Encrypted Character DataProceedings of the International Conference on Intelligent Systems and Networks10.1007/978-981-97-5504-2_41(345-354)Online publication date: 1-Sep-2024
  • (2023)Frequency-Revealing Attacks against Frequency-Hiding Order-Preserving EncryptionProceedings of the VLDB Endowment10.14778/3611479.361151316:11(3124-3136)Online publication date: 24-Aug-2023
  • (2023)A Survey on Searchable Symmetric EncryptionACM Computing Surveys10.1145/361799156:5(1-42)Online publication date: 27-Nov-2023
  • (2023)SecBerg: Secure and Practical Iceberg Queries in CloudIEEE Transactions on Services Computing10.1109/TSC.2023.326471016:5(3696-3710)Online publication date: Sep-2023
  • (2023)DCDPI: Dynamic and Continuous Deep Packet Inspection in Secure Outsourced MiddleboxesIEEE Transactions on Cloud Computing10.1109/TCC.2023.329313411:4(3510-3524)Online publication date: Oct-2023
  • (2023)MSIAP: A Dynamic Searchable Encryption for Privacy-Protection on Smart Grid With Cloud-Edge-EndIEEE Transactions on Cloud Computing10.1109/TCC.2021.313401511:2(1170-1181)Online publication date: 1-Apr-2023
  • (2023)A novel method for designing indexes to support efficient substring queries on encrypted databasesJournal of King Saud University - Computer and Information Sciences10.1016/j.jksuci.2023.02.00835:3(20-36)Online publication date: Mar-2023
  • (2022)Substring Searchable Symmetric Encryption Based on an Improved DAWGIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences10.1587/transfun.2021EAP1122E105.A:12(1578-1590)Online publication date: 1-Dec-2022
  • (2022)Prime Inner Product Encoding for Effective Wildcard-Based Multi-Keyword Fuzzy SearchIEEE Transactions on Services Computing10.1109/TSC.2020.302068815:4(1799-1812)Online publication date: 1-Jul-2022
  • (2022)PeGraph: A System for Privacy-Preserving and Efficient Search Over Encrypted Social GraphsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2022.320139217(3179-3194)Online publication date: 2022
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media