Efficient Search on Encrypted Data. Outline SWP Linear Scan SWP encrypted index Goh Bloom Filter Hybird scheme Discussion.

Slides:



Advertisements
Similar presentations
File-System Interface
Advertisements

Chapter Programming in C
Building an Encrypted and Searchable Audit Log Brent Waters Dirk Balfanz Glenn Durfee D.K. Smetters.
Seny Kamara & Kristin Lauter Micorsoft Reaserch B 廖以圻 B 陳育旋.
CPSC 335 Dr. Marina Gavrilova Computer Science University of Calgary Canada.
Introduction to Practical Cryptography Lecture 9 Searchable Encryption.
1 Suffix Trees and Suffix Arrays Modern Information Retrieval by R. Baeza-Yates and B. Ribeiro-Neto Addison-Wesley, (Chapter 8)
Simple Linear Work Suffix Array Construction J. Kärkkäinen, P. Sanders Proc. 30th International Conference on Automata, Languages and Programming 2003.
網際網路資料庫連結 2004 Php Web Programming. 上完這段課程,你將學會  一般靜態網頁與互動式網頁的區別。  網際網路上大量資料的存取。  資料庫的角色與功能。  Web Server 的角色與功能。  網際網路資料庫的應用。  基本的程式寫作技巧及網頁的應用。
Public Key Encryption That Allows PIR Queries Dan Boneh, Eyal Kushilevitz, Rafail Ostrovsky, William E. Skeith III Presenter: 紀汶承.
Binary Search (I) Date: June 17, 2009 Introducer: Hsing-Yen Ann.
1.1 電腦的特性 電腦能夠快速處理資料:電腦可在一秒內處理數百萬個 基本運算,這是人腦所不能做到的。原本人腦一天的工 作量,交給電腦可能僅需幾分鐘的時間就處理完畢。 電腦能夠快速處理資料:電腦可在一秒內處理數百萬個 基本運算,這是人腦所不能做到的。原本人腦一天的工 作量,交給電腦可能僅需幾分鐘的時間就處理完畢。
1 Efficient Conjunctive Keyword-Searchable Encryption,2007 Author: Eun-Kyung Ryu and Tsuyoshi Takagi Presenter: 顏志龍.
JAVA 程式設計與資料結構 第十四章 Linked List. Introduction Linked List 的結構就是將物件排成一列, 有點像是 Array ,但是我們卻無法直接經 由 index 得到其中的物件 在 Linked List 中,每一個點我們稱之為 node ,第一個 node.
File System Implementation
8.1 何謂高度平衡二元搜尋樹 8.2 高度平衡二元搜尋樹的加入 8.3 高度平衡二元搜尋樹的刪除
: The Playboy Chimp ★★☆☆☆ 題組: Problem Set Archive with Online Judge 題號: 10611: The Playboy Chimp 解題者:蔡昇宇 解題日期: 2010 年 2 月 28 日 題意:給一已排序的數列 S( 升冪.
Bloom Filters Differential Files Simple large database.  File of records residing on disk.  Single key.  Index to records. Operations.  Retrieve. 
圖片索引專題 指導教授:陳淑媛 教授 黃伯偉 林育瑄. 動機 & 理念  目前圖像檢索系統中使用的大多都為利用文字 標籤圖像或是圖像輪廓特徵來進行搜尋,然而 輪廓特徵的缺點卻是所有組成圖像的線條都要 逐一處理相當耗時。  所以本研究的目標在於,提出一個以像素點為 特徵的有效率與正確率的圖像檢索演算法實作。
Efficient Conjunctive Keyword-Searchable Encryption,2007 Author: Eun-Kyung Ryu and Tsuyoshi Takagi Presenter: 顏志龍.
Fourier Series. Jean Baptiste Joseph Fourier (French)(1763~1830)
Distributed Video Coding. Outline Distributed video coding Lossless compression Lossy compression Low complexity video encoding Distributed image coding.
1 Pseudorandom-Permutation Index. 2 Outline Introduction Goh’s Z-IDX PRP-Index Secure game.
Image Interpolation Use SSE 指導教授 : 楊士萱 學 生 : 楊宗峰 日 期 :
JAVA 程式設計與資料結構 第二十章 Searching. Sequential Searching Sequential Searching 是最簡單的一種搜尋法,此演 算法可應用在 Array 或是 Linked List 此等資料結構。 Sequential Searching 的 worst-case.
演算法 8-1 最大數及最小數找法 8-2 排序 8-3 二元搜尋法.
Chapter 10 m-way 搜尋樹與B-Tree
1 Secure Indexes Author : Eu-Jin Goh Presented by Yi Cheng Lin.
Report of Summer Work 宋惟農 2008/09/02. 2 Outline IPTV study ZigBee controller for IPTV.
INFORMATION RETRIEVAL AND EXTRACTION 作業: Program 1 第十四組 組員:林永峰、洪承雄、謝宗憲.
Knowledge Management System -for Agenda 顏亦笛 陳靖宜 指噵教授 : 劉寶均教授 指噵公司 : 安捷達.
Building an Encrypted and Searchable Audit Log 11th Annual Network and Distributed Security Symposium (NDSS '04); 2004 February 5-6; San Diego; CA. Presented.
質數 (Prime) 相關問題 Introducer: Hsing-Yen Ann Date: 2009/05/13.
Practical Techniques for Searches on Encrypted Data Yongdae Kim Written by Song, Wagner, Perrig.
Motivation SSDs will become the primary storage devices on PC, but NTFS behavior may not suitable to flash memory especially on metadata files. When considering.
Effective C# 50 Specific Way to Improve Your C# Item 6, 7 Sephiroth.Wang2012/08/01.
1 Practical Techniques for Searches on Encrypted Data Dawn Song, David Wagner, Adrian Perrig.
資料通訊與電腦網路原理 資料傳輸線路的傳遞模式 資料於傳輸線路的移動 並列傳輸、序列傳輸 基頻、寬頻.
More about Databases. Data Entry through Forms Table View (Data sheet view) is useful for data entry of new records But sometimes customization would.
1 Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards 使用在 smart cards 的強韌及高效率密碼驗證金鑰協定 IEEE Transactions on Industrial Electronics,
Speaker : YUN–KUAN,CHANG Date : 2010/08/05 Scalable and Efficient Provable Data Possession.
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition File System Implementation.
Data Integrity Proofs in Cloud Storage Author: Sravan Kumar R and Ashutosh Saxena. Source: The Third International Conference on Communication Systems.
Sunday, December 20, 2015 ARCHITECTURE OF A SERVER- AIDED SIGNATURE SERVICE (SASS) FOR MOBILE NETWORKS Source: P. Lorenz and P. Dini (Eds.): ICN 2005,
When DRM Meets Restricted Multicast A Content Encryption Key Scheme for Restricted Multicast and DRM Min FENG and Bin ZHU Microsoft Research Asia.
Chapter 15 A External Methods. © 2004 Pearson Addison-Wesley. All rights reserved 15 A-2 A Look At External Storage External storage –Exists beyond the.
K-tree/forest: Efficient Indexes for Boolean Queries Rakesh M. Verma and Sanjiv Behl University of Houston
BlindLocation: Supporting User Location Privacy in Mobile Database Using Blind Signature Source: Journal of Computer Science and Technology, reviewing.
FILE ORGANIZATION.
Bandwidth-Efficient Continuous Query Processing over DHTs Yingwu Zhu.
Difference between DBMS and File System
Keyword search on encrypted data. Keyword search problem  Linux utility: grep  Information retrieval Basic operation Advanced operations – relevance.
Part III Storage Management
Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-user System Source: Pairing 2007, LNCS 4575, pp.2-22, 2007 Author: Yong.
© 2006 Pearson Addison-Wesley. All rights reserved15 A-1 Chapter 15 External Methods.
File-System Management
Searchable Encryption in Cloud
Authors: Hung-Yu, Chi-Sung Laih
Module 11: File Structure
A Dynamic Indirect IP Lookup based on Prefix Relationships
Database Performance Tuning and Query Optimization
based on slides by Debra Cook
Hash Table.
Subject Name: Operating Systems Subject Code:10CS53
國立臺北科技大學 課程:資料庫系統 fall Chapter 18
FILE ORGANIZATION.
More about Databases.
Building an Encrypted and Searchable Audit Log
File-System Interface
Chapter 11 Database Performance Tuning and Query Optimization
Presentation transcript:

Efficient Search on Encrypted Data

Outline SWP Linear Scan SWP encrypted index Goh Bloom Filter Hybird scheme Discussion

SWP Linear Scan K i = f k’ (L i ) X i = E k’’ (W i )

SWP encrypted index motivation :當文件量大時, sequential scan 不是一個有效率的方 法。 ex :在大型資料庫上,用 pre-computed index 是加速搜尋最常 用的技巧。 ex : index keywordpointerdocument

Simple way Simple way : Operation : 1)B search E(W) , return A encrypted list. 2)A may decrypt the encrypted entries and send B another request to retrieve the documents advantage : the request could be embedded in other retrievals disadvantage : A has to spend round-trip time

Another way motivation : save time Another way : K w = F k’’’ (E(W))  pointer E kw (P i ) Search : send to server

Goh Bloom Filter Document D : S={s 1, s 2, …, s n } n : the number of words chosen by client S : m bit array

Methodology The motivations : 1.Have a method that allows the owner of the data to find the required data from a remote and untrusted storage 2.Supports any types of data 3.Allows Alice to choose just the required keywords describing the data 4.Preserve the keywords where the keywords can be retrieved if needed 5.Time complexity of 0(1) to search for a keyword 6.Easy integration with any existing indexing scheme 7.Good performance time in terms of encryption, decryption and search

Scheme Setup/Encryption Phase Search Phase  Single Document Searching Mode  Multiple Documents Search Mode Decryption Phase

Setup/Encryption Phase

Hash Table c1 Loc(W i ) = H( E k’ (W)+id ) c2 c3 cn … Loc(W1) Loc(W2) Loc(W3) Loc(Wn) HT 1 c1 c2 c3 cn … Loc(W1) Loc(W2) Loc(W3) Loc(Wn) HT 2 c1 c2 c3 cn … Loc(W1) Loc(W2) Loc(W3) Loc(Wn) HT n

Search Phase : Single Document Searching Mode 傳給 server id // Loc(W i ) // E k’ (W) // k i

Search Phase : Multiple Documents Search Mode motivation :  Document number is unknown  Find a certain word in multiple documents This allows server to do the hash function H on behalf of client

Multiple Documents Search Mode

Decryption Phase

Discussion

SWP Linear Scan disadvantage Long processing time The search time increases as with the number of word  not suitable for files with many words

SWP encrypted index The fastest processing time disadvantage :  A single master index manages all the documents  Maintain a pool of keywords

Goh Bloom Filter High security disadvantage :  Large index size  Long processing time  Not suitable for active file server where changes document occur frequently