1 Common Secure Index for Conjunctive Keyword-Based Retrieval over Encrypted Data Peishun Wang, Huaxiong Wang, and Josef Pieprzyk: SDM 2007. LNCS, vol.

Slides:



Advertisements
Similar presentations
Trusted Data Sharing over Untrusted Cloud Storage Provider Gansen Zhao, Chunming Rong, Jin Li, Feng Zhang, and Yong Tang Cloud Computing Technology and.
Advertisements

Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
Efficient Information Retrieval for Ranked Queries in Cost-Effective Cloud Environments Presenter: Qin Liu a,b Joint work with Chiu C. Tan b, Jie Wu b,
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Rennes, 23/10/2014 Cristina Onete Putting it all together: using multiple primitives together.
Introduction to Practical Cryptography Lecture 9 Searchable Encryption.
INTRODUCTION PROBLEM FORMULATION FRAMEWORK AND PRIVACY REQUIREMENTS FOR MRSE PRIVACY-PRESERVING AND EFFICIENT MRSE PERFORMANCE ANALYSIS RELATED WORK CONCLUSION.
多媒體網路安全實驗室 Towards Secure and Effective Utilization over Encrypted Cloud Data 報告人 : 葉瑞群 日期 :2012/05/09 出處 :IEEE Transactions on Knowledge and Data Engineering.
Cross-Realm Password-Based Server Aided Key Exchange Source: WISA 2010, LNCS 6513, pp. 322–336, 2011(0) Author: Kazuki Yoneyama Presenter: Li-Tzu Chang.
A Secure Remote User Authentication Scheme with Smart Cards Manoj Kumar 報告者 : 許睿中 日期 :
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Apr 22, 2003Mårten Trolin1 Agenda Course high-lights – Symmetric and asymmetric cryptography – Digital signatures and MACs – Certificates – Protocols Interactive.
Practical Techniques for Searches on Encrypted Data Author: Dawn Xiaodong Song, David Wagner, Adrian Perrig Presenter: 紀銘偉.
Environmental Key Generation towards Clueless Agents James Riordan School of Mathematics University of Minnesota. Bruce Schneier Counterpane Systems. Published:
Efficient Conjunctive Keyword-Searchable Encryption,2007 Author: Eun-Kyung Ryu and Tsuyoshi Takagi Presenter: 顏志龍.
A password authentication scheme with secure password updating SEC 期末報告 學號: 姓名:翁玉芬.
ITIS 6200/8200. time-stamping services Difficult to verify the creation date and accurate contents of a digital file Required properties of time-stamping.
1 A secure broadcasting cryptosystem and its application to grid computing Eun-Jun Yoon, Kee-Young Yoo Future Generation Computer Systems (2010),doi: /j.future
Privacy and Integrity Preserving in Distributed Systems Presented for Ph.D. Qualifying Examination Fei Chen Michigan State University August 25 th, 2009.
Multicast Security May 10, 2004 Sam Irvine Andy Nguyen.
Freenet A Distributed Anonymous Information Storage and Retrieval System I Clarke O Sandberg I Clarke O Sandberg B WileyT W Hong.
Improved Searchable Public Key Encryption with Designated Tester Author : Hyun Sook Rhee, Jong Hwan Park, Willy Susilo, Dong Hoon Lee Presenter: Li-Tzu.
PRIAM: PRivate Information Access Management on Outsourced Storage Service Providers Mark Shaneck Karthikeyan Mahadevan Jeff Yongdae Kim.
Long-term Archive Service Requirements draft-ietf-ltans-reqs-00.txt.
Strong Password Protocols
Practical Techniques for Searches on Encrypted Data Yongdae Kim Written by Song, Wagner, Perrig.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
14.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 14 Entity Authentication.
Part Two Network Security Applications Chapter 4 Key Distribution and User Authentication.
Guomin Yang et al. IEEE Transactions on Wireless Communication Vol. 6 No. 9 September
HPCC 2015, August , New York, USA Wei Chang c Joint work with Qin Liu a, Guojun Wang b, and Jie Wu c a. Hunan University, P. R. China b. Central.
Lecture 11: Strong Passwords
Authentication Applications Unit 6. Kerberos In Greek and Roman mythology, is a multi-headed (usually three-headed) dog, or "hellhound” with a serpent's.
1 Security on Social Networks Or some clues about Access Control in Web Data Management with Privacy, Time and Provenance Serge Abiteboul, Alban Galland.
How to Update Documents Verifiably in Searchable Symmetric Encryption Kaoru Kurosawa and Yasuhiro Ohtaki Ibaraki University, Japan.
Kerberos Named after a mythological three-headed dog that guards the underworld of Hades, Kerberos is a network authentication protocol that was designed.
Chapter 16 Security Introduction to CS 1 st Semester, 2012 Sanghyun Park.
Presented by: Suparita Parakarn Kinzang Wangdi Research Report Presentation Computer Network Security.
Public Key Encryption with keyword Search Author: Dan Boneh Rafail Ostroversity Giovanni Di Crescenzo Giuseppe Persiano Presenter: 陳昱圻.
A secure re-keying scheme Introduction Background Re-keying scheme User revocation User join Conclusion.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Lecture 16: Security CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9.
14.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 14 Entity Authentication.
Merkle trees Introduced by Ralph Merkle, 1979 An authentication scheme
Secure Conjunctive Keyword Search Over Encrypted Data Philippe Golle Jessica Staddon Palo Alto Research Center Brent Waters Princeton University.
NEW DIRECTIONS IN CRYPTOGRAPHY Made Harta Dwijaksara, Yi Jae Park.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Computer System Design Lab 1 Inverted Index Based Multi-Keyword Public-key Searchable Encryption with Strong Privacy Guarantee Bing Wang * Wei Song *†
A Study of Secure Communications in WiFi Networks Bumjo Park 1 and Namgi Kim 11 1 Dept. Of Computer Science, Kyonggi Univ. San 94-1, Iui, Yeongtong, Suwon,
Presented By Amarjit Datta
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P System Aameek Singh, Ling Liu College of Computing, Georgia Tech International.
多媒體網路安全實驗室 Anonymous Authentication Systems Based on Private Information Retrieval Date: Reporter: Chien-Wen Huang 出處: Networked Digital Technologies,
Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Scheme.
Implementing Secure IRC App with Elgamal By Hyungki Choi ID : Date :
2011 IEEE TrustCom-11 Sushmita Ruj Amiya Nayak and Ivan Stojmenovic Regular Seminar Tae Hoon Kim.
Keyword search on encrypted data. Keyword search problem  Linux utility: grep  Information retrieval Basic operation Advanced operations – relevance.
KERBEROS SYSTEM Kumar Madugula.
9.2 SECURE CHANNELS JEJI RAMCHAND VEDULLAPALLI. Content Introduction Authentication Message Integrity and Confidentiality Secure Group Communications.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
SSE-2 Step1: keygen(1 k ):s {0,1} k,output K=s Step2:Buildindex(K,D): 建立 table T, p=word bit+max bit R 假設 w 1 出現在 D 1,D 3 T[π s (w 1 ||1)]=D 1 T[π s (w.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Searchable Encryption in Cloud
Professor Tzong-Chen Wu
A Wireless LAN Security Protocol
Privacy Preserving Ranked Multi-Keyword
based on slides by Debra Cook
eVoting System Proposal
J. Byun et al. In Secure Data Management, LNCS 4165,
Presentation transcript:

1 Common Secure Index for Conjunctive Keyword-Based Retrieval over Encrypted Data Peishun Wang, Huaxiong Wang, and Josef Pieprzyk: SDM LNCS, vol. 4721, pp. 108–123. 報告者:廖俊威 日 期: 2009/7/30

2 Problem definition Members in a dynamic group retrieve their encrypted data from an untrusted server based on keywords and without any loss of data confidentiality and member’s privacy.

3 Introduction In 2005, Park et al. proposed privacy preserving keyword-based retrieval protocols for dynamic groups. To the best of our knowledge, it is the first work on searchable encryption in the multi-user setting. Shortcomings –Their protocols use the same group session key as their authentication codes for all group members, so it cannot provide user privacy against insider. –Their protocols use Goh’s single-user protocol to build common secure indices and trapdoors, and use the group encryption and decryption keys to process the data. This means every user knows the same collection of keys. There is no facility to ensure privacy amongst the users. –After the q-th session in their protocols, a user must make q trapdoors for a list of keywords, thus, when the q is big enough, their protocols become much inefficient. –In Park et al’s protocols, if an Leaving Member (LM) reveals the group decryption key to an Server Administrator (SA), the SA can decrypt all the documents encrypted previously, as a user can know all of the previous group encryption keys by hashing the current group encryption key repeatedly

4 CSI-CKR model (Common Secure Indices for Conjunctive Keyword-Based Retrieval) CSI-CKR has three parties –A trusted group manager (GM) –Members in the dynamic group –A server First, GM setups the system and distributes an authentication code to every member. A member encrypts her data, generates the corresponding secure indices, and stores them on the server. When a member wants to retrieve the documents containing some keywords, she makes the searchable information for the keywords, and sends it along with her authentication code to the server. Then, for the legitimate member, the server tests all secure indices to find the matched data, and returns them to the member. Finally, the member interacts with GM to get the plaintext data.

5 Security requirement of CSI-CKR Data privacy –The server is not able to extract any information about the encrypted data, common secure indices, queries and searches. –Any leaving member is not able to search and retrieve data after her revocation. Member privacy –Prevent any body (excluding the group manager) to impersonate a legitimate member to query the data. –Although a member interacts with the group manager, member privacy guarantees that the group manager knows nothing about the data the member retrieves.

6 Definition of CSI-CKR SystemSetup –Initiates the scheme AuthCodGen –generates members’ PIN numbers, –their secure codes –and a secure test code DataGen –builds searchable encrypted data DataQurey –retrieves the matched data DataDcrypt –decrypts the encrypted data

7

8

9

10

11

12

13

14 Conclusion Our protocol is based on a new idea different from any previous single-user protocols, and only uses public keys to generate authentication codes, build common secure indices and trapdoors, and encrypt the data. The size of trapdoor in our protocol is fixed to 2n + logm. So our protocol is more practical. In our protocol, the members do not have the decryption key, so our protocol avoids the attack that LM reveal group decryption key.