toplogo
سجل دخولك

Distinct Dynamic Searchable Encryption (d-DSE) Resisting Volume Leakage in Encrypted Databases


المفاهيم الأساسية
The author presents a new approach, d-DSE, to handle volume leakage in encrypted databases by utilizing distinct search and security notions. The core argument revolves around the development of a practical solution for secure data search with reduced communication costs.
الملخص

The content introduces d-DSE as a novel method to address volume leakage in encrypted databases. It explores distinct search concepts, security models, and practical implementations like BF-SRE. The proposed scheme aims to enhance data security while maintaining efficiency in data retrieval.

Dynamic Searchable Encryption (DSE) is crucial for secure data storage and retrieval in encrypted databases. Volume leakage poses a significant threat to data privacy and security. Padding strategies are commonly used but come with increased costs.

Distinct search can help mitigate volume leakage by concealing repetitive values during queries. The proposed d-DSE scheme offers a practical solution for secure data search with reduced communication costs compared to existing methods like padding strategies.

The content discusses the implementation of BF-SRE, which combines Bloom Filters and Symmetric Revocable Encryption for efficient data handling in encrypted databases. The scheme aims to provide forward privacy, backward privacy, and volume-hiding security guarantees.

Overall, the content emphasizes the importance of addressing volume leakage in encrypted databases through innovative approaches like d-DSE and schemes like BF-SRE that offer enhanced security and efficiency in data retrieval processes.

edit_icon

تخصيص الملخص

edit_icon

إعادة الكتابة بالذكاء الاصطناعي

edit_icon

إنشاء الاستشهادات

translate_icon

ترجمة المصدر

visual_icon

إنشاء خريطة ذهنية

visit_icon

زيارة المصدر

الإحصائيات
In SEAL*, x means the adjustable padding’s parameter. For n = 220 and p = 10^-5, the required bit size b for Bloom Filter is just 3MB. On the Enron dataset, BF-SRE outperforms other schemes by approximately 29.27x and 30.54x in time and communication costs for searching the highest-volume keyword.
اقتباسات
"The proposed scheme sharply reduces communication costs compared to padding strategies." "Our evaluation demonstrates that BF-SRE stands as a competitive solution compared to other schemes."

الرؤى الأساسية المستخلصة من

by Dongli Liu,W... في arxiv.org 03-05-2024

https://arxiv.org/pdf/2403.01182.pdf
d-DSE

استفسارات أعمق

How does d-DSE compare to traditional encryption methods

d-DSE differs from traditional encryption methods in its ability to efficiently handle and protect large-scale data storage in encrypted databases. Traditional encryption methods focus on securing data at rest or during transmission, but they do not provide the functionality for searching and querying encrypted data directly. On the other hand, d-DSE allows clients to outsource sensitive encrypted data to a server and send search queries without compromising security.

What are the potential drawbacks or limitations of implementing BF-SRE

One potential drawback of implementing BF-SRE is the overhead associated with maintaining the Bloom Filter (BF) structure. The BF requires additional storage space to store information about distinct values, which can increase costs and complexity. Additionally, managing the Symmetric Revocable Encryption (SRE) keys for revocation may introduce operational challenges if not handled properly. Furthermore, there could be performance implications when dealing with a large number of updates or deletions in the database.

How can advancements in dynamic searchable encryption impact broader cybersecurity practices

Advancements in dynamic searchable encryption can have a significant impact on broader cybersecurity practices by enhancing privacy-preserving techniques for sensitive data handling. By enabling efficient search capabilities on encrypted databases while protecting against volume leakage threats, d-DSE contributes to strengthening confidentiality and integrity measures in various applications such as cloud computing, secure messaging systems, healthcare records management, financial services, etc. These advancements also promote compliance with regulatory requirements like GDPR by ensuring that personal data remains confidential even during processing operations.
0
star