Paper 2014/509

Privacy preserving delegated word search in the cloud

Kaoutar Elkhiyaoui, Melek Onen, and Refik Molva

Abstract

In this paper, we address the problem of privacy preserving delegated word search in the cloud. We consider a scenario where a data owner outsources its data to a cloud server and delegates the search capabilities to a set of third party users. In the face of semi-honest cloud servers, the data owner does not want to disclose any information about the outsourced data; yet it still wants to benefit from the highly parallel cloud environment. In addition, the data owner wants to ensure that delegating the search functionality to third parties does not allow these third parties to jeopardize the confidentiality of the outsourced data, neither does it prevent the data owner from efficiently revoking the access of these authorized parties. To these ends, we propose a word search protocol that builds upon techniques of keyed hash functions, oblivious pseudo-random functions and Cuckoo hashing to construct a searchable index for the outsourced data, and uses private information retrieval of short information to guarantee that word search queries do not reveal any information about the data to the cloud server. Moreover, we combine attribute-based encryption and oblivious pseudo-random functions to achieve an efficient revocation of authorized third parties. The proposed scheme is suitable for the cloud as it can be easily parallelized.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Published elsewhere. Minor revision. Secrypt 2014
Keywords
Privacy preserving keyword searchdelegationcloud
Contact author(s)
kaoutar elkhiyaoui @ eurecom fr
History
2014-06-30: received
Short URL
https://ia.cr/2014/509
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2014/509,
      author = {Kaoutar Elkhiyaoui and Melek Onen and Refik Molva},
      title = {Privacy preserving delegated word search in the cloud},
      howpublished = {Cryptology {ePrint} Archive, Paper 2014/509},
      year = {2014},
      url = {https://eprint.iacr.org/2014/509}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.