DEKS

A Secure Cloud-Based Searchable Service Can Make Attackers Pay

Conference Paper (2022)
Author(s)

Yubo Zheng (Huazhong University of Science and Technology)

Peng Xu (Huazhong University of Science and Technology)

Wei Wang (Huazhong University of Science and Technology)

Tianyang Chen (Huazhong University of Science and Technology)

Willy Susilo (University of Wollongong)

K. Liang (TU Delft - Cyber Security)

Hai Jin (Huazhong University of Science and Technology)

Research Group
Cyber Security
Copyright
© 2022 Yubo Zheng, Peng Xu, Wei Wang, Tianyang Chen, Willy Susilo, K. Liang, Hai Jin
DOI related publication
https://doi.org/10.1007/978-3-031-17146-8_5
More Info
expand_more
Publication Year
2022
Language
English
Copyright
© 2022 Yubo Zheng, Peng Xu, Wei Wang, Tianyang Chen, Willy Susilo, K. Liang, Hai Jin
Research Group
Cyber Security
Bibliographical Note
Green Open Access added to TU Delft Institutional Repository ‘You share, we take care!’ – Taverne project https://www.openaccess.nl/en/you-share-we-take-care Otherwise as indicated in the copyright section: the publisher is the copyright holder of this work and the author uses the Dutch legislation to make this work public. @en
Pages (from-to)
86-104
ISBN (print)
9783031171451
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

Many practical secure systems have been designed to prevent real-world attacks via maximizing the attacking cost so as to reduce attack intentions. Inspired by this philosophy, we propose a new concept named delay encryption with keyword search (DEKS) to resist the notorious keyword guessing attack (KGA), in the context of secure cloud-based searchable services. Avoiding the use of complex (and unreasonable) assumptions, as compared to existing works, DEKS optionally leverages a catalyst that enables one (e.g., a valid data user) to easily execute encryption; without the catalyst, any unauthenticated system insiders and outsiders take severe time consumption on encryption. By this, DEKS can overwhelm a KGA attacker in the encryption stage before it obtains any advantage. We leverage the repeated squaring function, which is the core building block of our design, to construct the first DEKS instance. The experimental results show that DEKS is practical in thwarting KGA for both small and large-scale datasets. For example, in the Wikipedia, a KGA attacker averagely takes 7.23 years to break DEKS when the delay parameter T= 2 24. The parameter T can be flexibly adjusted based on practical needs, and theoretically, its upper bound is infinite.

Files

978_3_031_17146_8_5.pdf
(pdf | 0.836 Mb)
- Embargo expired in 01-07-2023
License info not available