Storage efficient substring searchable symmetric encryption

Iraklis Leontiadis, Ming Li

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Scopus citations

Abstract

We address the problem of substring searchable encryption. A single user produces a big stream of data and later on wants to learn the positions in the string that some patterns occur. Although current techniques exploit auxiliary data structures to achieve efficient substring search on the server side, the cost at the user side may be prohibitive. We revisit the work of substring searchable encryption in order to reduce the storage cost of auxiliary data structures. Our solution entails a suffix array based index design, which allows optimal storage cost O(n) with small hidden factor at the size of the string n. Moreover, we implemented our scheme and the state of the art protocol [7] to demonstrate the performance advantage of our solution with precise benchmark results.

Original languageEnglish (US)
Title of host publicationSCC 2018 - Proceedings of the 6th International Workshop on Security in Cloud Computing, Co-located with ASIA CCS 2018
PublisherAssociation for Computing Machinery, Inc
Pages3-13
Number of pages11
ISBN (Electronic)9781450357593
DOIs
StatePublished - May 23 2018
Event6th International Workshop on Security in Cloud Computing, SCC 2018 - Incheon, Korea, Republic of
Duration: Jun 4 2018 → …

Publication series

NameSCC 2018 - Proceedings of the 6th International Workshop on Security in Cloud Computing, Co-located with ASIA CCS 2018

Conference

Conference6th International Workshop on Security in Cloud Computing, SCC 2018
Country/TerritoryKorea, Republic of
CityIncheon
Period6/4/18 → …

Keywords

  • Compression index
  • Privacy
  • Secure outsourced storage
  • Substring searchable encryption
  • Suffix array

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Software
  • Computer Science Applications
  • Information Systems

Fingerprint

Dive into the research topics of 'Storage efficient substring searchable symmetric encryption'. Together they form a unique fingerprint.

Cite this