Search and permission request over encrypted database
Data sharing has become increasingly important in order for organizations to maintain competitiveness in the AI-empowered digital economy. Whereas, in the face of stringent data protection and privacy regulations, such data sharing needs to be designed with extreme care. This motivates the study of...
Main Authors: | , , , , |
---|---|
Other Authors: | |
Format: | Conference Paper |
Language: | English |
Published: |
2024
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/174898 |
_version_ | 1826122727427145728 |
---|---|
author | Tjuawinata, Ivan Zhao, Yongjun Shen, Bowen Lam, Kwok-Yan Chi, Chi-Hung |
author2 | School of Computer Science and Engineering |
author_facet | School of Computer Science and Engineering Tjuawinata, Ivan Zhao, Yongjun Shen, Bowen Lam, Kwok-Yan Chi, Chi-Hung |
author_sort | Tjuawinata, Ivan |
collection | NTU |
description | Data sharing has become increasingly important in order for organizations to maintain competitiveness in the AI-empowered digital economy. Whereas, in the face of stringent data protection and privacy regulations, such data sharing needs to be designed with extreme care. This motivates the study of privacy-preserving data sharing schemes in distributed systems. In this work, we consider a basic scenario where shared data are stored in an encrypted database while still allowing for search requests and permission verification. In contrast to the scenario of existing SSE schemes, in our case, we consider the scenario where each file comes with an access function while each user has a dynamic attribute. So a file is returned to the requester if (1) The file contains the keyword that is being searched; (2) The requester’s attribute values tuple in the time of query satisfies the access function of the files. We propose a scheme that is designed to satisfy these requirements and analyze its security and efficiency. |
first_indexed | 2024-10-01T05:53:13Z |
format | Conference Paper |
id | ntu-10356/174898 |
institution | Nanyang Technological University |
language | English |
last_indexed | 2024-10-01T05:53:13Z |
publishDate | 2024 |
record_format | dspace |
spelling | ntu-10356/1748982024-04-19T15:39:22Z Search and permission request over encrypted database Tjuawinata, Ivan Zhao, Yongjun Shen, Bowen Lam, Kwok-Yan Chi, Chi-Hung School of Computer Science and Engineering 2023 10th International Conference on ICT for Smart Society (ICISS) Strategic Centre for Research in Privacy-Preserving Technologies & Systems (SCRIPTS) Digital Trust Centre (DTC) Computer and Information Science Secure searchable data storage Access-control verification Multiparty computation Symmetric searchable encryption Data sharing has become increasingly important in order for organizations to maintain competitiveness in the AI-empowered digital economy. Whereas, in the face of stringent data protection and privacy regulations, such data sharing needs to be designed with extreme care. This motivates the study of privacy-preserving data sharing schemes in distributed systems. In this work, we consider a basic scenario where shared data are stored in an encrypted database while still allowing for search requests and permission verification. In contrast to the scenario of existing SSE schemes, in our case, we consider the scenario where each file comes with an access function while each user has a dynamic attribute. So a file is returned to the requester if (1) The file contains the keyword that is being searched; (2) The requester’s attribute values tuple in the time of query satisfies the access function of the files. We propose a scheme that is designed to satisfy these requirements and analyze its security and efficiency. Info-communications Media Development Authority (IMDA) National Research Foundation (NRF) Submitted/Accepted version This research is supported by the National Research Foundation, Singapore and Infocomm Media Development Authority under its Trust Tech Funding Initiative and Strategic Capability Research Centres Funding Initiative. 2024-04-18T05:46:08Z 2024-04-18T05:46:08Z 2023 Conference Paper Tjuawinata, I., Zhao, Y., Shen, B., Lam, K. & Chi, C. (2023). Search and permission request over encrypted database. 2023 10th International Conference on ICT for Smart Society (ICISS). https://dx.doi.org/10.1109/ICISS59129.2023.10291415 979-8-3503-3954-3 https://hdl.handle.net/10356/174898 10.1109/ICISS59129.2023.10291415 en 2021YFE109900 © 2023 IEEE. All rights reserved. This article may be downloaded for personal use only. Any other use requires prior permission of the copyright holder. The Version of Record is available online at http://doi.org/10.1109/ICISS59129.2023.10291415. application/pdf |
spellingShingle | Computer and Information Science Secure searchable data storage Access-control verification Multiparty computation Symmetric searchable encryption Tjuawinata, Ivan Zhao, Yongjun Shen, Bowen Lam, Kwok-Yan Chi, Chi-Hung Search and permission request over encrypted database |
title | Search and permission request over encrypted database |
title_full | Search and permission request over encrypted database |
title_fullStr | Search and permission request over encrypted database |
title_full_unstemmed | Search and permission request over encrypted database |
title_short | Search and permission request over encrypted database |
title_sort | search and permission request over encrypted database |
topic | Computer and Information Science Secure searchable data storage Access-control verification Multiparty computation Symmetric searchable encryption |
url | https://hdl.handle.net/10356/174898 |
work_keys_str_mv | AT tjuawinataivan searchandpermissionrequestoverencrypteddatabase AT zhaoyongjun searchandpermissionrequestoverencrypteddatabase AT shenbowen searchandpermissionrequestoverencrypteddatabase AT lamkwokyan searchandpermissionrequestoverencrypteddatabase AT chichihung searchandpermissionrequestoverencrypteddatabase |