Search and permission request over encrypted database

Data sharing has become increasingly important in order for organizations to maintain competitiveness in the AI-empowered digital economy. Whereas, in the face of stringent data protection and privacy regulations, such data sharing needs to be designed with extreme care. This motivates the study of...

Full description

Bibliographic Details
Main Authors: Tjuawinata, Ivan, Zhao, Yongjun, Shen, Bowen, Lam, Kwok-Yan, Chi, Chi-Hung
Other Authors: School of Computer Science and Engineering
Format: Conference Paper
Language:English
Published: 2024
Subjects:
Online Access:https://hdl.handle.net/10356/174898
_version_ 1826122727427145728
author Tjuawinata, Ivan
Zhao, Yongjun
Shen, Bowen
Lam, Kwok-Yan
Chi, Chi-Hung
author2 School of Computer Science and Engineering
author_facet School of Computer Science and Engineering
Tjuawinata, Ivan
Zhao, Yongjun
Shen, Bowen
Lam, Kwok-Yan
Chi, Chi-Hung
author_sort Tjuawinata, Ivan
collection NTU
description Data sharing has become increasingly important in order for organizations to maintain competitiveness in the AI-empowered digital economy. Whereas, in the face of stringent data protection and privacy regulations, such data sharing needs to be designed with extreme care. This motivates the study of privacy-preserving data sharing schemes in distributed systems. In this work, we consider a basic scenario where shared data are stored in an encrypted database while still allowing for search requests and permission verification. In contrast to the scenario of existing SSE schemes, in our case, we consider the scenario where each file comes with an access function while each user has a dynamic attribute. So a file is returned to the requester if (1) The file contains the keyword that is being searched; (2) The requester’s attribute values tuple in the time of query satisfies the access function of the files. We propose a scheme that is designed to satisfy these requirements and analyze its security and efficiency.
first_indexed 2024-10-01T05:53:13Z
format Conference Paper
id ntu-10356/174898
institution Nanyang Technological University
language English
last_indexed 2024-10-01T05:53:13Z
publishDate 2024
record_format dspace
spelling ntu-10356/1748982024-04-19T15:39:22Z Search and permission request over encrypted database Tjuawinata, Ivan Zhao, Yongjun Shen, Bowen Lam, Kwok-Yan Chi, Chi-Hung School of Computer Science and Engineering 2023 10th International Conference on ICT for Smart Society (ICISS) Strategic Centre for Research in Privacy-Preserving Technologies & Systems (SCRIPTS) Digital Trust Centre (DTC) Computer and Information Science Secure searchable data storage Access-control verification Multiparty computation Symmetric searchable encryption Data sharing has become increasingly important in order for organizations to maintain competitiveness in the AI-empowered digital economy. Whereas, in the face of stringent data protection and privacy regulations, such data sharing needs to be designed with extreme care. This motivates the study of privacy-preserving data sharing schemes in distributed systems. In this work, we consider a basic scenario where shared data are stored in an encrypted database while still allowing for search requests and permission verification. In contrast to the scenario of existing SSE schemes, in our case, we consider the scenario where each file comes with an access function while each user has a dynamic attribute. So a file is returned to the requester if (1) The file contains the keyword that is being searched; (2) The requester’s attribute values tuple in the time of query satisfies the access function of the files. We propose a scheme that is designed to satisfy these requirements and analyze its security and efficiency. Info-communications Media Development Authority (IMDA) National Research Foundation (NRF) Submitted/Accepted version This research is supported by the National Research Foundation, Singapore and Infocomm Media Development Authority under its Trust Tech Funding Initiative and Strategic Capability Research Centres Funding Initiative. 2024-04-18T05:46:08Z 2024-04-18T05:46:08Z 2023 Conference Paper Tjuawinata, I., Zhao, Y., Shen, B., Lam, K. & Chi, C. (2023). Search and permission request over encrypted database. 2023 10th International Conference on ICT for Smart Society (ICISS). https://dx.doi.org/10.1109/ICISS59129.2023.10291415 979-8-3503-3954-3 https://hdl.handle.net/10356/174898 10.1109/ICISS59129.2023.10291415 en 2021YFE109900 © 2023 IEEE. All rights reserved. This article may be downloaded for personal use only. Any other use requires prior permission of the copyright holder. The Version of Record is available online at http://doi.org/10.1109/ICISS59129.2023.10291415. application/pdf
spellingShingle Computer and Information Science
Secure searchable data storage
Access-control verification
Multiparty computation
Symmetric searchable encryption
Tjuawinata, Ivan
Zhao, Yongjun
Shen, Bowen
Lam, Kwok-Yan
Chi, Chi-Hung
Search and permission request over encrypted database
title Search and permission request over encrypted database
title_full Search and permission request over encrypted database
title_fullStr Search and permission request over encrypted database
title_full_unstemmed Search and permission request over encrypted database
title_short Search and permission request over encrypted database
title_sort search and permission request over encrypted database
topic Computer and Information Science
Secure searchable data storage
Access-control verification
Multiparty computation
Symmetric searchable encryption
url https://hdl.handle.net/10356/174898
work_keys_str_mv AT tjuawinataivan searchandpermissionrequestoverencrypteddatabase
AT zhaoyongjun searchandpermissionrequestoverencrypteddatabase
AT shenbowen searchandpermissionrequestoverencrypteddatabase
AT lamkwokyan searchandpermissionrequestoverencrypteddatabase
AT chichihung searchandpermissionrequestoverencrypteddatabase