Affiliation:
1. Department of Electronic and Information Engineering, Hong Kong Polytechnic University, Hong Kong SAR, China
Abstract
Many breakthroughs on security and privacy-preserving techniques have emerged to mitigate the trust loss of cloud hosting environment caused by various types of attacks. To enhance memory-level security of multi-keyword fuzzy search, a widely occurred query request, we take the initiative to apply Trusted Execution Environment (a.k.a TEE) technology to our protocol design which provides hardware-based tamper-proof enclaves. Then we propose the Edit Distance-based Obfuscation Mechanism to further protect the query process executed outside TEE against access pattern leakage. With concerns of practicality and performance, we also propose the two-layer fuzzy index structure and Trend-aware Cache. The former addresses the space limitation of TEE memory for searching large datasets, while the latter optimizes the cache utility of TEE with trend-aware coordinator to effectively reduce the communication overhead.
Subject
Computer Networks and Communications,Hardware and Architecture,Safety, Risk, Reliability and Quality,Software
Reference48 articles.
1. J. Aumasson and L. Merino, SGX Secure Enclaves in Practice–Security and Crypto Review, Black Hat, 2016.
2. Trusteddb: A trusted hardware-based database with privacy and data confidentiality;Bajaj;IEEE Transactions on Knowledge and Data Engineering,2014
3. Space/time trade-offs in hash coding with allowable errors;Bloom;Communications of the ACM,1970
4. M. Blum, P. Feldman and S. Micali, Non-interactive zero-knowledge and its applications, in: Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali, 2019, pp. 329–349.
5. D. Boneh, G. Di Crescenzo, R. Ostrovsky and G. Persiano, Public key encryption with keyword search, in: International Conference on the Theory and Applications of Cryptographic Techniques, Springer, 2004, pp. 506–522.