words exhibit very similar statistical properties, e.g.
serial numbers that are evenly distributed across doc-
uments. However, attributes with statistical properties
that could be available as background knowledge (e.g.
medical diagnoses) to an attacker need to be treated
with great caution and might require noise insertion.
7 CONCLUSION
In this paper, we evaluated the practical usability of
searchable encryption for data archives in the cloud,
illustrated by embedding an implementation of Goh’s
searchable encryption scheme into MongoDB. We
found that the use of compression on the additional
data structures keeps the data size at tolerable lev-
els and relative to the number of embedded search
keywords. Performance benchmarks revealed that for
insert operations under typical network parameters,
the additional overhead for insert operations is neg-
ligible compared to unencrypted operation. Search
queries however exhibit a considerable impact for en-
crypted operation, as search operations are linear to
the number of documents in Goh’s scheme. However,
the measured durations of encrypted queries could
be acceptable for interactive use where the added se-
curity is required. To evaluate the security proper-
ties of searchable encryption, we presented threats
to keyword confidentiality as an attack-defense-tree
model, which applies to most searchable encryption
schemes. The most relevant threat comes from in-
ference attacks, which are possible if the keywords
exhibit strong statistical properties which can be ex-
tracted using background knowledge. In such cases,
noise insertion techniques can be used to mitigate
such attacks.
Further research could investigate the performance
more recent constructions of searchable encryption
schemes with constant search complexity (e.g. (Ka-
mara et al., 2012)) and schemes that provide extended
search capabilities, such as range queries (see e.g.
(Boneh and Waters, 2007; Wang et al., 2011)).
ACKNOWLEDGEMENTS
The authors would like to thank Martin Kreichgauer
for providing the prototypical implementation of the
Z-IDX scheme and the MongoDB integration.
REFERENCES
Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno,
T., Lange, T., Malone-Lee, J., Neven, G., Paillier, P.,
and Shi, H. (2005). Searchable encryption revisited:
Consistency properties, relation to anonymous IBE,
and extensions. In Advances in Cryptology–CRYPTO
2005, pages 205–222. Springer.
Agrawal, R., Kiernan, J., Srikant, R., and Xu, Y. (2004).
Order preserving encryption for numeric data. In Pro-
ceedings of SIGMOD ’04 International Conference on
Management of Data, pages 563–574. ACM.
Arasu, A., Blanas, S., Eguro, K., Joglekar, M., Kaushik, R.,
Kossmann, D., Ramamurthy, R., Upadhyaya, P., and
Venkatesan, R. (2013). Secure database-as-a-service
with cipherbase. In Proceedings of SIGMOD ’13
International Conference on Management of Data,
pages 1033–1036. ACM.
Avizienis, A., Laprie, J.-C., Randell, B., and Landwehr, C.
(2004). Basic concepts and taxonomy of dependable
and secure computing. Dependable and Secure Com-
puting, IEEE Transactions on, 1(1):11–33.
Bagnato, A., Kordy, B., Meland, P. H., and Schweitzer, P.
(2012). Attribute decoration of attack–defense trees.
International Journal of Secure Software Engineering
(IJSSE), 3(2):1–35.
Bajaj, S. and Sion, R. (2011). Trusteddb: A trusted hard-
ware based database with privacy and data confiden-
tiality. In Proceedings of SIGMOD ’11 International
Conference on Management of Data, pages 205–216.
ACM.
Bloom, B. H. (1970). Space/time trade-offs in hash coding
with allowable errors. Communications of the ACM,
13(7):422–426.
Boneh, D., Di Crescenzo, G., Ostrovsky, R., and Per-
siano, G. (2004). Public key encryption with keyword
search. In Advances in Cryptology-Eurocrypt 2004,
pages 506–522. Springer.
Boneh, D. and Waters, B. (2007). Conjunctive, subset, and
range queries on encrypted data. In Theory of cryp-
tography, pages 535–554. Springer.
Byun, J. W., Rhee, H. S., Park, H.-A., and Lee, D. H.
(2006). Off-line keyword guessing attacks on recent
keyword search schemes over encrypted data. In Se-
cure Data Management, pages 75–83. Springer.
Curtmola, R., Garay, J., Kamara, S., and Ostrovsky, R.
(2006). Searchable symmetric encryption: improved
definitions and efficient constructions. In Proceedings
of the 13th ACM conference on Computer and com-
munications security, pages 79–88. ACM.
Floratou, A., Teletia, N., DeWitt, D. J., Patel, J. M., and
Zhang, D. (2012). Can the elephants handle the nosql
onslaught? Proc. VLDB Endow., pages 1712–1723.
Gentry, C. (2009). Fully homomorphic encryption using
ideal lattices. In Proceedings of the 41st annual ACM
symposium on Theory of Computing, pages 169–178.
ACM.
Goh, E.-J. et al. (2003). Secure indexes. IACR Cryptology
ePrint Archive, 2003:216.
SecureKeywordSearchoverDataArchivesintheCloud-PerformanceandSecurityAspectsofSearchableEncryption
437