We propose a simple and efficient searchable symmetric encryption scheme based on a Bitmap index that evaluates Boolean queries. Our scheme provides a practical solution in settings where communications and computations are very constrained as it offers a suitable trade-off between privacy and performance.
Apresentação sobre Criptografia baseada em reticulados (lattices), realizada no contexto da disciplina de Post-Quantum Cryptography do PPGCC da UFSC.
Versão odp: http://coenc.td.utfpr.edu.br/~giron/presentations/aula_lattice.odp
An Image Encryption using Chaotic Based Cryptosystemxlyle
NAME: MUHAMAD LUQMAN NULHAKIM BIN MANSOR
NO MATRIC: BTBL16043975
COURSE: ISM (SK) KESELAMATAN RANGKAIAN KOMPUTER
SUPERVISOR: PROF. MADYA DR AFENDEE BIN MOHAMED
UNIVERSITI SULTAN ZAINAL ABIDIN
Apresentação sobre Criptografia baseada em reticulados (lattices), realizada no contexto da disciplina de Post-Quantum Cryptography do PPGCC da UFSC.
Versão odp: http://coenc.td.utfpr.edu.br/~giron/presentations/aula_lattice.odp
An Image Encryption using Chaotic Based Cryptosystemxlyle
NAME: MUHAMAD LUQMAN NULHAKIM BIN MANSOR
NO MATRIC: BTBL16043975
COURSE: ISM (SK) KESELAMATAN RANGKAIAN KOMPUTER
SUPERVISOR: PROF. MADYA DR AFENDEE BIN MOHAMED
UNIVERSITI SULTAN ZAINAL ABIDIN
Cloud computing is an ever-growing field in today‘s era.With the accumulation of data and the
advancement of technology,a large amount of data is generated everyday.Storage, availability and security of
the data form major concerns in the field of cloud computing.This paper focuses on homomorphic encryption,
which is largely used for security of data in the cloud.Homomorphic encryption is defined as the technique of
encryption in which specific operations can be carried out on the encrypted data.The data is stored on a remote
server.The task here is operating on the encrypted data.There are two types of homomorphic encryption, Fully
homomorphic encryption and patially homomorphic encryption.Fully homomorphic encryption allow arbitrary
computation on the ciphertext in a ring, while the partially homomorphic encryption is the one in which
addition or multiplication operations can be carried out on the normal ciphertext.Homomorphic encryption
plays a vital role in cloud computing as the encrypted data of companies is stored in a public cloud, thus taking
advantage of the cloud provider‘s services.Various algorithms and methods of homomorphic encryption that
have been proposed are discussed in this paper
Processing Reachability Queries with Realistic Constraints on Massive Network...BigMine
Massive graphs are ubiquitous in various application domains, such as social networks, road networks, communication networks, biological networks, RDF graphs, and so on. Such graphs are massive (for example, with hundreds of millions of nodes and edges or even more) and contain rich information (for example, node/edge weights, labels and textual contents). In such massive graphs, an important class of problems is to process various graph structure related queries. Graph reachability, as an example, asks whether a node can reach another in a graph. However, the large graph scale presents new challenges for efficient query processing.
In this talk, I will introduce two new yet important types of graph reachability queries: weight constraint reachability that imposes edge weight constraint on the answer path, and k-hop reachability that imposes a length constraint on the answer path. With such realistic constraints, we can find more meaningful and practically feasible answers. These two reachablity queries have wide applications in many real-world problems, such as QoS routing and trip planning.
This presentation on Lattice-based Digital Signatures from April 2018 was given to the Chinese academy of science from OnBoard Security's Zhenfei Zhang.
seminar of Distributed key generation protocol with hierarchicalthreshold access structure in February 2015
IET Information Security 9(4) by Nasrollah Pakniat, Mahnaz Noroozi, Ziba Eslami
Perplexity of Index Models over Evolving Linked Data Thomas Gottron
ESWC presentation on the stability of 12 different index models for linked data. Provides a formalisation of the index models as well as stability evaluation based on data distributions and information theoretic metrics.
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
- Data over the cloud is transferred or transmitted between servers and users. Privacy of that
data is very important as it belongs to personal information. If data get hacked by the hacker, can be
used to defame a person’s social data. Sometimes delay are held during data transmission. i.e. Mobile
communication, bandwidth is low. Hence compression algorithms are proposed for fast and efficient
transmission, encryption is used for security purposes and blurring is used by providing additional
layers of security. These algorithms are hybridized for having a robust and efficient security and
transmission over cloud storage system.
Investigative Compression Of Lossy Images By Enactment Of Lattice Vector Quan...IJERA Editor
In the digital era we live in, efficient representation of data generated by a discrete source and its reliable transmission are unquestionable need. In this work we have focused on source coding taking image as source. Lattice Vector Quantization (LVQ) can be used for source coding as well as for channel coding. (LVQ) with Generator Matrix (GM) and codebook is implemented. When implementation using codebook is done, two codebooks are constructed, one with 256 lattice points that are closest to (0,0,0,0) and another with 256 lattice points that are closest to (1,0,0,0). Energy for both the codes is calculated. When we compare the energy of both the codes we find that codes centered at a non lattice point is lower energy code.
Cloud computing is an ever-growing field in today‘s era.With the accumulation of data and the
advancement of technology,a large amount of data is generated everyday.Storage, availability and security of
the data form major concerns in the field of cloud computing.This paper focuses on homomorphic encryption,
which is largely used for security of data in the cloud.Homomorphic encryption is defined as the technique of
encryption in which specific operations can be carried out on the encrypted data.The data is stored on a remote
server.The task here is operating on the encrypted data.There are two types of homomorphic encryption, Fully
homomorphic encryption and patially homomorphic encryption.Fully homomorphic encryption allow arbitrary
computation on the ciphertext in a ring, while the partially homomorphic encryption is the one in which
addition or multiplication operations can be carried out on the normal ciphertext.Homomorphic encryption
plays a vital role in cloud computing as the encrypted data of companies is stored in a public cloud, thus taking
advantage of the cloud provider‘s services.Various algorithms and methods of homomorphic encryption that
have been proposed are discussed in this paper
Processing Reachability Queries with Realistic Constraints on Massive Network...BigMine
Massive graphs are ubiquitous in various application domains, such as social networks, road networks, communication networks, biological networks, RDF graphs, and so on. Such graphs are massive (for example, with hundreds of millions of nodes and edges or even more) and contain rich information (for example, node/edge weights, labels and textual contents). In such massive graphs, an important class of problems is to process various graph structure related queries. Graph reachability, as an example, asks whether a node can reach another in a graph. However, the large graph scale presents new challenges for efficient query processing.
In this talk, I will introduce two new yet important types of graph reachability queries: weight constraint reachability that imposes edge weight constraint on the answer path, and k-hop reachability that imposes a length constraint on the answer path. With such realistic constraints, we can find more meaningful and practically feasible answers. These two reachablity queries have wide applications in many real-world problems, such as QoS routing and trip planning.
This presentation on Lattice-based Digital Signatures from April 2018 was given to the Chinese academy of science from OnBoard Security's Zhenfei Zhang.
seminar of Distributed key generation protocol with hierarchicalthreshold access structure in February 2015
IET Information Security 9(4) by Nasrollah Pakniat, Mahnaz Noroozi, Ziba Eslami
Perplexity of Index Models over Evolving Linked Data Thomas Gottron
ESWC presentation on the stability of 12 different index models for linked data. Provides a formalisation of the index models as well as stability evaluation based on data distributions and information theoretic metrics.
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
- Data over the cloud is transferred or transmitted between servers and users. Privacy of that
data is very important as it belongs to personal information. If data get hacked by the hacker, can be
used to defame a person’s social data. Sometimes delay are held during data transmission. i.e. Mobile
communication, bandwidth is low. Hence compression algorithms are proposed for fast and efficient
transmission, encryption is used for security purposes and blurring is used by providing additional
layers of security. These algorithms are hybridized for having a robust and efficient security and
transmission over cloud storage system.
Investigative Compression Of Lossy Images By Enactment Of Lattice Vector Quan...IJERA Editor
In the digital era we live in, efficient representation of data generated by a discrete source and its reliable transmission are unquestionable need. In this work we have focused on source coding taking image as source. Lattice Vector Quantization (LVQ) can be used for source coding as well as for channel coding. (LVQ) with Generator Matrix (GM) and codebook is implemented. When implementation using codebook is done, two codebooks are constructed, one with 256 lattice points that are closest to (0,0,0,0) and another with 256 lattice points that are closest to (1,0,0,0). Energy for both the codes is calculated. When we compare the energy of both the codes we find that codes centered at a non lattice point is lower energy code.
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream CiphersIJNSA Journal
To enhance the security and reliability of the widely-used stream ciphers, a 2-D and a 3-D mesh-knight Algorithm Based Fault Tolerant (ABFT) schemes for stream ciphers are developed which can be universally applied to RC4 and other stream ciphers. Based on the ready-made arithmetic unit in stream ciphers, the proposed 2-D ABFT scheme is able to detect and correct any simple error, and the 3-D meshknight ABFT scheme is capable of detecting and correcting up to three errors in an n2 -data matrix with liner computation and bandwidth overhead. The proposed schemes provide one-to-one mapping between data index and check sum group so that error can be located and recovered by easier logic and simple operations.
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream CiphersIJNSA Journal
To enhance the security and reliability of the widely-used stream ciphers, a 2-D and a 3-D mesh-knight Algorithm Based Fault Tolerant (ABFT) schemes for stream ciphers are developed which can be universally applied to RC4 and other stream ciphers. Based on the ready-made arithmetic unit in stream ciphers, the proposed 2-D ABFT scheme is able to detect and correct any simple error, and the 3-D meshknight ABFT scheme is capable of detecting and correcting up to three errors in an n2 -data matrix with liner computation and bandwidth overhead. The proposed schemes provide one-to-one mapping between data index and check sum group so that error can be located and recovered by easier logic and simple operations.
Presently on a daily basis sharing the information over web is becoming a significant issue due to security problems. Thus lots of techniques are needed to protect the shared info in academic degree unsecured channel. The present work target cryptography to secure the data whereas causing inside the network. Encryption has come up as a solution, and plays an awfully necessary role in data security. This security mechanism uses some algorithms to scramble info into unclear text which can be exclusively being decrypted by party those possesses the associated key. This paper is expounded the varied forms of algorithmic rule for encryption & decryption: DES, AES, RSA, and Blowfish. It helps to hunt out the best algorithmic rule.
Watermarking of JPEG2000 Compressed Images with Improved EncryptionEditor IJCATR
The need for copyright protection, ownership verification, and other issues for digital data are getting more and more interest nowadays. Among the solutions for these issues, digital watermarking techniques are used. A range of watermarking methods has been projected. Compression plays a foremost role in the design of watermarking algorithms. For a digital watermarking method to be effective, it is vital that an embedded watermark should be robust against compression. JPEG2000 is a new standard for image compression and transmission. JPEG2000 offers both lossy and lossless compression. The projected approach is used to execute a robust watermarking algorithm to watermark JPEG2000 compressed and encrypted images. For encryption it uses RC6 block cipher. The method embeds watermark in the compressed- encrypted domain and extraction is done in the decrypted domain. The proposal also preserves the confidentiality of substance as the embedding is done on encrypted data. On the whole 3 watermarking schemes are used: Spread Spectrum, Scalar Costa Scheme Quantization Index Modulation, and Rational Dither Modulation.
Performance Evaluation & Design Methodologies for Automated 32 Bit CRC Checki...VIT-AP University
For design methodology of CRC or cyclic redundancy check is very used technique for error checking and shows the transmission reliability we are using the HDLC block. HDLC block is very useful in data communication these block operated in data link layer. For design methodology of CRC is to generate the CRC polynomial using XOR’s gate and shift register these polynomial are implement on software Xilinx Plan Ahead 13.1 and verify for simulation result for random testing of CRC bit on receiver side same result are obtained to show that it is more reliable.
A new dynamic speech encryption algorithm based on Lorenz chaotic map over in...IJECEIAES
This paper introduces a dynamic speech encryption algorithm based on Lorenz chaotic map over internet protocol to enhance the services of the real-time applications such as increases the security level and reduces latency. The proposed algorithm was divided into two processes: dynamic key generation process using 128-bit hash value to dynamically alter the initial secret keys, and encryption and decryption process using Lorenz system. In the proposed algorithm, the performance evaluation is carried out through efficient simulations and implementations and statistical analysis. In addition, the average time delay in the proposed algorithm and some of the existing algorithms such as AES is compared. The obtained results concluded that, the proposed dynamic speech encryption algorithm is effectually secured against various cryptanalysis attacks and has useful cryptographic properties such as confusion and diffusion for better voice communication in the voice applications field in the Internet.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
LDPC Encoding is explained in this ppt. for MATLAB code and more information you can visit link given below:
http://www.slideshare.net/bhagwatsinghmahecha/itc-final-report
Hardware Implementations of RS Decoding Algorithm for Multi-Gb/s Communicatio...RSIS International
In this paper, we have designed the VLSI hardware for a novel RS decoding algorithm suitable for Multi-Gb/s Communication Systems. Through this paper we show that the performance benefit of the algorithm is truly witnessed when implemented in hardware thus avoiding the extra processing time of Fetch-Decode-Execute cycle of traditional microprocessor based computing systems. The new algorithm with less time complexity combined with its application specific hardware implementation makes it suitable for high speed real-time systems with hard timing constraints. The design is implemented as a digital hardware using VHDL
Hardware implementation of aes encryption and decryption for low area & power...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Elliptic Curve based Authenticated Session Key Establishment Protocol for Hig...IJNSA Journal
The existing authenticated session key establishment protocols are either vulnerable to dictionary attack on identity privacy of a client or the methods adopted to resist this attack are found to be computationally inefficient. This paper proposes a new authenticated key establishment protocol which uses elliptic curve based DDH problem. The protocol provides identity privacy of the client in addition to the other security properties needed for a session key establishment protocol. In comparison with the existing protocols, the proposed protocol offers equivalent security with less parameters resulting in lower computational load, communication bandwidth cost, power consumption and memory requirement.
Similar to Executing Boolean Queries on an Encrypted Bitmap Index (20)
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
Executing Boolean Queries on an Encrypted Bitmap Index
1. Introduction Our BXT-Bitmap Scheme Security, Performance and Storage Analysis Conclusion
Executing Boolean Queries on an Encrypted
Bitmap Index
Mohamed Ahmed Abdelraheem1, Christian Gehrmann1, Malin
Lindstr¨om2 and Christian Nordahl2
1SICS Swedish ICT AB
2Blekinge Institute of Technology
CCSW 2016, Vienna
28 Oct 2016
1 / 24
2. Introduction Our BXT-Bitmap Scheme Security, Performance and Storage Analysis Conclusion
Data Breaches Everywhere
Figure 1: World’s Biggest Data Breaches
2 / 24
6. Introduction Our BXT-Bitmap Scheme Security, Performance and Storage Analysis Conclusion
Symmetric Searchable Encryption Schemes I
Threat Model
SSE schemes achieve (non)-adaptive security against an
honest-but-curious adversary.
Efficieny comes at the price of leakage
Access Pattern: size of the search result.
Search Pattern: whether two searches are similar.
Remark
Still better than DET and OPE schemes allowing leakage before
any queries which makes offline inference attacks possible.
6 / 24
7. Introduction Our BXT-Bitmap Scheme Security, Performance and Storage Analysis Conclusion
Symmetric Searchable Encryption Schemes II
Song et al. [2000] proposed the first practical SSE scheme.
Curtumola et al. [2006] and many other SSE schemes achieve
optimal search time (sublinear) using the inverted index.
Liesdonk et al. [2009] proposed the first dynamic SSE scheme
using a Bitmap index.
Cash et al. [2013] proposed the first sublinear scheme
supporting Boolean queries w1 ∧ f (w2, · · · , wt).
Remark
Our work is inspired by Cash et al BXT and OXT protocols.
7 / 24
8. Introduction Our BXT-Bitmap Scheme Security, Performance and Storage Analysis Conclusion
Our Contribution
First multi-keyword SSE scheme on an encrypted Bitmap Index:
Trade-off between: communication, performance, security.
Single-round communication.
Reasonable security targeting constrained environments.
Linear search but embarrassingly parallel.
Suitable for very large and dense datasets.
Remark
Final query result is decided at the Client. This makes our work
different than standard SSE schemes but yields efficiency and
security benefits.
8 / 24
9. Introduction Our BXT-Bitmap Scheme Security, Performance and Storage Analysis Conclusion
Cash et al interactive-BXT and OXT Protocols
Evaluate queries of the form w1 ∧ f (w2, ..., wt):
w1 (s-term) has low freq, other wi (x-terms) has larger freq.
Use an auxiliary set (XSet) beyond its main index (TSet).
Security Leakage:
Number of documents and number of keyword-docID pairs, N.
No intersection between s-terms (OXT).
Intersections between s-terms and nothing between x-terms
(interactive-BXT).
Cost:
Sublinear search time (optimal).
Communication and computation are high.
Storage is on the order of keyword-doc ID pairs (optimal but
not for BXT and OXT when used with dense datasets).
9 / 24
10. Introduction Our BXT-Bitmap Scheme Security, Performance and Storage Analysis Conclusion
Single Keyword on Encrypted Bitmap
Plaintext Bitmap Index
Each keyword wj is associated with a bit string holding an active
bit at index i iff the ith document or record contains wj .
Encrypted Bitmap Index (single keyword)
Each keyword wj is encrypted using DET encryption and its
associated Bitmap is one-time pad encrypted (Liesdonk et al).
w1 ∧ w2 on the above Encrypted Bitmap Index
Leaks the result set of w1 and the result set of w2.
Our Goal
Evaluate queries of the form w1 ∧ f (w2, ..., wt) using an encrypted
Bitmap Index with no leakage beyond the actual result set.
10 / 24
11. Introduction Our BXT-Bitmap Scheme Security, Performance and Storage Analysis Conclusion
BXT-Bitmap Encypted Database Setup
Assume n documents and m keywords. Each keyword wj has
Kj = PRF1(KI , wj ).
pointer pj to its corresponding encrypted Bitmap Be created
using a large key derived from Kj .
two secret tags (stag, xtag) whose hash value is stored in
two hash tables HTstag and HTxtag.
stag = PRF2(KS , wj ) = (KS1, KS2)
xtag = PRF2(KX , wj ) = (KX1, KX2)
Hash table’s elements (lj , dj )
HTstag : lj = hash(KS1) and dj = enc(KS2, pj ||Kj ).
HTxtag : lπ(j) = hash(KX1) and dπ(j) = enc(KX2, pj ).
size of each is O(m).
11 / 24
13. Introduction Our BXT-Bitmap Scheme Security, Performance and Storage Analysis Conclusion
Conjunctive Search Process w1 ∧ w2 ∧ · · · ∧ wt (I)
Client (w1 ∧ · · · ∧ wt, KS , KX ):
stag → PRF2(KS , w1) = (KS1, KS2).
xtagj → PRF2(KX , wj ) = (KXj1 , KXj2 ), j ≥ 2.
Send stag and all xtagj to Server.
Server (Be, HStag, HXtag, stag, xtagj ):
Use stag and HStag to retrieve result set RS of w1 from Be.
Use xtagi and HXtag to find pointerxtagj to access Be.
For each idi ∈ RS: send the bit Be[pointerxtagj , idi ] to Client.
Client (Be[pointerxtagj , idi ], idi ∈ RS):
For each (idi , xtagj ), find vj = Dec(Be[pointerxtagj , idi ]).
Retrieve document idi if all vj are active bits.
13 / 24
14. Introduction Our BXT-Bitmap Scheme Security, Performance and Storage Analysis Conclusion
Conjunctive Search Process w1 ∧ w2 ∧ · · · ∧ wt (II)
Single-round communication
Different than standard SSE schemes where Server determines final
result set. But secure and suitable for constrained settings.
More than one-round communication
Allowing the Server to determine final result comes at the cost of
more info leakage and communication rounds with the Client.
14 / 24
15. Introduction Our BXT-Bitmap Scheme Security, Performance and Storage Analysis Conclusion
Security Analysis I
Our solution does not reveal:
direct intersections between x-terms.
intersection between an s-term and any subset of the x-terms
within same query.
But reveals only intersection between the s-terms.
Avoid s-terms Intersection?
During setup the client permutes the document identifiers for each
keyword using a pseudorandom permutation with a unique secret
key specifically generated for each keyword.
Unavoidable Access Pattern Leakage
During retrieval process the index server will be able to know the
intersection between s-terms unless access pattern is hidden or the
index server and retrieval server have no communication.
15 / 24
16. Introduction Our BXT-Bitmap Scheme Security, Performance and Storage Analysis Conclusion
Security Analysis II
Our scheme leaks:
Number of documents n.
Number of unique keywords m.
Size of the s-term w1.
Search pattern.
Intersection between s-terms.
and has no other leakage beyond what can be deduced from the
specified leakage.
Security level
At least the same level of security achieved by Cash et al’s
interactive BXT protocol.
16 / 24
17. Introduction Our BXT-Bitmap Scheme Security, Performance and Storage Analysis Conclusion
Performance Compared to Cash et al Protocols
Protocol Communication Size No of Rounds Computations Search
Ours (t − 1) · s 1 n xor, n/b hash O(n)
I. BXT (t − 1) · s · |f | (t − 1) · s s Decryptions s
OXT (t − 1) · s · |G| 1 (t − 1) · s Exp. s
Table 4: s ≡ number of document identifiers corresponding to the s-term.
t ≡ number of terms. b ≡ output size of hash func used during key gen.
|f | ≡ the output size of f (xtrapi , ind) in bits. |G| ≡ the size of the group
elements in bits where the group G satisfies the decision Diffie-Hellman
(DDH) assumption).
17 / 24
18. Introduction Our BXT-Bitmap Scheme Security, Performance and Storage Analysis Conclusion
Storage Compared to Cash et al Protocols (Census)
n 100,000 150,000 200,000 250,000 299,285
N 3,792,048 5,686,907 7,582,582 9,478,817 11,347,304
HTstag/HTxtag 0.16 0.19 0.20 0.21 0.22
Bitmaps 36 62 90 119 149
Est. TSet (BXT) 122 183 244 305 365
Table 5: Storage results in MB for the Census data set, for subsets from
100,000 to 299,285 rows and 41 columns, and the estimated storage of
the TSet. Note that n denotes the number of documents while N denotes
the size (total number of keyword occurrences) of the Census dataset.
Remark
Minimal size of each TSet entry under the BXT protocol is 257 bits and more
than that for OXT.
18 / 24
19. Introduction Our BXT-Bitmap Scheme Security, Performance and Storage Analysis Conclusion
Storage Compared to Cash et al Protocols (Enron)
n 100,000 200,000 300,000 400,000
N 14,352,245 26,509,765 43,529,924 57,516,347
HTstag/HTxtag 7 10 17 25
Bitmaps 1582 4414 11446 22124
Est. TSet (BXT) 461 851 1398 1848
Table 6: Storage results in MB for the Enron data set, for subsets from
100,000 to 400,000 documents, and the estimated storage of the TSet.
19 / 24
20. Introduction Our BXT-Bitmap Scheme Security, Performance and Storage Analysis Conclusion
Single Vs Conjunctive
100 150 200 250 300
0
50
100
150
Number of documents, x1000
Time(ms)
w1
w1 ∧ w2
Figure 4: Single Keyword vs Conjunctive Keyword (Census)
20 / 24
21. Introduction Our BXT-Bitmap Scheme Security, Performance and Storage Analysis Conclusion
Conjunctive Search depends on the s-term
10 100 1000 10000 100000
0
50
100
150
Frequency of keyword
Time(ms)
L ∧ V
V ∧ H
V
Figure 5: End-to-end execution time for the Census data set, 299,285
documents. H denotes a term with high frequency, L denotes a term with
low frequency and V denotes the term that varies in frequency.
21 / 24
22. Introduction Our BXT-Bitmap Scheme Security, Performance and Storage Analysis Conclusion
Number of x-terms does not affect search time
2 3 4 5
0
50
100
150
Number of x-terms
Time(ms)
Figure 6: End-to-end execution time for the non-interactive conjunctive
search on the complete Census data set with a growing number of
x-terms. The s-term has low frequency and the frequency of the x-terms
varies between 4,177 and 100,955.
22 / 24
23. Introduction Our BXT-Bitmap Scheme Security, Performance and Storage Analysis Conclusion
Conclusion
Proposed a secure multi-keyword SSE scheme.
Practical in limited communication and computation settings.
Suitable for very dense datasets.
Encrypted Bitmap is also efficient in processing Boolean
queries similar to plaintext Bitmap index.
Combining an inverted index with a Bitmap index in one
length-hiding index would yield better time-storage trade-off.
23 / 24
24. Introduction Our BXT-Bitmap Scheme Security, Performance and Storage Analysis Conclusion
Thank you for your attention
24 / 24