Currently, file hosting services such as Dropbox and Google Drive are widely adopted for file storing and sharing. In addition to these basic functionalities, some services provide additional functionalities such as keyword search and statistical analysis of text documents, requiring more complex server-side processing on the data. While the server-side data processing enables easier scalability independent of the client, it also requires the data to be unencrypted while being processed. However, this data could be highly sensitive and often contains personal information, which should not be revealed to the service provider.
Searchable encryption (see, e.g., the survey ) allows selective search over the encrypted data, but might leak certain details in real-world . Another approach is to secret share the data and distribute it over multiple file hosting services, where the data can now be processed using secure multi-party computation (MPC) techniques. Although the total overhead for using MPC might be greater compared to the solutions based on searchable encryption, leakage of data can be prevented in MPC. Also, we can hide the search query completely from the service providers and even extend the functionalities easily.
The first goal of this thesis is to survey the well-known file hosting services and their search capabilities. The next goal is to provide a proof-of-concept (PoC) implementation, which allows a client to secret share and retrieve its data to multiple existing file hosting services, such as Dropbox and Google Drive. Finally, the thesis aims to show how special file hosting services could provide efficient search functionality to the clients using the state-of-the-art MPC framework MOTION .
- Good programming skills in C/C++
- At least basic knowledge of cryptography
- Basic knowledge of secure multi-party computation is beneficial
- High motivation + ability to work independently
- Knowledge of the English language, Git, LaTeX, etc. goes without saying
-  B. Fuller, M. Varia, A. Yerukhimovich, E. Shen, A. Hamlin, V. Gadepally, R. Shay, J. D. Mitchell, and R. K. Cunningham. SoK: Cryptographically protected database search. In S&P, 2017.
-  S. Kamara, A. Kati, T. Moataz, T. Schneider, A. Treiber, and M. Yonli. Cryptanalysis of encrypted search with LEAKER – A framework for LEakage AttacK Evaluation on Real-world data. In ePrint, 2021.
-  L. Braun, D. Demmler, T. Schneider, and O. Tkachenko. MOTION – A framework for mixed-protocol multi-party computation. In ePrint, 2020.
-  Han F, Qin J, Hu J. Secure searches in the cloud: A survey. Future Generation Computer Systems. 2016 Sep 1;62:66-75.