{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T01:45:36Z","timestamp":1760147136343,"version":"build-2065373602"},"reference-count":34,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2023,1,12]],"date-time":"2023-01-12T00:00:00Z","timestamp":1673481600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"European Defence Industrial Development Programme (EDIDP)","award":["EDIDP-CSAMN-SSS-2019-006-PANDORA-SI2.835928"],"award-info":[{"award-number":["EDIDP-CSAMN-SSS-2019-006-PANDORA-SI2.835928"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>The sharing of cyberthreat information within a community or group of entities is possible due to solutions such as the Malware Information Sharing Platform (MISP). However, the MISP was considered limited if its information was deemed as classified or shared only for a given period of time. A solution using searchable encryption techniques that better control the sharing of information was previously proposed by the same authors. This paper describes a prototype implementation for two key functionalities of the previous solution, considering multiple entities sharing information with each other: the symmetric key generation of a sharing group and the functionality to update a shared index. Moreover, these functionalities are evaluated regarding their performance, and enhancements are proposed to improve the performance of the implementation regarding its execution time. As the main result, the duration of the update process was shortened from around 2922 s to around 302 s, when considering a shared index with 100,000 elements. From the security analysis performed, the implementation can be considered secure, thus confirming the secrecy of the exchanged nonces. The limitations of the current implementation are depicted, and future work is pointed out.<\/jats:p>","DOI":"10.3390\/s23020914","type":"journal-article","created":{"date-parts":[[2023,1,13]],"date-time":"2023-01-13T02:57:33Z","timestamp":1673578653000},"page":"914","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["On the Performance of Secure Sharing of Classified Threat Intelligence between Multiple Entities"],"prefix":"10.3390","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8420-3985","authenticated-orcid":false,"given":"Ricardo","family":"Fernandes","sequence":"first","affiliation":[{"name":"INESC TEC, 4200-465 Porto, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7763-0615","authenticated-orcid":false,"given":"Sylwia","family":"Bugla","sequence":"additional","affiliation":[{"name":"INESC TEC, 4200-465 Porto, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1856-6101","authenticated-orcid":false,"given":"Pedro","family":"Pinto","sequence":"additional","affiliation":[{"name":"INESC TEC, 4200-465 Porto, Portugal"},{"name":"Instituto Polit\u00e9cnico de Viana do Castelo, 4900-347 Viana do Castelo, Portugal"},{"name":"Instituto Universit\u00e1rio da Maia, 4475-690 Maia, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5583-5772","authenticated-orcid":false,"given":"Ant\u00f3nio","family":"Pinto","sequence":"additional","affiliation":[{"name":"INESC TEC, 4200-465 Porto, Portugal"},{"name":"Centro de Inova\u00e7\u00e3o e Investiga\u00e7\u00e3o em Ci\u00eancias Empresariais e Sistemas de Informa\u00e7\u00e3o, Escola Superior de Tecnologia e Gest\u00e3o, Instituto Polit\u00e9cnico do Porto, 4610-156 Felgueiras, Portugal"}]}],"member":"1968","published-online":{"date-parts":[[2023,1,12]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Wagner, C., Dulaunoy, A., Wagener, G., and Iklody, A. (2016, January 24). MISP: The Design and Implementation of a Collaborative Threat Intelligence Sharing Platform. Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security, WISCS\u201916, Vienna, Austria.","DOI":"10.1145\/2994539.2994542"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Fernandes, R., Pinto, P., and Pinto, A. (2021, January 7\u201310). Controlled and Secure Sharing of Classified Threat Intelligence between Multiple Entities. Proceedings of the 2021 IEEE International Mediterranean Conference on Communications and Networking (MeditCom), Athens, Greece.","DOI":"10.1109\/MeditCom49071.2021.9647616"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"212","DOI":"10.1016\/j.cose.2017.09.001","article-title":"A survey on technical threat intelligence in the age of sophisticated cyber attacks","volume":"72","author":"Tounsi","year":"2018","journal-title":"Comput. Secur."},{"key":"ref_4","unstructured":"Technology, N. (2016). Guide to Cyber Threat Information Sharing: NiST SP 800-150, CreateSpace Independent Publishing Platform."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1007\/BF03391580","article-title":"Secure searchable encryption: A survey","volume":"1","author":"Wang","year":"2016","journal-title":"J. Commun. Inf. Netw."},{"key":"ref_6","unstructured":"Song, D.X., Wagner, D., and Perrig, A. (2000, January 14\u201317). Practical techniques for searches on encrypted data. Proceedings of the 2000 IEEE Symposium on Security and Privacy, S&P 2000, Berkeley, CA, USA."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1016\/j.is.2018.11.004","article-title":"Approaches and challenges of privacy preserving search over encrypted data","volume":"81","year":"2019","journal-title":"Inf. Syst."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"147420","DOI":"10.1109\/ACCESS.2019.2946185","article-title":"Privacy Protection and Data Security in Cloud Computing: A Survey, Challenges, and Solutions","volume":"7","author":"Sun","year":"2019","journal-title":"IEEE Access"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"e5284","DOI":"10.1002\/cpe.5284","article-title":"Survey on secure search over encrypted data on the cloud","volume":"31","author":"Pham","year":"2019","journal-title":"Concurr. Comput. Pract. Exp."},{"key":"ref_10","unstructured":"Curtmola, R., Garay, J., Kamara, S., and Ostrovsky, R. (November, January 30). Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions. Proceedings of the 13th ACM conference on Computer and Communications Security, Alexandria, VA, USA."},{"key":"ref_11","first-page":"18","article-title":"A Survey of Provably Secure Searchable Encryption","volume":"47","author":"Hartel","year":"2014","journal-title":"ACM Comput. Surv."},{"key":"ref_12","unstructured":"Goh, E.J. (2022, November 14). Secure Indexes. Cryptology ePrint Archive, Paper 2003\/216. Available online: https:\/\/eprint.iacr.org\/2003\/216."},{"key":"ref_13","unstructured":"Jonker, W., and Petkovi\u0107, M. (2010, January 17). Computationally Efficient Searchable Symmetric Encryption. Proceedings of the Secure Data Management, Singapore."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Kamara, S., Papamanthou, C., and Roeder, T. (2012, January 16\u201318). Dynamic Searchable Symmetric Encryption. Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS\u201912, Raleigh, NC, USA.","DOI":"10.1145\/2382196.2382298"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Stefanov, E., Papamanthou, C., and Shi, E. (2014, January 23\u201326). Practical Dynamic Searchable Encryption with Small Leakage. Proceedings of the 2014 Network and Distributed System Security Symposium, San Diego, CA, USA.","DOI":"10.14722\/ndss.2014.23298"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Li, J., Wang, Q., Wang, C., Cao, N., Ren, K., and Lou, W. (2010, January 14\u201319). Fuzzy Keyword Search over Encrypted Data in Cloud Computing. Proceedings of the IEEE INFOCOM 2010, San Diego, CA, USA.","DOI":"10.1109\/INFCOM.2010.5462196"},{"key":"ref_17","unstructured":"Kementsietsidis, A., and Salles, M.A.V. (2012, January 1\u20135). Efficient Similarity Search over Encrypted Data. Proceedings of the IEEE 28th International Conference on Data Engineering (ICDE 2012), Arlington, VA, USA."},{"key":"ref_18","unstructured":"Jakobsson, M., Yung, M., and Zhou, J. (2004, January 8\u201311). Secure Conjunctive Keyword Search over Encrypted Data. Proceedings of the Applied Cryptography and Network Security, Yellow Mountain, China."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Orencik, C., Kantarcioglu, M., and Savas, E. (July, January 28). A Practical and Secure Multi-keyword Search Method over Encrypted Cloud Data. Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA.","DOI":"10.1109\/CLOUD.2013.18"},{"key":"ref_20","unstructured":"Pang, H., and Tan, K.L. (2004, January 2). Authenticating query results in edge computing. Proceedings of the 20th International Conference on Data Engineering, Boston, MA, USA."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Tang, Y., Gu, D., Ding, N., and Lu, H. (2012, January 18\u201321). Phrase Search over Encrypted Data with Symmetric Encryption Scheme. Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China.","DOI":"10.1109\/ICDCSW.2012.89"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"561","DOI":"10.1109\/TPDS.2020.3027003","article-title":"Privacy-Preserving Multi-Keyword Searchable Encryption for Distributed Systems","volume":"32","author":"Liu","year":"2021","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_23","first-page":"40","article-title":"Searchable Symmetric Encryption: Designs and Challenges","volume":"50","author":"Poh","year":"2017","journal-title":"ACM Comput. Surv."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Zhou, Y., Li, N., Tian, Y., An, D., and Wang, L. (2020). Public Key Encryption with Keyword Search in Cloud: A Survey. Entropy, 22.","DOI":"10.3390\/e22040421"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Cachin, C., and Camenisch, J.L. (2004, January 2\u20136). Public Key Encryption with Keyword Search. Proceedings of the Advances in Cryptology\u2014EUROCRYPT 2004, Interlaken, Switzerland.","DOI":"10.1007\/b97182"},{"key":"ref_26","unstructured":"Smart, N. (2008, January 13\u201317). Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products. Proceedings of the Advances in Cryptology\u2014EUROCRYPT 2008, Istanbul, Turkey."},{"key":"ref_27","unstructured":"Park, D.J., Kim, K., and Lee, P.J. (2004, January 23\u201325). Public Key Encryption with Conjunctive Field Keyword Search. Proceedings of the 5th International Workshop, WISA 2004, Jeju Island, Republic of Korea."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"1877","DOI":"10.1109\/TSC.2019.2903502","article-title":"Practical Multi-Keyword and Boolean Search Over Encrypted E-mail in Cloud Server","volume":"14","author":"Xu","year":"2021","journal-title":"IEEE Trans. Serv. Comput."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"1080","DOI":"10.1109\/TDSC.2019.2897675","article-title":"Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting","volume":"18","author":"Miao","year":"2021","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"3712","DOI":"10.1109\/TII.2017.2784395","article-title":"Lightweight Searchable Public-Key Encryption for Cloud-Assisted Wireless Sensor Networks","volume":"14","author":"Xu","year":"2018","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"122078","DOI":"10.1109\/ACCESS.2019.2937846","article-title":"Searchable Public Key Encryption Supporting Semantic Multi-Keywords Search","volume":"7","author":"Zhang","year":"2019","journal-title":"IEEE Access"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"993","DOI":"10.1145\/359657.359659","article-title":"Using encryption for authentication in large networks of computers","volume":"21","author":"Needham","year":"1978","journal-title":"Commun. ACM"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Armando, A., Basin, D., Boichut, Y., Chevalier, Y., Compagna, L., Cu\u00e9llar, J., Drielsma, P.H., H\u00e9am, P.C., Kouchnarenko, O., and Mantovani, J. (2005, January 6\u201310). The AVISPA tool for the automated validation of internet security protocols and applications. Proceedings of the International Conference on Computer Aided Verification, Edinburgh, UK.","DOI":"10.1007\/11513988_27"},{"key":"ref_34","unstructured":"Von Oheimb, D. (2005, January 13). The high-level protocol specification language HLPSL developed in the EU project AVISPA. Proceedings of the APPSEM 2005 Workshop, APPSEM\u201905, Tallinn, Estonia."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/2\/914\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T18:04:45Z","timestamp":1760119485000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/2\/914"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,12]]},"references-count":34,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2023,1]]}},"alternative-id":["s23020914"],"URL":"https:\/\/doi.org\/10.3390\/s23020914","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2023,1,12]]}}}