Refined statistical attacks against searchable symmetric encryption using non-indexed documents

被引:0
|
作者
Du, Ruizhong [1 ,2 ]
Tai, Yuchi [1 ,2 ,3 ]
Li, Mingyue [1 ,2 ]
机构
[1] Hebei Univ, Sch Cyber Secur & Comp, Baoding 071002, Peoples R China
[2] Hebei Univ, Hebei Prov Key Lab High Confidence Informat Syst, Baoding 071002, Peoples R China
[3] Hebei Univ, Coll Cyberspace Secur & Comp, East Qiyi Rd 2666, Baoding 071002, Peoples R China
关键词
Leakage abuse attack; Pattern leakage; Symmetric searchable encryption; LEAKAGE;
D O I
10.1016/j.jisa.2023.103652
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Searchable symmetric encryption(SSE) schemes allow clients to search encrypted data stored on remote servers but ensure efficient retrieval by revealing specific information about the queries, such as access patterns. Honest but curious servers can then use these leakages to infer keywords queried by users. However, most attack schemes can only achieve considerable recovery accuracy(over 30%) under favorable conditions. When the auxiliary information is weak, the inference attack schemes using statistical information can achieve the same or even better recovery accuracy. In this paper, an attack based on statistical information is proposed. Our attack iteratively solves the quadratic recovery query problem using a linear optimization solver. With a tiny number of known queries(which can be deleted by the server), the query recovery accuracy can reach about 95% without knowing the exact background knowledge of the documents stored by the client. This process not only makes our scheme outperforms other attack schemes in accuracy but also makes our attack execution more efficient than other schemes, up to a maximum difference of 1000 seconds. The attack can still achieve considerable accuracy even when the defense is applied to the SSE scheme; defenses can help the SSE scheme obfuscate the pattern leakages.
引用
收藏
页数:11
相关论文
共 50 条
  • [1] A Highly Accurate Query-Recovery Attack against Searchable Encryption using Non-Indexed Documents
    Damie, Marc
    Hahn, Florian
    Peter, Andreas
    PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, 2021, : 143 - 160
  • [2] Passive Attacks Against Searchable Encryption
    Ning, Jianting
    Xu, Jia
    Liang, Kaitai
    Zhang, Fan
    Chang, Ee-Chien
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (03) : 789 - 802
  • [3] Leakage-Abuse Attacks Against Forward and Backward Private Searchable Symmetric Encryption
    Xu, Lei
    Zheng, Leqian
    Xu, Chengzhi
    Yuan, Xingliang
    Wang, Cong
    PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 3003 - 3017
  • [4] POSTER: Inference Attacks against Searchable Encryption Protocols
    Islam, Mohammad Saiful
    Kuzu, Mehmet
    Kantarcioglu, Murat
    PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 845 - 847
  • [5] Leakage-Abuse Attacks Against Searchable Encryption
    Cash, David
    Grubbs, Paul
    Perry, Jason
    Ristenpart, Thomas
    CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 668 - 679
  • [6] Countering Statistical Attacks in Cloud-Based Searchable Encryption
    M. A. Manazir Ahsan
    Ihsan Ali
    Mohd Yamani Idna Bin Idris
    Muhammad Imran
    Muhammad Shoaib
    International Journal of Parallel Programming, 2020, 48 : 470 - 495
  • [7] IHOP: Improved Statistical Query Recovery against Searchable Symmetric Encryption through Quadratic Optimization
    Oya, Simon
    Kerschbaum, Florian
    PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, 2022, : 2407 - 2424
  • [8] Interpreting and Mitigating Leakage-Abuse Attacks in Searchable Symmetric Encryption
    Xu, Lei
    Duan, Huayi
    Zhou, Anxin
    Yuan, Xingliang
    Wang, Cong
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 5310 - 5325
  • [9] Practical searchable encryption scheme against response identity attacks
    Li, Shengming
    Jing, Xuan
    Wang, Yunling
    Xu, Xin
    Zhang, Zichen
    Wang, Jianfeng
    INFORMATION SCIENCES, 2025, 706
  • [10] Query recovery attacks against conjunctive keyword searchable encryption
    Du, Ruiying
    Shen, Bei
    He, Kun
    Zhao, Chenbin
    Wang, Beining
    Chen, Jing
    Tongxin Xuebao/Journal on Communications, 2024, 45 (08): : 125 - 135