Refined statistical attacks against searchable symmetric encryption using non-indexed documents

被引:0
|
作者
Du, Ruizhong [1 ,2 ]
Tai, Yuchi [1 ,2 ,3 ]
Li, Mingyue [1 ,2 ]
机构
[1] Hebei Univ, Sch Cyber Secur & Comp, Baoding 071002, Peoples R China
[2] Hebei Univ, Hebei Prov Key Lab High Confidence Informat Syst, Baoding 071002, Peoples R China
[3] Hebei Univ, Coll Cyberspace Secur & Comp, East Qiyi Rd 2666, Baoding 071002, Peoples R China
关键词
Leakage abuse attack; Pattern leakage; Symmetric searchable encryption; LEAKAGE;
D O I
10.1016/j.jisa.2023.103652
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Searchable symmetric encryption(SSE) schemes allow clients to search encrypted data stored on remote servers but ensure efficient retrieval by revealing specific information about the queries, such as access patterns. Honest but curious servers can then use these leakages to infer keywords queried by users. However, most attack schemes can only achieve considerable recovery accuracy(over 30%) under favorable conditions. When the auxiliary information is weak, the inference attack schemes using statistical information can achieve the same or even better recovery accuracy. In this paper, an attack based on statistical information is proposed. Our attack iteratively solves the quadratic recovery query problem using a linear optimization solver. With a tiny number of known queries(which can be deleted by the server), the query recovery accuracy can reach about 95% without knowing the exact background knowledge of the documents stored by the client. This process not only makes our scheme outperforms other attack schemes in accuracy but also makes our attack execution more efficient than other schemes, up to a maximum difference of 1000 seconds. The attack can still achieve considerable accuracy even when the defense is applied to the SSE scheme; defenses can help the SSE scheme obfuscate the pattern leakages.
引用
收藏
页数:11
相关论文
共 50 条
  • [21] Cetus: an efficient symmetric searchable encryption against file-injection attack with SGX
    Huang, Yanyu
    Lv, Siyi
    Liu, Zheli
    Song, Xiangfu
    Li, Jin
    Yuan, Yali
    Dong, Changyu
    SCIENCE CHINA-INFORMATION SCIENCES, 2021, 64 (08)
  • [22] Cetus: an efficient symmetric searchable encryption against file-injection attack with SGX
    Yanyu Huang
    Siyi Lv
    Zheli Liu
    Xiangfu Song
    Jin Li
    Yali Yuan
    Changyu Dong
    Science China Information Sciences, 2021, 64
  • [23] Cetus: an efficient symmetric searchable encryption against file-injection attack with SGX
    Yanyu HUANG
    Siyi LV
    Zheli LIU
    Xiangfu SONG
    Jin LI
    Yali YUAN
    Changyu Dong
    Science China(Information Sciences), 2021, 64 (08) : 195 - 212
  • [24] The performance cost of preserving data/query privacy using searchable symmetric encryption
    Mc Brearty, Shaun
    Farrelly, William
    Curran, Kevin
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 5311 - 5332
  • [25] Secure query processing for smart grid data using searchable symmetric encryption
    Souror, Samia
    Badawy, Mohammed
    El-Fishawy, Nawal
    JOURNAL OF SUPERCOMPUTING, 2024, 80 (16): : 24173 - 24211
  • [26] Countering Statistical Attacks in Cloud-Based Searchable Encryption (vol 48, pg 470, 2020)
    Ahsan, M. A. Manazir
    Ali, Ihsan
    Bin Idris, Mohd Yamani Idna
    Imran, Muhammad
    Shoaib, Muhammad
    INTERNATIONAL JOURNAL OF PARALLEL PROGRAMMING, 2020, 48 (03) : 580 - 580
  • [27] An approach for symmetric encryption against side channel attacks in provable security
    Li, Wei
    Gu, Dawu
    PROVABLE SECURITY, PROCEEDINGS, 2007, 4784 : 178 - +
  • [28] Improved File-injection Attacks on Searchable Encryption Using Finite Set Theory
    Wang, Gaoli
    Cao, Zhenfu
    Dong, Xiaolei
    COMPUTER JOURNAL, 2021, 64 (08): : 1264 - 1276
  • [29] Secure searchable public key encryption against insider keyword guessing attacks from indistinguishability obfuscation
    Lixue SUN
    Chunxiang XU
    Mingwu ZHANG
    Kefei CHEN
    Hongwei LI
    Science China(Information Sciences), 2018, 61 (03) : 228 - 230
  • [30] An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks
    Huang, Qiong
    Li, Hongbo
    INFORMATION SCIENCES, 2017, 403 : 1 - 14