Refined statistical attacks against searchable symmetric encryption using non-indexed documents

被引:0
|
作者
Du, Ruizhong [1 ,2 ]
Tai, Yuchi [1 ,2 ,3 ]
Li, Mingyue [1 ,2 ]
机构
[1] Hebei Univ, Sch Cyber Secur & Comp, Baoding 071002, Peoples R China
[2] Hebei Univ, Hebei Prov Key Lab High Confidence Informat Syst, Baoding 071002, Peoples R China
[3] Hebei Univ, Coll Cyberspace Secur & Comp, East Qiyi Rd 2666, Baoding 071002, Peoples R China
关键词
Leakage abuse attack; Pattern leakage; Symmetric searchable encryption; LEAKAGE;
D O I
10.1016/j.jisa.2023.103652
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Searchable symmetric encryption(SSE) schemes allow clients to search encrypted data stored on remote servers but ensure efficient retrieval by revealing specific information about the queries, such as access patterns. Honest but curious servers can then use these leakages to infer keywords queried by users. However, most attack schemes can only achieve considerable recovery accuracy(over 30%) under favorable conditions. When the auxiliary information is weak, the inference attack schemes using statistical information can achieve the same or even better recovery accuracy. In this paper, an attack based on statistical information is proposed. Our attack iteratively solves the quadratic recovery query problem using a linear optimization solver. With a tiny number of known queries(which can be deleted by the server), the query recovery accuracy can reach about 95% without knowing the exact background knowledge of the documents stored by the client. This process not only makes our scheme outperforms other attack schemes in accuracy but also makes our attack execution more efficient than other schemes, up to a maximum difference of 1000 seconds. The attack can still achieve considerable accuracy even when the defense is applied to the SSE scheme; defenses can help the SSE scheme obfuscate the pattern leakages.
引用
收藏
页数:11
相关论文
共 50 条
  • [31] Secure searchable public key encryption against insider keyword guessing attacks from indistinguishability obfuscation
    Sun, Lixue
    Xu, Chunxiang
    Zhang, Mingwu
    Chen, Kefei
    Li, Hongwei
    SCIENCE CHINA-INFORMATION SCIENCES, 2018, 61 (03)
  • [32] High Recovery with Fewer Injections: Practical Binary Volumetric Injection Attacks against Dynamic Searchable Encryption
    Zhang, Xianglong
    Wang, Wei
    Xu, Peng
    Yang, Laurence T.
    Liang, Kaitai
    PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 5953 - 5970
  • [33] Secure searchable public key encryption against insider keyword guessing attacks from indistinguishability obfuscation
    Lixue Sun
    Chunxiang Xu
    Mingwu Zhang
    Kefei Chen
    Hongwei Li
    Science China Information Sciences, 2018, 61
  • [34] Efficient public-key searchable encryption against inside keyword guessing attacks for cloud storage
    Wu, Axin
    Li, Fagen
    Xin, Xiangjun
    Zhang, Yinghui
    Zhu, Jianhao
    JOURNAL OF SYSTEMS ARCHITECTURE, 2024, 149
  • [35] Experimental Evaluation of Forward Secure Dynamic Symmetric Searchable Encryption using the Searchitect Framework
    Kramer, Ines
    Schmidt, Silvia
    Koschuch, Manuel
    Tausig, Mathias
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, BIG DATA AND SECURITY (IOTBDS), 2020, : 25 - 35
  • [36] Designated-Senders Public-Key Searchable Encryption Secure against Keyword Guessing Attacks
    Saito, Takanori
    Nakanishi, Toru
    2017 FIFTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING (CANDAR), 2017, : 496 - 502
  • [37] Certificateless searchable public key encryption scheme secure against keyword guessing attacks for smart healthcare
    Ma, Mimi
    He, Debiao
    Fan, Shuqin
    Feng, Dengguo
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 50 (50)
  • [38] Space-Efficient and Secure Substring Searchable Symmetric Encryption Using an Improved DAWG
    Yamamoto, Hiroaki
    Wachi, Yoshihiro
    Fujiwara, Hiroshi
    PROVABLE SECURITY, PROVSEC 2019, 2019, 11821 : 130 - 148
  • [39] Symmetric Searchable Encryption for Exact Pattern Matching using Directed Acyclic Word Graphs
    Haynberg, Rolf
    Rill, Jochen
    Achenbach, Dirk
    Mueller-Quade, Joern
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT 2013), 2013, : 403 - 410
  • [40] Non-Interactive Multi-Client Searchable Symmetric Encryption With Small Client Storage
    Zhang, Hanqi
    Xu, Chang
    Lu, Rongxing
    Zhu, Liehuang
    Zhang, Chuan
    Guan, Yunguo
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (06) : 3972 - 3985