Preserving Access Pattern Privacy in SGX-Assisted Encrypted Search

被引:0
|
作者
Cui, Shujie [1 ]
Belguith, Sana [1 ]
Zhang, Ming [1 ]
Asghar, Muhammad Rizwan [1 ]
Russello, Giovanni [1 ]
机构
[1] Univ Auckland, Cyber Secur Foundry, Auckland, New Zealand
关键词
ATTACKS;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Outsourcing sensitive data and operations to un-trusted cloud providers is considered a challenging issue. To perform a search operation, even if both the data and the query are encrypted, attackers still can learn which data locations match the query and what results are returned to the user. This kind of leakage is referred to as data access pattern. Indeed, using access pattern leakage, attackers can easily infer the content of the data and the query. Oblivious RAM (ORAM), Fully Homomorphic Encryption (FHE), and secure Multi-Party Computation (MPC) offer a higher level of security but incur high computation and communication overheads. One promising practical approach to process the outsourced data efficiently and securely is leveraging trusted hardware like Intel SGX. Recently, several SGX-based solutions have been proposed in the literature. However, those solutions suffer from side channel attacks, high overheads of context switching, or limited SGX memory. In this paper, we present an SGX-assisted scheme for performing search over encrypted data. Our solution protects access pattern against side channel attacks while ensuring search efficiency. It can process large databases without requiring any long-term storage on SGX. We have implemented a prototype of the scheme and evaluated its performance using a dataset of 1 million records. The equality query can be completed in 9.55 milliseconds. Comparing with ORAM-based solutions, such as ObliDB, our scheme is more than 11x faster.
引用
收藏
页数:9
相关论文
共 50 条
  • [1] PRIVACY PRESERVING ENCRYPTED PHONETIC SEARCH OF SPEECH DATA
    Glackin, Cornelius
    Chollet, Gerard
    Dugan, Nazim
    Cannings, Nigel
    Wall, Julie
    Tahir, Shahzaib
    Ray, Indranil Ghosh
    Rajarajan, Muttukrishnan
    2017 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2017, : 6414 - 6418
  • [2] Privacy preserving pattern matching on remote encrypted data
    Oleshchuk, Vladimir
    IDAACS 2007: PROCEEDINGS OF THE 4TH IEEE WORKSHOP ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS, 2007, : 609 - 613
  • [3] Privacy preserving weighted similarity search scheme for encrypted data
    Guo, Cheng
    Tian, Pengxu
    Chang, Chin-Chen
    IET INFORMATION SECURITY, 2019, 13 (01) : 61 - 69
  • [4] Approaches and challenges of privacy preserving search over encrypted data
    Kumar, D. V. N. Siva
    Thilagam, P. Santhi
    INFORMATION SYSTEMS, 2019, 81 : 63 - 81
  • [5] Privacy Preserving Keyword Search over Encrypted Cloud Data
    Ananthi, S.
    Sendil, M. Sadish
    Karthik, S.
    ADVANCES IN COMPUTING AND COMMUNICATIONS, PT I, 2011, 190 : 480 - 487
  • [6] Efficient Privacy Preserving Ranked Search over Encrypted Data
    Praseed, Amit
    Sudheesh, Remya K.
    Chandrasekaran, K.
    PROCEEDINGS OF THE 2015 IEEE RECENT ADVANCES IN INTELLIGENT COMPUTATIONAL SYSTEMS (RAICS), 2015, : 128 - 133
  • [7] Privacy-preserving bidirectional keyword search over encrypted data for cloud-assisted IIoT
    Lee, Cheng-Yi
    Liu, Zi-Yuan
    Tso, Raylin
    Tseng, Yi-Fan
    JOURNAL OF SYSTEMS ARCHITECTURE, 2022, 130
  • [8] Privacy Preserving Time Efficient Access Control Aware Keyword Search Over Encrypted Data on Cloud Storage
    Shanthi, P.
    Umamakeswari, A.
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 109 (04) : 2133 - 2145
  • [9] PRESSGenDB: PRivacy-prEserving Substring Search on Encrypted Genomic DataBase
    Jafarbeiki, Sara
    Sakzad, Amin
    Kermanshahi, Shabnam Kasra
    Steinfeld, Ron
    Gaire, Raj
    IEEE INFOCOM 2022 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2022,
  • [10] Privacy-preserving conjunctive keyword search on encrypted data with enhanced fine-grained access control
    Qiang Cao
    Yanping Li
    Zhenqiang Wu
    Yinbin Miao
    Jianqing Liu
    World Wide Web, 2020, 23 : 959 - 989