Passive Attacks Against Searchable Encryption

被引:72
|
作者
Ning, Jianting [1 ]
Xu, Jia [2 ]
Liang, Kaitai [3 ]
Zhang, Fan [4 ,5 ,6 ]
Chang, Ee-Chien [1 ]
机构
[1] Natl Univ Singapore, Dept Comp Sci, Singapore 117417, Singapore
[2] NUS, Singtel Cyber Secur Res & Dev Lab, Singapore 117602, Singapore
[3] Univ Surrey, Dept Comp Sci, Guildford GU2 7XH, Surrey, England
[4] Zhejiang Univ, Coll Informat Sci & Elect Engn, Hangzhou 310027, Zhejiang, Peoples R China
[5] Zhejiang Univ, Inst Cyber Secur Res, Hangzhou 310027, Zhejiang, Peoples R China
[6] Natl Univ Singapore, Sch Comp, Singapore 117417, Singapore
基金
英国工程与自然科学研究理事会; 中国国家自然科学基金; 新加坡国家研究基金会;
关键词
Searchable symmetric encryption; passive attacks; search query privacy; leakage of file-access pattern;
D O I
10.1109/TIFS.2018.2866321
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Searchable encryption (SE) provides a privacy-preserving mechanism for data users to search over encrypted data stored on a remote server. Researchers have designed a number of SE schemes with high efficiency yet allowing some degree of leakage profile to the remote server. The leakage, however, should be further measured to allow us to understand what types of attacks an SE scheme would encounter. This paper considers passive attacks that make inferences based on prior knowledge and observations on queries issued by users. This is in contrast to previously studied active attacks that adaptively inject files and queries. We consider several assumptions on the types or prior knowledge the attacker possessed and propose a few passive attacks. In particular, under the "full-fledged" assumption, the keyword recovery rate of our attack is optimal in the sense that it is equal to the theoretical upper bound. We further present several enhanced attacks under other weaker assumptions on various levels of the prior knowledge that the attacker can obtain, in which the keyword recovery rates are optimal or nearly optimal (i.e., approaching the theoretical upper bound). In addition, we provide extensive experiments to show the "power" of our passive attacks. This paper highlights the importance of minimizing the prior knowledge of a server and the leakage of search queries. It also shows that simply distorting the frequency of the keyword to hold against our passive attacks may not scale well.
引用
收藏
页码:789 / 802
页数:14
相关论文
共 50 条
  • [1] POSTER: Inference Attacks against Searchable Encryption Protocols
    Islam, Mohammad Saiful
    Kuzu, Mehmet
    Kantarcioglu, Murat
    PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 845 - 847
  • [2] Leakage-Abuse Attacks Against Searchable Encryption
    Cash, David
    Grubbs, Paul
    Perry, Jason
    Ristenpart, Thomas
    CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 668 - 679
  • [3] Practical searchable encryption scheme against response identity attacks
    Li, Shengming
    Jing, Xuan
    Wang, Yunling
    Xu, Xin
    Zhang, Zichen
    Wang, Jianfeng
    INFORMATION SCIENCES, 2025, 706
  • [4] Query recovery attacks against conjunctive keyword searchable encryption
    Du, Ruiying
    Shen, Bei
    He, Kun
    Zhao, Chenbin
    Wang, Beining
    Chen, Jing
    Tongxin Xuebao/Journal on Communications, 2024, 45 (08): : 125 - 135
  • [5] Public key authenticated searchable encryption against frequency analysis attacks
    Cheng, Leixiao
    Meng, Fei
    INFORMATION SCIENCES, 2023, 640
  • [6] Searchable encryption approaches: attacks and challenges
    D. V. N. Siva Kumar
    P. Santhi Thilagam
    Knowledge and Information Systems, 2019, 61 : 1179 - 1207
  • [7] Searchable encryption approaches: attacks and challenges
    Kumar, D. V. N. Siva
    Thilagam, P. Santhi
    KNOWLEDGE AND INFORMATION SYSTEMS, 2019, 61 (03) : 1179 - 1207
  • [8] An efficient and secure certificateless searchable encryption scheme against keyword guessing attacks
    Senouci, Mohammed Raouf
    Benkhaddra, Ilyas
    Senouci, Abdelkader
    Li, Fagen
    JOURNAL OF SYSTEMS ARCHITECTURE, 2021, 119
  • [9] Secure searchable public key encryption scheme against keyword guessing attacks
    Rhee, Hyun Sook
    Susilo, Willy
    Kim, Hyun-Jeong
    IEICE ELECTRONICS EXPRESS, 2009, 6 (05): : 237 - 243
  • [10] A Fast Public Key Searchable Encryption Scheme Against Inside Keyword Attacks
    Liu, Can
    Chen, Ningjiang
    Huang, Ruwei
    Xie, Yongsheng
    COMPUTER SUPPORTED COOPERATIVE WORK AND SOCIAL COMPUTING, CHINESECSCW 2019, 2019, 1042 : 50 - 64