Passive Attacks Against Searchable Encryption

被引:72
|
作者
Ning, Jianting [1 ]
Xu, Jia [2 ]
Liang, Kaitai [3 ]
Zhang, Fan [4 ,5 ,6 ]
Chang, Ee-Chien [1 ]
机构
[1] Natl Univ Singapore, Dept Comp Sci, Singapore 117417, Singapore
[2] NUS, Singtel Cyber Secur Res & Dev Lab, Singapore 117602, Singapore
[3] Univ Surrey, Dept Comp Sci, Guildford GU2 7XH, Surrey, England
[4] Zhejiang Univ, Coll Informat Sci & Elect Engn, Hangzhou 310027, Zhejiang, Peoples R China
[5] Zhejiang Univ, Inst Cyber Secur Res, Hangzhou 310027, Zhejiang, Peoples R China
[6] Natl Univ Singapore, Sch Comp, Singapore 117417, Singapore
基金
英国工程与自然科学研究理事会; 中国国家自然科学基金; 新加坡国家研究基金会;
关键词
Searchable symmetric encryption; passive attacks; search query privacy; leakage of file-access pattern;
D O I
10.1109/TIFS.2018.2866321
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Searchable encryption (SE) provides a privacy-preserving mechanism for data users to search over encrypted data stored on a remote server. Researchers have designed a number of SE schemes with high efficiency yet allowing some degree of leakage profile to the remote server. The leakage, however, should be further measured to allow us to understand what types of attacks an SE scheme would encounter. This paper considers passive attacks that make inferences based on prior knowledge and observations on queries issued by users. This is in contrast to previously studied active attacks that adaptively inject files and queries. We consider several assumptions on the types or prior knowledge the attacker possessed and propose a few passive attacks. In particular, under the "full-fledged" assumption, the keyword recovery rate of our attack is optimal in the sense that it is equal to the theoretical upper bound. We further present several enhanced attacks under other weaker assumptions on various levels of the prior knowledge that the attacker can obtain, in which the keyword recovery rates are optimal or nearly optimal (i.e., approaching the theoretical upper bound). In addition, we provide extensive experiments to show the "power" of our passive attacks. This paper highlights the importance of minimizing the prior knowledge of a server and the leakage of search queries. It also shows that simply distorting the frequency of the keyword to hold against our passive attacks may not scale well.
引用
收藏
页码:789 / 802
页数:14
相关论文
共 50 条
  • [21] Countering Statistical Attacks in Cloud-Based Searchable Encryption
    M. A. Manazir Ahsan
    Ihsan Ali
    Mohd Yamani Idna Bin Idris
    Muhammad Imran
    Muhammad Shoaib
    International Journal of Parallel Programming, 2020, 48 : 470 - 495
  • [22] Query Recovery Attacks on Searchable Encryption Based on Partial Knowledge
    Wang, Guofeng
    Liu, Chuanyi
    Dong, Yingfei
    Pan, Hezhong
    Han, Peiyi
    Fang, Binxing
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2017, 2018, 238 : 530 - 549
  • [23] High Recovery with Fewer Injections: Practical Binary Volumetric Injection Attacks against Dynamic Searchable Encryption
    Zhang, Xianglong
    Wang, Wei
    Xu, Peng
    Yang, Laurence T.
    Liang, Kaitai
    PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 5953 - 5970
  • [24] Secure searchable public key encryption against insider keyword guessing attacks from indistinguishability obfuscation
    Lixue Sun
    Chunxiang Xu
    Mingwu Zhang
    Kefei Chen
    Hongwei Li
    Science China Information Sciences, 2018, 61
  • [25] Efficient public-key searchable encryption against inside keyword guessing attacks for cloud storage
    Wu, Axin
    Li, Fagen
    Xin, Xiangjun
    Zhang, Yinghui
    Zhu, Jianhao
    JOURNAL OF SYSTEMS ARCHITECTURE, 2024, 149
  • [26] Search pattern leakage in searchable encryption: Attacks and new construction
    Liu, Chang
    Zhu, Liehuang
    Wang, Mingzhong
    Tan, Yu-an
    INFORMATION SCIENCES, 2014, 265 : 176 - 188
  • [27] Designated-Senders Public-Key Searchable Encryption Secure against Keyword Guessing Attacks
    Saito, Takanori
    Nakanishi, Toru
    2017 FIFTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING (CANDAR), 2017, : 496 - 502
  • [28] Certificateless searchable public key encryption scheme secure against keyword guessing attacks for smart healthcare
    Ma, Mimi
    He, Debiao
    Fan, Shuqin
    Feng, Dengguo
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 50 (50)
  • [29] Efficient searchable public key encryption against keyword guessing attacks for cloud-based EMR systems
    Yang Lu
    Jiguo Li
    Cluster Computing, 2019, 22 : 285 - 299
  • [30] A Secure Searchable Public Key Encryption Scheme with a Designated Tester against Keyword Guessing Attacks and Its Extension
    Hu, Chengyu
    Liu, Pengtao
    ADVANCES IN COMPUTER SCIENCE, ENVIRONMENT, ECOINFORMATICS, AND EDUCATION, PT II, 2011, 215 : 131 - +