Passive Attacks Against Searchable Encryption

被引:72
|
作者
Ning, Jianting [1 ]
Xu, Jia [2 ]
Liang, Kaitai [3 ]
Zhang, Fan [4 ,5 ,6 ]
Chang, Ee-Chien [1 ]
机构
[1] Natl Univ Singapore, Dept Comp Sci, Singapore 117417, Singapore
[2] NUS, Singtel Cyber Secur Res & Dev Lab, Singapore 117602, Singapore
[3] Univ Surrey, Dept Comp Sci, Guildford GU2 7XH, Surrey, England
[4] Zhejiang Univ, Coll Informat Sci & Elect Engn, Hangzhou 310027, Zhejiang, Peoples R China
[5] Zhejiang Univ, Inst Cyber Secur Res, Hangzhou 310027, Zhejiang, Peoples R China
[6] Natl Univ Singapore, Sch Comp, Singapore 117417, Singapore
基金
英国工程与自然科学研究理事会; 中国国家自然科学基金; 新加坡国家研究基金会;
关键词
Searchable symmetric encryption; passive attacks; search query privacy; leakage of file-access pattern;
D O I
10.1109/TIFS.2018.2866321
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Searchable encryption (SE) provides a privacy-preserving mechanism for data users to search over encrypted data stored on a remote server. Researchers have designed a number of SE schemes with high efficiency yet allowing some degree of leakage profile to the remote server. The leakage, however, should be further measured to allow us to understand what types of attacks an SE scheme would encounter. This paper considers passive attacks that make inferences based on prior knowledge and observations on queries issued by users. This is in contrast to previously studied active attacks that adaptively inject files and queries. We consider several assumptions on the types or prior knowledge the attacker possessed and propose a few passive attacks. In particular, under the "full-fledged" assumption, the keyword recovery rate of our attack is optimal in the sense that it is equal to the theoretical upper bound. We further present several enhanced attacks under other weaker assumptions on various levels of the prior knowledge that the attacker can obtain, in which the keyword recovery rates are optimal or nearly optimal (i.e., approaching the theoretical upper bound). In addition, we provide extensive experiments to show the "power" of our passive attacks. This paper highlights the importance of minimizing the prior knowledge of a server and the leakage of search queries. It also shows that simply distorting the frequency of the keyword to hold against our passive attacks may not scale well.
引用
收藏
页码:789 / 802
页数:14
相关论文
共 50 条
  • [31] Isoga: An Isogeny-Based Quantum-Resist Searchable Encryption Scheme Against Keyword Guessing Attacks
    Fan, Qing
    He, Debiao
    Chen, Jianhua
    Peng, Cong
    Wang, Lianhai
    IEEE SYSTEMS JOURNAL, 2023, 17 (02): : 2101 - 2112
  • [32] Efficient searchable public key encryption against keyword guessing attacks for cloud-based EMR systems
    Lu, Yang
    Li, Jiguo
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (01): : 285 - 299
  • [33] File-Injection Attacks on Searchable Encryption, Based on Binomial Structures
    Langhout, Tjard Jan
    Chen, Huanhuan
    Liang, Kaitai
    COMPUTER SECURITY-ESORICS 2024, PT III, 2024, 14984 : 424 - 443
  • [34] The Shadow Nemesis: Inference Attacks on Efficiently Deployable, Efficiently Searchable Encryption
    Pouliot, David
    Wright, Charles V.
    CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 1341 - 1352
  • [35] Interpreting and Mitigating Leakage-Abuse Attacks in Searchable Symmetric Encryption
    Xu, Lei
    Duan, Huayi
    Zhou, Anxin
    Yuan, Xingliang
    Wang, Cong
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 5310 - 5325
  • [36] An Efficient Searchable Encryption Against Keyword Guessing Attacks for Sharable Electronic Medical Records in Cloud-based System
    Yilun Wu
    Xicheng Lu
    Jinshu Su
    Peixin Chen
    Journal of Medical Systems, 2016, 40
  • [37] An Efficient Searchable Encryption Against Keyword Guessing Attacks for Sharable Electronic Medical Records in Cloud-based System
    Wu, Yilun
    Lu, Xicheng
    Su, Jinshu
    Chen, Peixin
    JOURNAL OF MEDICAL SYSTEMS, 2016, 40 (12)
  • [38] WEAKNESS OF PROVABLY SECURE SEARCHABLE ENCRYPTION AGAINST FREQUENCY ANALYSIS
    Suga, Takanori
    Nishide, Takashi
    Sakurai, Kouichi
    2012 MOSHARAKA INTERNATIONAL CONFERENCE ON COMMUNICATIONS, COMPUTERS AND APPLICATIONS (MIC-CCA), 2012, : 142 - 147
  • [39] Generic Certificateless Encryption Secure Against Malicious-but-Passive KGC Attacks in the Standard Model
    Huang, Qiong
    Wong, Duncan S.
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2010, 25 (04) : 807 - 826
  • [40] Generic Certificateless Encryption Secure Against Malicious-but-Passive KGC Attacks in the Standard Model
    Qiong Huang
    Duncan S. Wong
    Journal of Computer Science and Technology, 2010, 25 : 807 - 826