Filters








977 Hits in 2.5 sec

Hiding the Access Pattern is Not Enough: Exploiting Search Pattern Leakage in Searchable Encryption [article]

Simon Oya, Florian Kerschbaum
2020 arXiv   pre-print
Recent Searchable Symmetric Encryption (SSE) schemes enable secure searching over an encrypted database stored in a server while limiting the information leaked to the server.  ...  These schemes focus on hiding the access pattern, which refers to the set of documents that match the client's queries.  ...  [17] provide a framework to design structured encryption schemes while hiding the access and search pattern.  ... 
arXiv:2010.03465v1 fatcat:gf4bhzthhjblzgwfvbkmsgbmfe

Address Permutation for Privacy-Preserving Searchable Symmetric Encryption

Daeseon Choi, Seung-Hyun Kim, Younho Lee
2012 ETRI Journal  
This paper proposes a privacy-preserving database encryption scheme that provides access pattern hiding against a service provider.  ...  The proposed scheme can achieve access pattern hiding in situations in which an adversary cannot access the inside of the database directly, by separating the entity with an index table and data table  ...  Searchable symmetric encryption scheme with access pattern hiding.  ... 
doi:10.4218/etrij.12.0111.0243 fatcat:s4rjq6mufngddhz4vly4mv5paa

Address Permutation for Privacy-Preserving Searchable Symmetric Encryption

Daeseon Choi
2012 ETRI Journal  
This paper proposes a privacy-preserving database encryption scheme that provides access pattern hiding against a service provider.  ...  The proposed scheme can achieve access pattern hiding in situations in which an adversary cannot access the inside of the database directly, by separating the entity with an index table and data table  ...  Searchable symmetric encryption scheme with access pattern hiding.  ... 
doi:10.4218/etrij.11.0111.0243 fatcat:6vaxcxwlcncirpe245z7hsoxcu

Analysis of Heuristic Based Access Pattern Obfuscation

Huseyin Ulusoy, Murat Kantarcioglu, Bhavani Thuraisingham, Ebru Cankaya, Erman Pattuk
2013 Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing  
In the context of searchable symmetric encryption, many solutions have been proposed to perform efficient search on the encrypted outsourced data.  ...  Recently, it has been shown that such access pattern disclosures could be exploited even further to infer sensitive information about underlying data, even if the data is stored in encrypted form.  ...  [20] proposed a searchable encryption model that hides access patterns based on public key encryption.  ... 
doi:10.4108/icst.collaboratecom.2013.254199 dblp:conf/colcom/UlusoyKTCP13 fatcat:z4lwltmxt5e6xlw7mq7rpibtf4

Inverted index based multi-keyword public-key searchable encryption with strong privacy guarantee

Bing Wang, Wei Song, Wenjing Lou, Y. Thomas Hou
2015 2015 IEEE Conference on Computer Communications (INFOCOM)  
To meet stronger security requirements, we strengthen our scheme with an efficient oblivious transfer protocol that hides the access pattern from the cloud.  ...  In this paper, we propose a public-key searchable encryption scheme based on the inverted index.  ...  To provide stronger security guarantee, we strengthen our scheme with an efficient oblivious transfer protocol to hide the access pattern. 3) Comparing with the existing public-key searchable encryption  ... 
doi:10.1109/infocom.2015.7218594 dblp:conf/infocom/WangSLH15 fatcat:y4rmdua4jvephlchhdxnydr27e

A Survey on Attribute Based Encryption to Improve Efficiency in Semantic Search Over Cloud Data

2015 International Journal of Science and Research (IJSR)  
To make the search efficient blind storage system is used to hide access control issues in searchable encryption technique.  ...  In Attribute based encryption (ABE), the encryption is performed on the attributes and allows only those users to access the data if the attributes are available in their ID.  ...  In the EMRS, the blind storage system is modified in order to hide the access pattern of the search user from the cloud server.  ... 
doi:10.21275/v4i11.nov151315 fatcat:5exz4cblqza3hcwxzodls6qi6u

Search pattern leakage in searchable encryption: Attacks and new construction

Chang Liu, Liehuang Zhu, Mingzhong Wang, Yu-an Tan
2014 Information Sciences  
To address this issue, we then develop a grouping-based construction (GBC) to transform an existing searchable encryption scheme to a new scheme hiding the search pattern.  ...  Searching on remote encrypted data (commonly known as searchable encryption) has become an important issue in secure data outsourcing, since it allows users to outsource encrypted data to an untrusted  ...  We present a grouping-based construction (GBC) which transforms an existing index-based searchable encryption scheme to a new scheme hiding the search pattern.  ... 
doi:10.1016/j.ins.2013.11.021 fatcat:emdpu2ps75cj3lhv7oq3cpxuj4

Breaking Web Applications Built On Top of Encrypted Data

Paul Grubbs, Richard McPherson, Muhammad Naveed, Thomas Ristenpart, Vitaly Shmatikov
2016 Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS'16  
We then apply it to Mylar, a framework that uses multi-key searchable encryption (MKSE) to build Web applications on top of encrypted data.  ...  We conclude with general lessons for the designers of systems that rely on property-preserving or searchable encryption to protect data from untrusted servers.  ...  Mylar explicitly does not hide access or timing patterns, even though in any real-world deployment they are visible to an adversarial server.  ... 
doi:10.1145/2976749.2978351 dblp:conf/ccs/GrubbsMNRS16 fatcat:f2uiff3l4rfotfqkuii4peonny

Searchable Encryption: A Review

Khadijah Chamili, Md. Jan Nordin, Waidah Ismail, Abduljalil Radman
2017 International Journal of Security and Its Applications  
In this paper, Searchable Encryption (SE) techniques which allow accessing data on encrypted cloud were reviewed.  ...  As a solution, the data is encrypted before sending to the cloud. However, the normal searching mechanism could not get through the encrypted data.  ...  Some adversary activities include brute force attack [20] , search/access pattern leakage [8] , [21] and DDoS attack [5] .  ... 
doi:10.14257/ijsia.2017.11.12.07 fatcat:j2k35dounbe2lddx5meonusv4q

Survey on Secure Search Over Encrypted Data on the Cloud [article]

Hoang Pham, Jason Woodworth, Mohsen Amini Salehi
2018 arXiv   pre-print
Searchable Encryption (SE) techniques have been widely studied to enable searching on the data while they are encrypted.  ...  User-side encryption techniques can be employed to mitigate the security concerns. Nonetheless, once the data in encrypted, no processing (e.g., searching) can be performed on the outsourced data.  ...  In the context of searchable encryption, Goldreich et al., [41] achieved fully secure searchable encryption using Oblivious RAM (ORAM) to hide the access pattern.  ... 
arXiv:1811.09767v1 fatcat:scgxzjjnvfbbbnh7wxpr6eu5ci

Searchable Encryption with Secure and Efficient Updates

Florian Hahn, Florian Kerschbaum
2014 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security - CCS '14  
In this paper we present the first searchable encryption scheme whose updates leak no more information than the access pattern, that still has asymptotically optimal search time, linear, very small and  ...  Our construction is based on the novel idea of learning the index for efficient access from the access pattern itself.  ...  The work in this paper was supported by the European Union Seventh Framework Program (FP7/2007-2013) under grant agreement no. 609611 (PRACTICE).  ... 
doi:10.1145/2660267.2660297 dblp:conf/ccs/HahnK14 fatcat:ysunqc4hpjgqtopigrt73223jy

Security-Efficiency Tradeoffs in Searchable Encryption

Raphael Bost, Pierre-Alain Fouque
2019 Proceedings on Privacy Enhancing Technologies  
In this paper, we present new lower bounds on the trade-offs between the size of the client state, the efficiency and the security for searchable encryption schemes.  ...  Besides their security, the efficiency of searchable encryption schemes is a major criteria when it comes to their adoption: in order to replace an unencrypted database by a more secure construction, it  ...  Searchable Encryption Hiding the Search Pattern One crucially important question about searchable encryption is the one of the tradeoff between the security of constructions and their performance.  ... 
doi:10.2478/popets-2019-0062 dblp:journals/popets/BostF19 fatcat:75qkqxl4mffkdgj3qp5udrkjki

Searchitect - A Developer Framework for Hybrid Searchable Encryption (Position Paper)

Ulrich Haböck, Manuel Koschuch, Ines Kramer, Silvie Schmidt, Mathias Tausig
2018 Proceedings of the 3rd International Conference on Internet of Things, Big Data and Security  
the user, but without having access to the encryption keys.  ...  Searchable encryption (SE) allows to outsource data to the cloud in a secure way, whilst permitting search functionality on that encrypted data: the host is able to perform search queries on behalf of  ...  Hiding access and search pattern is a subtle issue.  ... 
doi:10.5220/0006789402910298 dblp:conf/iotbd/HabockKKST18 fatcat:fxijy5qjebdh7i72f6lwng7mcu

Multi-Keyword Ranked Search in Cloud Storage using Homomorphic Indexing

K Renugha, P Shanthi, A Umamakeswari
2018 International Journal of Engineering & Technology  
The data owner needs the secure information sharing from the cloud and without leak of access pattern to the eavesdroppers.  ...  XOR homomorphic encryption searchable algorithm along with ranking is proposed to provide the security over the network.  ...  XOR Homomorphic encryption searchable [1] algorithm is presented to protect the data privacy from unwanted access in cloud environment.  ... 
doi:10.14419/ijet.v7i2.24.12057 fatcat:t3qglis4xnfrfcthnyk3cr3mry

Practical Architectures for Deployment of Searchable Encryption in a Cloud Environment

Sarah Renwick, Keith Martin
2017 Cryptography  
In this paper, we examine different architectures for supporting search over encrypted data and discuss some of the challenges that need to be overcome if these techniques are to be engineered into practical  ...  Public cloud service providers provide an infrastructure that gives businesses and individuals access to computing power and storage space on a pay-as-you-go basis.  ...  Using ORAM to achieve searchable encryption completely conceals the access pattern, making it the most secure method for searchable encryption.  ... 
doi:10.3390/cryptography1030019 fatcat:r244pr64xfgy7l6t2ujg4qacem
« Previous Showing results 1 — 15 out of 977 results