A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Hiding the Access Pattern is Not Enough: Exploiting Search Pattern Leakage in Searchable Encryption
[article]
2020
arXiv
pre-print
Recent Searchable Symmetric Encryption (SSE) schemes enable secure searching over an encrypted database stored in a server while limiting the information leaked to the server. ...
These schemes focus on hiding the access pattern, which refers to the set of documents that match the client's queries. ...
[17] provide a framework to design structured encryption schemes while hiding the access and search pattern. ...
arXiv:2010.03465v1
fatcat:gf4bhzthhjblzgwfvbkmsgbmfe
Address Permutation for Privacy-Preserving Searchable Symmetric Encryption
2012
ETRI Journal
This paper proposes a privacy-preserving database encryption scheme that provides access pattern hiding against a service provider. ...
The proposed scheme can achieve access pattern hiding in situations in which an adversary cannot access the inside of the database directly, by separating the entity with an index table and data table ...
Searchable symmetric encryption scheme with access pattern hiding. ...
doi:10.4218/etrij.12.0111.0243
fatcat:s4rjq6mufngddhz4vly4mv5paa
Address Permutation for Privacy-Preserving Searchable Symmetric Encryption
2012
ETRI Journal
This paper proposes a privacy-preserving database encryption scheme that provides access pattern hiding against a service provider. ...
The proposed scheme can achieve access pattern hiding in situations in which an adversary cannot access the inside of the database directly, by separating the entity with an index table and data table ...
Searchable symmetric encryption scheme with access pattern hiding. ...
doi:10.4218/etrij.11.0111.0243
fatcat:6vaxcxwlcncirpe245z7hsoxcu
Analysis of Heuristic Based Access Pattern Obfuscation
2013
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing
In the context of searchable symmetric encryption, many solutions have been proposed to perform efficient search on the encrypted outsourced data. ...
Recently, it has been shown that such access pattern disclosures could be exploited even further to infer sensitive information about underlying data, even if the data is stored in encrypted form. ...
[20] proposed a searchable encryption model that hides access patterns based on public key encryption. ...
doi:10.4108/icst.collaboratecom.2013.254199
dblp:conf/colcom/UlusoyKTCP13
fatcat:z4lwltmxt5e6xlw7mq7rpibtf4
Inverted index based multi-keyword public-key searchable encryption with strong privacy guarantee
2015
2015 IEEE Conference on Computer Communications (INFOCOM)
To meet stronger security requirements, we strengthen our scheme with an efficient oblivious transfer protocol that hides the access pattern from the cloud. ...
In this paper, we propose a public-key searchable encryption scheme based on the inverted index. ...
To provide stronger security guarantee, we strengthen our scheme with an efficient oblivious transfer protocol to hide the access pattern. 3) Comparing with the existing public-key searchable encryption ...
doi:10.1109/infocom.2015.7218594
dblp:conf/infocom/WangSLH15
fatcat:y4rmdua4jvephlchhdxnydr27e
A Survey on Attribute Based Encryption to Improve Efficiency in Semantic Search Over Cloud Data
2015
International Journal of Science and Research (IJSR)
To make the search efficient blind storage system is used to hide access control issues in searchable encryption technique. ...
In Attribute based encryption (ABE), the encryption is performed on the attributes and allows only those users to access the data if the attributes are available in their ID. ...
In the EMRS, the blind storage system is modified in order to hide the access pattern of the search user from the cloud server. ...
doi:10.21275/v4i11.nov151315
fatcat:5exz4cblqza3hcwxzodls6qi6u
Search pattern leakage in searchable encryption: Attacks and new construction
2014
Information Sciences
To address this issue, we then develop a grouping-based construction (GBC) to transform an existing searchable encryption scheme to a new scheme hiding the search pattern. ...
Searching on remote encrypted data (commonly known as searchable encryption) has become an important issue in secure data outsourcing, since it allows users to outsource encrypted data to an untrusted ...
We present a grouping-based construction (GBC) which transforms an existing index-based searchable encryption scheme to a new scheme hiding the search pattern. ...
doi:10.1016/j.ins.2013.11.021
fatcat:emdpu2ps75cj3lhv7oq3cpxuj4
Breaking Web Applications Built On Top of Encrypted Data
2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS'16
We then apply it to Mylar, a framework that uses multi-key searchable encryption (MKSE) to build Web applications on top of encrypted data. ...
We conclude with general lessons for the designers of systems that rely on property-preserving or searchable encryption to protect data from untrusted servers. ...
Mylar explicitly does not hide access or timing patterns, even though in any real-world deployment they are visible to an adversarial server. ...
doi:10.1145/2976749.2978351
dblp:conf/ccs/GrubbsMNRS16
fatcat:f2uiff3l4rfotfqkuii4peonny
Searchable Encryption: A Review
2017
International Journal of Security and Its Applications
In this paper, Searchable Encryption (SE) techniques which allow accessing data on encrypted cloud were reviewed. ...
As a solution, the data is encrypted before sending to the cloud. However, the normal searching mechanism could not get through the encrypted data. ...
Some adversary activities include brute force attack [20] , search/access pattern leakage [8] , [21] and DDoS attack [5] . ...
doi:10.14257/ijsia.2017.11.12.07
fatcat:j2k35dounbe2lddx5meonusv4q
Survey on Secure Search Over Encrypted Data on the Cloud
[article]
2018
arXiv
pre-print
Searchable Encryption (SE) techniques have been widely studied to enable searching on the data while they are encrypted. ...
User-side encryption techniques can be employed to mitigate the security concerns. Nonetheless, once the data in encrypted, no processing (e.g., searching) can be performed on the outsourced data. ...
In the context of searchable encryption, Goldreich et al., [41] achieved fully secure searchable encryption using Oblivious RAM (ORAM) to hide the access pattern. ...
arXiv:1811.09767v1
fatcat:scgxzjjnvfbbbnh7wxpr6eu5ci
Searchable Encryption with Secure and Efficient Updates
2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security - CCS '14
In this paper we present the first searchable encryption scheme whose updates leak no more information than the access pattern, that still has asymptotically optimal search time, linear, very small and ...
Our construction is based on the novel idea of learning the index for efficient access from the access pattern itself. ...
The work in this paper was supported by the European Union Seventh Framework Program (FP7/2007-2013) under grant agreement no. 609611 (PRACTICE). ...
doi:10.1145/2660267.2660297
dblp:conf/ccs/HahnK14
fatcat:ysunqc4hpjgqtopigrt73223jy
Security-Efficiency Tradeoffs in Searchable Encryption
2019
Proceedings on Privacy Enhancing Technologies
In this paper, we present new lower bounds on the trade-offs between the size of the client state, the efficiency and the security for searchable encryption schemes. ...
Besides their security, the efficiency of searchable encryption schemes is a major criteria when it comes to their adoption: in order to replace an unencrypted database by a more secure construction, it ...
Searchable Encryption Hiding the Search Pattern One crucially important question about searchable encryption is the one of the tradeoff between the security of constructions and their performance. ...
doi:10.2478/popets-2019-0062
dblp:journals/popets/BostF19
fatcat:75qkqxl4mffkdgj3qp5udrkjki
Searchitect - A Developer Framework for Hybrid Searchable Encryption (Position Paper)
2018
Proceedings of the 3rd International Conference on Internet of Things, Big Data and Security
the user, but without having access to the encryption keys. ...
Searchable encryption (SE) allows to outsource data to the cloud in a secure way, whilst permitting search functionality on that encrypted data: the host is able to perform search queries on behalf of ...
Hiding access and search pattern is a subtle issue. ...
doi:10.5220/0006789402910298
dblp:conf/iotbd/HabockKKST18
fatcat:fxijy5qjebdh7i72f6lwng7mcu
Multi-Keyword Ranked Search in Cloud Storage using Homomorphic Indexing
2018
International Journal of Engineering & Technology
The data owner needs the secure information sharing from the cloud and without leak of access pattern to the eavesdroppers. ...
XOR homomorphic encryption searchable algorithm along with ranking is proposed to provide the security over the network. ...
XOR Homomorphic encryption searchable [1] algorithm is presented to protect the data privacy from unwanted access in cloud environment. ...
doi:10.14419/ijet.v7i2.24.12057
fatcat:t3qglis4xnfrfcthnyk3cr3mry
Practical Architectures for Deployment of Searchable Encryption in a Cloud Environment
2017
Cryptography
In this paper, we examine different architectures for supporting search over encrypted data and discuss some of the challenges that need to be overcome if these techniques are to be engineered into practical ...
Public cloud service providers provide an infrastructure that gives businesses and individuals access to computing power and storage space on a pay-as-you-go basis. ...
Using ORAM to achieve searchable encryption completely conceals the access pattern, making it the most secure method for searchable encryption. ...
doi:10.3390/cryptography1030019
fatcat:r244pr64xfgy7l6t2ujg4qacem
« Previous
Showing results 1 — 15 out of 977 results