260 Hits in 3.1 sec

Obfuscated Access and Search Patterns in Searchable Encryption

Zhiwei Shang, Simon Oya, Andreas Peter, Florian Kerschbaum
2021 Proceedings 2021 Network and Distributed System Security Symposium   unpublished
s scheme [10] , in this work we propose OSSE (Obfuscated SSE), a new SSE scheme that protects both the access and search patterns.  ...  In this paper, we propose OSSE (Obfuscated SSE), an SSE scheme that obfuscates the access pattern independently for each query performed.  ...  ACKNOWLEDGMENT We gratefully acknowledge the support of NSERC for grants RGPIN-05849, CRDPJ-531191, IRC-537591 and the Royal Bank of Canada for funding this research.  ... 
doi:10.14722/ndss.2021.23041 fatcat:txpqpeilcbcrfgrb7fu6bnrwqi

Analysis of Heuristic Based Access Pattern Obfuscation

Huseyin Ulusoy, Murat Kantarcioglu, Bhavani Thuraisingham, Ebru Cankaya, Erman Pattuk
2013 Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing  
In the context of searchable symmetric encryption, many solutions have been proposed to perform efficient search on the encrypted outsourced data.  ...  Recently, it has been shown that such access pattern disclosures could be exploited even further to infer sensitive information about underlying data, even if the data is stored in encrypted form.  ...  Conclusion In this paper, we analyze the heuristics for the access pattern obfuscation over searchable encryption model.  ... 
doi:10.4108/icst.collaboratecom.2013.254199 dblp:conf/colcom/UlusoyKTCP13 fatcat:z4lwltmxt5e6xlw7mq7rpibtf4

Efficient privacy-aware search over encrypted databases

Mehmet Kuzu, Mohammad Saiful Islam, Murat Kantarcioglu
2014 Proceedings of the 4th ACM conference on Data and application security and privacy - CODASPY '14  
Our approach leaks obfuscated access pattern to enable efficient retrieval while ensuring individual privacy.  ...  To achieve selective retrieval over encrypted collection, considerable amount of searchable encryption schemes have been proposed in the literature with distinct privacy guarantees.  ...  that enable search over encrypted databases is data access pattern.  ... 
doi:10.1145/2557547.2557570 dblp:conf/codaspy/KuzuIK14 fatcat:cd5srzsk5rfoznrvtmbl3urc5m

Survey on Secure Search Over Encrypted Data on the Cloud [article]

Hoang Pham, Jason Woodworth, Mohsen Amini Salehi
2018 arXiv   pre-print
Searchable Encryption (SE) techniques have been widely studied to enable searching on the data while they are encrypted.  ...  In addition, although these techniques enable different search types and vary in details, they share similarities in their components and architectures.  ...  In searchable encryption systems, the access pattern and search pattern are the most common security factors to consider for these trade-offs.  ... 
arXiv:1811.09767v1 fatcat:scgxzjjnvfbbbnh7wxpr6eu5ci

Using Granule to Search Privacy Preserving Voice in Home IoT Systems

Wei Li, Yumin Chen, Huosheng Hu, Chao Tang
2020 IEEE Access  
INDEX TERMS Fuzzy search, granule computing, k-nearest neighbor, searchable encrypted voice, obfuscation function.  ...  A scheme of searchable encrypted voice is designed by creating the fuzzy granule of obfuscation features of voices and the ciphertext granule of the voice.  ...  CIPHERTEXT SEARCH SCHEMES The existing ciphertext search schemes can be classified into searchable symmetric encryption (SSE) framework and public key encryption with keyword search (PKEKS) framework.  ... 
doi:10.1109/access.2020.2972975 fatcat:sdtkqnuu5ja6jgi52zhyn6ztni

Inverted index based multi-keyword public-key searchable encryption with strong privacy guarantee

Bing Wang, Wei Song, Wenjing Lou, Y. Thomas Hou
2015 2015 IEEE Conference on Computer Communications (INFOCOM)  
Inverted index is one of the most efficient searchable index structures and has been widely adopted in plaintext search.  ...  In this paper, we propose a public-key searchable encryption scheme based on the inverted index.  ...  Access pattern refers to the accessed documents, i.e. the search results.  ... 
doi:10.1109/infocom.2015.7218594 dblp:conf/infocom/WangSLH15 fatcat:y4rmdua4jvephlchhdxnydr27e

Multi-Key Searchable Encryption, Revisited [chapter]

Ariel Hamlin, Abhi Shelat, Mor Weiss, Daniel Wichs
2018 Lecture Notes in Computer Science  
The left and right values must lead to the same access pattern, and repeated queries must appear in the same locations in both query sequences.  ...  only reveals the access pattern.  ...  The third author was supported in part by The Eric and Wendy Schmidt Postdoctoral Grant for Women in Mathematical and Computing Sciences.  ... 
doi:10.1007/978-3-319-76578-5_4 fatcat:vs72r43yf5hxnmnsbnjscuh3t4

Secure Ranked Keyword Search over Encrypted Cloud Data

Cong Wang, Ning Cao, Jin Li, Kui Ren, Wenjing Lou
2010 2010 IEEE 30th International Conference on Distributed Computing Systems  
In this paper, for the first time we define and solve the problem of effective yet secure ranked keyword search over encrypted cloud data.  ...  We first give a straightforward yet ideal construction of ranked keyword search under the state-of-the-art searchable symmetric encryption (SSE) security definition, and demonstrate its inefficiency.  ...  Thanks also to the anonymous reviewers and our shepherd Reza Curtmola for their suggestions in preparing the camera-ready version.  ... 
doi:10.1109/icdcs.2010.34 dblp:conf/icdcs/WangCLRL10 fatcat:mzfxqy4vmze6vmnyk2mi4quql4

Hiding the Access Pattern is Not Enough: Exploiting Search Pattern Leakage in Searchable Encryption [article]

Simon Oya, Florian Kerschbaum
2020 arXiv   pre-print
Recent Searchable Symmetric Encryption (SSE) schemes enable secure searching over an encrypted database stored in a server while limiting the information leaked to the server.  ...  Our attack follows a maximum likelihood estimation approach, and is easy to adapt against SSE defenses that obfuscate the access pattern.  ...  Acknowledgments We gratefully acknowledge the support of NSERC for grants RGPIN-05849, CRDPJ-531191, IRC-537591 and the Royal Bank of Canada for funding this research.  ... 
arXiv:2010.03465v1 fatcat:gf4bhzthhjblzgwfvbkmsgbmfe

Towards Privacy-Preserving Storage and Retrieval in Multiple Clouds

Jingwei Li, Dan Lin, Anna Cinzia Squicciarini, Jin Li, Chunfu Jia
2017 IEEE Transactions on Cloud Computing  
Though searchable encryption allows users to encrypt their stored data while preserving some search capabilities, few efforts have sought to consider the reliability of the searchable encrypted data outsourced  ...  In this paper, we propose a privacy-preserving STorage and REtrieval (STRE) mechanism that not only ensures security and privacy but also provides reliability guarantees for the outsourced searchable encrypted  ...  Precisely, semantic security requires that no partial information except access pattern and search pattern is leaked during keyword-based queries.  ... 
doi:10.1109/tcc.2015.2485214 fatcat:vswresdqrbgrniqtibhbs6te5e

Semantic search over encrypted data

Tarik Moataz, Abdullatif Shikfa, Nora Cuppens-Boulahia, Frederic Cuppens
2013 ICT 2013  
We study the state of the art in stemming algorithms and in searchable encryption and propose the first semantic symmetric searchable encryption constructions.  ...  Searchable encryption is a promising primitive in the context of outsourced data storage and in particular cloud computing.  ...  One interesting approach to solve this dilemma and allow searches on encrypted data lies in searchable encryption.  ... 
doi:10.1109/ictel.2013.6632121 dblp:conf/ict/MoatazSCC13 fatcat:bj3ehelsg5bc7izsyrg36e2g7a

CAOS: Concurrent-Access Obfuscated Store [article]

Mihai Ordean, Mark Ryan, David Galindo
2019 arXiv   pre-print
We achieve efficiency and concurrency at the expense of perfect obfuscation: in CAOS the extent to which access patterns are hidden is determined by the resources allocated to its built-in obfuscation  ...  This paper proposes Concurrent-Access Obfuscated Store (CAOS), a construction for remote data storage that provides access-pattern obfuscation in a honest-but-curious adversarial model, while allowing  ...  CONCURRENT-ACCESS OBFUSCATED STORE (CAOS) CAOS is a protocol for storing data securely by encrypting it and anonymizing (read or write) access patterns.  ... 
arXiv:1709.10412v2 fatcat:bcgmfcnigzbchh7q7ctclshtde

Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data

Cong Wang, Ning Cao, Kui Ren, Wenjing Lou
2012 IEEE Transactions on Parallel and Distributed Systems  
In this paper, we define and solve the problem of secure ranked keyword search over encrypted cloud data.  ...  Although traditional searchable encryption techniques allow users to securely search over encrypted data through keywords, they support only Boolean search and are not yet sufficient to meet the effective  ...  ACKNOWLEDGMENTS This work was supported in part by the US National Science Foundation (NSF) under grants CNS-1054317, CNS-1116939, CNS-1156318, and CNS-1117111, and by Amazon web service research grant  ... 
doi:10.1109/tpds.2011.282 fatcat:mjohm7kas5bbxklrxfpjmf2jla

Privacy-preserving multi-keyword ranked search over encrypted cloud data

Ning Cao, Cong Wang, Ming Li, Kui Ren, Wenjing Lou
2011 2011 Proceedings IEEE INFOCOM  
Related works on searchable encryption focus on single keyword search or Boolean keyword search, and rarely sort the search results.  ...  In this paper, for the first time, we define and solve the challenging problem of privacypreserving multi-keyword ranked search over encrypted cloud data (MRSE).  ...  ACKNOWLEDGEMENTS This work was supported in part by the US National Science Foundation under grants CNS-0716306, CNS-0831628, CNS-0746977, and CNS-0831963.  ... 
doi:10.1109/infcom.2011.5935306 dblp:conf/infocom/CaoWLRL11 fatcat:nqnaxxzkazatzdb7lfxg56n3yy

Keyword Search over Shared Cloud Data without Secure Channel or Authority

Yilun Wu, Jinshu Su, Baochun Li
2015 2015 IEEE 8th International Conference on Cloud Computing  
and trapdoors, and is difficult to deploy in cloud systems.  ...  To protect the privacy, documents must be encrypted before outsourcing. This raises a new challenge for the document owner: how should the encrypted documents be securely searched in a public cloud?  ...  This makes it difficult for the eavesdropper to build the access pattern. 4) Secure Search.: Only the authorized users can search over the shared and encrypted documents. IV.  ... 
doi:10.1109/cloud.2015.83 dblp:conf/IEEEcloud/WuSL15 fatcat:3lol6mskprbwdck6abe6egst7m
« Previous Showing results 1 — 15 out of 260 results