Project Details
Description
Under active research for years, encrypted databases are considered as a primary line of defence against the ever-growing data and privacy breaches. They allow users to make confidential queries directly over encrypted data, reducing information disclosure to well-defined leakage profiles. Despite the fruitful progress on enriched query types and improved efficiency, encrypted databases have not yet achieved widespread adoption for commercialization, because they may not be as secure as claimed in practice. Recent studies revealed that the legitimately admitted leakage profiles, while seemingly innocent, can be exploited to recover the queries and eventually devastate the system's privacy guarantee. Several countermeasures were subsequently proposed to patch the exploitations, but still with limits in theoretical account on either security or efficiency. Moreover, today's scientific knowledge on how the well-defined leakage relates to the broader privacy risk is still lacking. Our preliminary findings have shown potentials to fill such knowledge gap, and, surprisingly, further suggest possible pathways towards stronger attacks and defences. These insights open up completely new perspectives for reasoning the security of encrypted databases.In this proposal, we will conduct systematic investigations on leakage exploitation and corresponding mitigation in modern encrypted searchable databases. Our plan involves two parts: 1) understanding why the leakage is fundamentally exploitable; 2) investigating how to harden encrypted databases accordingly. We begin with the investigation on new algebraic approaches to model the indexing information transformation between the original and encrypted databases, and explain the inherent privacy risks mathematically. Grounded on these theoretical results, we will then develop a systematic leakage-abuse attack procedure that aims to improve and generalize all existing ones. With these findings, we hope to further establish an information-theoretic framework to quantitatively measure the privacy risks and guide the design of effective mitigation techniques. In the second half, we will study how to refine the security definitions of existing encrypted search schemes, by formally capturing the security against attackers capable of mounting leakage-abuse attacks. We will then investigate proactive defence strategies, by designing self-adjustable probabilistic perturbation mechanisms, to construct encrypted databases with stronger security against generalised attacks. Besides, we will also explore a reactive protection strategy with possibly better efficiency, which avoids the cost of perturbation and on-demand rebuilds the encrypted database through privacy risk monitoring.Our results will establish theoretical foundations for exploring the fundamental security limit of encrypted databases, provide effective hardening techniques, and push forward the scientific frontier of this research area.
| Project number | 9043001 |
|---|---|
| Grant type | GRF |
| Status | Finished |
| Effective start/end date | 1/01/21 → 31/12/24 |
Fingerprint
Explore the research topics touched on by this project. These labels are generated based on the underlying awards/grants. Together they form a unique fingerprint.
Research output
-
Ring of Gyges: Accountable Anonymous Broadcast via Secret-Shared Shuffle
Dong, W., Jiang, P., Duan, H., Wang, C., Zhao, L. & Wang, Q., Feb 2025, Network and Distributed System Security (NDSS) Symposium 2025. 18 p.Research output: Chapters, Conference Papers, Creative and Literary Works › RGC 32 - Refereed conference paper (with host publication) › peer-review
Open Access -
Blockchain-Assisted Secure Deduplication for Large-Scale Cloud Storage Service
Hua, Z., Yao, Y., Song, M., Zheng, Y., Zhang, Y. & Wang, C., May 2024, In: IEEE Transactions on Services Computing. 17, 3, p. 821-835Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
14 Link opens in a new tab Citations (Scopus) -
Can differential privacy practically protect collaborative deep learning inference for IoT?
Ryu, J., Zheng, Y., Gao, Y., Abuadbba, A., Kim, J., Won, D., Nepal, S., Kim, H. & Wang, C., Aug 2024, In: Wireless Networks. 30, p. 4713–4733Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
16 Link opens in a new tab Citations (Scopus)