Projects per year
Abstract
Searchable symmetric encryption (SSE) enables users to make confidential queries over always encrypted data while confining information disclosure to pre-defined leakage profiles. Despite the well-understood performance and potentially broad applications of SSE, recent leakage-abuse attacks (LAAs) are questioning its real-world security implications. They show that a passive adversary with certain prior information of a database can recover queries by exploiting the legitimately admitted leakage. While several countermeasures have been proposed, they are insufficient for either security, i.e., handling only specific leakage like query volume, or efficiency, i.e., incurring large storage and bandwidth overhead. We aim to fill this gap by advancing the understanding of LAAs from a fundamental algebraic perspective. Our investigation starts by revealing that the index matrices of a plaintext database and its encrypted image can be linked by linear transformation. The invariant characteristics preserved under the transformation encompass and surpass the information exploited by previous LAAs. They allow one to unambiguously link encrypted queries with corresponding keywords, even with only partial knowledge of the database. Accordingly, we devise a new powerful attack and conduct a series of experiments to show its effectiveness. In response, we propose a new security notion to thwart LAAs in general, inspired by the principle of local differential privacy (LDP). Under the notion, we further develop a practical countermeasure with tunable privacy and efficiency guarantee. Experiment results on representative real-world datasets show that our countermeasure can reduce the query recovery rate of LAAs, including our own.
| Original language | English |
|---|---|
| Pages (from-to) | 5310-5325 |
| Journal | IEEE Transactions on Information Forensics and Security |
| Volume | 16 |
| Online published | 16 Nov 2021 |
| DOIs | |
| Publication status | Published - 2021 |
Research Keywords
- Art
- Costs
- Cryptographic databases
- Databases
- Differential privacy
- Encrypted Search
- Encryption
- Indexes
- Leakage abuse attack
- Linear Algebraic
- Perturbation methods
Fingerprint
Dive into the research topics of 'Interpreting and Mitigating Leakage-abuse Attacks in Searchable Symmetric Encryption'. Together they form a unique fingerprint.-
RIF-ExtU-Lead: Enabling Secure and Efficient Cross-Silo Federated Learning at Scale
Li, B. (Main Project Coordinator [External]) & WANG, C. (Principal Investigator / Project Coordinator)
1/02/21 → …
Project: Research
-
GRF: Towards Full Accounting for Leakage Exploitation and Mitigation in Encrypted Databases
WANG, C. (Principal Investigator / Project Coordinator)
1/01/21 → 31/12/24
Project: Research
-
GRF: Towards Secure and Privacy-assured Truth Discovery from the Crowd
WANG, C. (Principal Investigator / Project Coordinator)
1/01/20 → 2/01/24
Project: Research