K-Indistinguishable Data Access for Encrypted Key-Value Stores
Research output: Chapters, Conference Papers, Creative and Literary Works › RGC 32 - Refereed conference paper (with host publication) › peer-review
Author(s)
Related Research Unit(s)
Detail(s)
Original language | English |
---|---|
Title of host publication | Proceedings - 2022 IEEE 42nd International Conference on Distributed Computing Systems, ICDCS 2022 |
Publisher | Institute of Electrical and Electronics Engineers, Inc. |
Pages | 1144-1154 |
ISBN (electronic) | 978-1-6654-7177-0 |
ISBN (print) | 978-1-6654-7178-7 |
Publication status | Published - 2022 |
Publication series
Name | Proceedings - International Conference on Distributed Computing Systems |
---|---|
ISSN (Print) | 1063-6927 |
ISSN (electronic) | 2575-8411 |
Conference
Title | 42nd IEEE International Conference on Distributed Computing Systems (ICDCS 2022) |
---|---|
Place | Italy |
City | Bologna |
Period | 10 - 13 July 2022 |
Link(s)
Abstract
Key-value store is adopted by many applications due to its high performance in processing big data workloads. Recent research on secure cloud storage has shown that even if the data is encrypted, attackers can learn the sensitive information of data by launching access pattern attacks such as frequency analysis. For this issue, some schemes have been proposed to protect encrypted key-value stores against access pattern attacks. However, existing solutions protect access pattern information at the cost of large storage and bandwidth overhead, which is unacceptable for large-scale key-value stores. In this paper, we devise a K-indistinguishable frequency smoothing scheme for encrypted key-value stores, which can resist access pattern attacks launched by passive persistent adversaries with minimal storage and bandwidth overhead. Then, we propose a dynamic K-indistinguishable frequency smoothing scheme. It can efficiently adapt to the changes in access distribution while ensuring the K-indistinguishable security level and bandwidth efficiency. Finally, we formally analyze the security of our design. Extensive experiments demonstrate that our design achieves high throughput while minimizing storage and bandwidth overhead.
Research Area(s)
- access pattern attack, Encrypted key-value store, K-indistinguishable frequency smoothing
Citation Format(s)
K-Indistinguishable Data Access for Encrypted Key-Value Stores. / Zhang, Chen; Xie, Qingyuan; Miao, Yinbin et al.
Proceedings - 2022 IEEE 42nd International Conference on Distributed Computing Systems, ICDCS 2022. Institute of Electrical and Electronics Engineers, Inc., 2022. p. 1144-1154 (Proceedings - International Conference on Distributed Computing Systems).
Proceedings - 2022 IEEE 42nd International Conference on Distributed Computing Systems, ICDCS 2022. Institute of Electrical and Electronics Engineers, Inc., 2022. p. 1144-1154 (Proceedings - International Conference on Distributed Computing Systems).
Research output: Chapters, Conference Papers, Creative and Literary Works › RGC 32 - Refereed conference paper (with host publication) › peer-review