Hiding the Access Pattern is Not Enough: Exploiting Search Pattern Leakage in Searchable Encryption

10/07/2020
by   Simon Oya, et al.
0

Recent Searchable Symmetric Encryption (SSE) schemes enable secure searching over an encrypted database stored in a server while limiting the information leaked to the server. These schemes focus on hiding the access pattern, which refers to the set of documents that match the client's queries. This provides protection against current attacks that largely depend on this leakage to succeed. However, most SSE constructions also leak whether or not two queries aim for the same keyword, also called the search pattern. In this work, we show that search pattern leakage can severely undermine current SSE defenses. We propose an attack that leverages both access and search pattern leakage, as well as some background and query distribution information, to recover the keywords of the queries performed by the client. Our attack follows a maximum likelihood estimation approach, and is easy to adapt against SSE defenses that obfuscate the access pattern. We empirically show that our attack is efficient, it outperforms other proposed attacks, and it completely thwarts two out of the three defenses we evaluate it against, even when these defenses are set to high privacy regimes. These findings highlight that hiding the search pattern, a feature that most constructions are lacking, is key towards providing practical privacy guarantees in SSE.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/08/2021

IHOP: Improved Statistical Query Recovery against Searchable Symmetric Encryption through Quadratic Optimization

Searchable Symmetric Encryption (SSE) schemes allow a client to perform ...
research
02/18/2021

Obfuscated Access and Search Patterns in Searchable Encryption

Searchable Symmetric Encryption (SSE) allows a data owner to securely ou...
research
06/27/2023

A Highly Accurate Query-Recovery Attack against Searchable Encryption using Non-Indexed Documents

Cloud data storage solutions offer customers cost-effective and reduced ...
research
07/03/2023

Passive Query-Recovery Attack Against Secure Conjunctive Keyword Search Schemes

While storing documents on the cloud can be attractive, the question rem...
research
08/15/2020

Practical Volume-Based Attacks on Encrypted Databases

Recent years have seen an increased interest towards strong security pri...
research
06/21/2022

Secure and Efficient Query Processing in Outsourced Databases

Various cryptographic techniques are used in outsourced database systems...
research
02/11/2023

High Recovery with Fewer Injections: Practical Binary Volumetric Injection Attacks against Dynamic Searchable Encryption

Searchable symmetric encryption enables private queries over an encrypte...

Please sign up or login with your details

Forgot password? Click here to reset