Privacy-preserving Searchable Databases with Controllable Leakage

09/25/2019
by   Shujie Cui, et al.
0

Searchable Encryption (SE) is a technique that allows Cloud Service Providers (CSPs) to search over encrypted datasets without learning the content of queries and records. In recent years, many SE schemes have been proposed to protect outsourced data from CSPs. Unfortunately, most of them leak sensitive information, from which the CSPs could still infer the content of queries and records by mounting leakage-based inference attacks, such as the count attack and file injection attack. In this work, first we define the leakage in searchable encrypted databases and analyse how the leakage is leveraged in existing leakage-based attacks. Second, we propose a Privacy-preserving Multi-cloud based dynamic symmetric SE (SSE) scheme for relational Database (P-McDb). P-McDb has minimal leakage, which not only ensures confidentiality of queries and records, but also protects the search, access, and size patterns from CSPs. Moreover, P-McDb ensures both forward and backward privacy of the database. Thus, P-McDb could resist existing leakage-based attacks, e.g., active file/record-injection attacks. We give security definition and analysis to show how P-McDb hides the aforementioned patterns. Finally, we implemented a prototype of P-McDb and test it using the TPC-H benchmark dataset. Our evaluation results show the feasibility and practical efficiency of P-McDb.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/15/2020

Practical Volume-Based Attacks on Encrypted Databases

Recent years have seen an increased interest towards strong security pri...
research
07/23/2023

ACE: A Consent-Embedded privacy-preserving search on genomic database

In this paper, we introduce ACE, a consent-embedded searchable encryptio...
research
01/11/2020

Accelerating Forward and Backward Private Searchable Encryption Using Trusted Execution

Searchable encryption (SE) is one of the key enablers for building encry...
research
07/25/2023

A Comprehensive Analysis on the Leakage of Fuzzy Matchers

This paper provides a comprehensive analysis of information leakage duri...
research
11/17/2021

BigFoot: Exploiting and Mitigating Leakage in Encrypted Write-Ahead Logs

Modern databases and data-warehousing systems separate query processing ...
research
05/21/2019

Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward/Backward Privacy

Dynamic searchable symmetric encryption (DSSE) is a useful cryptographic...
research
06/29/2023

SWAT: A System-Wide Approach to Tunable Leakage Mitigation in Encrypted Data Stores

Numerous studies have underscored the significant privacy risks associat...

Please sign up or login with your details

Forgot password? Click here to reset