SWAT: A System-Wide Approach to Tunable Leakage Mitigation in Encrypted Data Stores

06/29/2023
by   Leqian Zheng, et al.
0

Numerous studies have underscored the significant privacy risks associated with various leakage patterns in encrypted data stores. Most existing systems that conceal leakage either (1) incur substantial overheads, (2) focus on specific subsets of leakage patterns, or (3) apply the same security notion across various workloads, thereby impeding the attainment of fine-tuned privacy-efficiency trade-offs. In light of various detrimental leakage patterns, this paper starts with an investigation into which specific leakage patterns require our focus respectively in the contexts of key-value, range-query, and dynamic workloads. Subsequently, we introduce new security notions tailored to the specific privacy requirements of these workloads. Accordingly, we present, SWAT, an efficient construction that progressively enables these workloads, while provably mitigating system-wide leakage via a suite of algorithms with tunable privacy-efficiency trade-offs. We conducted extensive experiments and compiled a detailed result analysis, showing the efficiency of our solution. SWAT is about 10.6× slower than an encryption-only data store that reveals various leakage patterns and is 31.6× faster than a trivially zero-leakage solution. Meanwhile, the performance of SWAT remains highly competitive compared to other designs that mitigate specific types of leakage.

READ FULL TEXT

page 1

page 11

research
06/08/2018

Reducing Metadata Leakage from Encrypted Files and Communication with PURBs

Most encrypted data formats, such as PGP, leak substantial metadata in t...
research
09/13/2019

Toward Efficient Evaluation of Logic Encryption Schemes: Models and Metrics

Research in logic encryption over the last decade has resulted in variou...
research
04/11/2019

Information Leakage in Encrypted Deduplication via Frequency Analysis: Attacks and Defenses

Encrypted deduplication combines encryption and deduplication to simulta...
research
09/25/2019

Privacy-preserving Searchable Databases with Controllable Leakage

Searchable Encryption (SE) is a technique that allows Cloud Service Prov...
research
07/15/2021

Data Disclosure with Non-zero Leakage and Non-invertible Leakage Matrix

We study a statistical signal processing privacy problem, where an agent...
research
04/14/2021

Exploring Knowledge Leakage Risk in Knowledge-Intensive Organisations: Behavioural aspects and Key controls

Knowledge leakage poses a critical risk to the competitive advantage of ...
research
04/11/2019

Mitigating Information Leakage in Image Representations: A Maximum Entropy Approach

Image recognition systems have demonstrated tremendous progress over the...

Please sign up or login with your details

Forgot password? Click here to reset