Leakage-Abuse Attacks Against Searchable Encryption

被引:420
作者
Cash, David [1 ]
Grubbs, Paul [2 ,3 ]
Perry, Jason [1 ,4 ]
Ristenpart, Thomas [5 ]
机构
[1] Rutgers State Univ, 110 Frelinghuysen Rd, Piscataway, NJ 08854 USA
[2] Skyhigh Networks Inc, Ithaca, NY 14853 USA
[3] Cornell Univ, Ithaca, NY 14853 USA
[4] Lewis Univ, Romeoville, IL 60446 USA
[5] Cornell Tech, New York, NY 10011 USA
来源
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY | 2015年
基金
美国国家科学基金会;
关键词
Searchable encryption; leakage;
D O I
10.1145/2810103.2813700
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Schemes for secure outsourcing of client data with search capability are being increasingly marketed and deployed. In the literature, schemes for accomplishing this efficiently are called Searchable Encryption (SE). They achieve high efficiency with provable security by means of a quantifiable leakage profile. However, the degree to which SE leakage can be exploited by an adversary is not well understood. To address this, we present a characterization of the leakage profiles of in-the-wild searchable encryption products and SE schemes in the literature, and present attack models based on an adversarial server's prior knowledge. Then we empirically investigate the security of searchable encryption by providing query recovery and plaintext recovery attacks that exploit these leakage profiles. We term these leakage-abuse attacks and demonstrate their effectiveness for varying leakage profiles and levels of server knowledge, for realistic scenarios. Amongst our contributions are realistic active attacks which have not been previously explored.
引用
收藏
页码:668 / 679
页数:12
相关论文
共 15 条
[1]  
[Anonymous], 2014, P NETW DISTR SYST SE
[2]  
[Anonymous], 2013, LNCS, DOI DOI 10.1007/978-3-319-02937-517
[3]  
[Anonymous], NDSS 2014
[4]  
Cash D, 2013, LECT NOTES COMPUT SC, V8042, P353, DOI 10.1007/978-3-642-40041-4_20
[5]  
Curtmola Reza, 2006, P 13 ACM C COMP COMM, DOI DOI 10.1145/1180405.1180417
[6]   Software protection and simulation on oblivious RAMs [J].
Goldreich, O ;
Ostrovsky, R .
JOURNAL OF THE ACM, 1996, 43 (03) :431-473
[7]   ShadowCrypt: Encrypted Web Applications for Everyone [J].
He, Warren ;
Akhawe, Devdatta ;
Jain, Sumeet ;
Shi, Elaine ;
Song, Dawn .
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, :1028-1039
[8]  
Islam M. S., 2012, 19 ANN NETW DISTR SY
[9]  
Kamara S., 2013, FINANCIAL CRYPTOGRAP, P258, DOI DOI 10.1007/978-3-642-39884-1
[10]  
Kamara S, 2012, P ACM SIGSAC C COMP, P965