Probabilistic Data Structures in Adversarial Environments

被引:32
作者
Clayton, David [1 ]
Patton, Christopher [1 ]
Shrimpton, Thomas [1 ]
机构
[1] Univ Florida, Gainesville, FL 32611 USA
来源
PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19) | 2019年
关键词
Data structures; Bloom filters; Count min-sketches; counting Bloom filters;
D O I
10.1145/3319535.3354235
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Probabilistic data structures use space-efficient representations of data in order to (approximately) respond to queries about the data. Traditionally, these structures are accompanied by probabilistic bounds on query-response errors. These bounds implicitly assume benign attack models, in which the data and the queries are inputs are chosen non-adaptively, and independent of the randomness used to construct the representation. Yet probabilistic data structures are increasingly used in settings where these assumptions may be violated. This work provides a provable security treatment of probabilistic data structures in adversarial environments. We give a syntax that captures a wide variety of in-use structures, and our security notions support development of error bounds in the presence of powerful attacks. Concretely, we primarily focus on examining the widely used Bloom filter, but also consider counting (Bloom) filters and count-min sketch data structures. For the traditional version of these, our security findings are largely negative; however, we show that simple embellishments (e.g., using salts, or secret keys) yields structures that provide provable security, and with little overhead.
引用
收藏
页码:1317 / 1334
页数:18
相关论文
共 28 条
[1]  
[Anonymous], 2014, P 10 ACM INT C EM NE
[2]  
[Anonymous], 1993, ACM CCS 1993, DOI DOI 10.1145/168588.168596
[3]  
Bellare M., 2006, EUROCRYPT 2006
[4]  
BELLOVIN S, 2004, 2004022 CRYPT EPRINT
[5]   SPACE/TIME TRADE/OFFS IN HASH CODING WITH ALLOWABLE ERRORS [J].
BLOOM, BH .
COMMUNICATIONS OF THE ACM, 1970, 13 (07) :422-&
[6]  
Broder Andrei, 2004, INTERNET MATH, V1, P4
[7]  
Byers John W., 2004, IEEE ACM T NETWORK, V12, P5
[8]  
Chazelle Bernard, 2004, SODA 2004
[9]   An improved data stream summary: the count-min sketch and its applications [J].
Cormode, G ;
Muthukrishnan, S .
JOURNAL OF ALGORITHMS-COGNITION INFORMATICS AND LOGIC, 2005, 55 (01) :58-75
[10]  
Dean J, 2004, USENIX ASSOCIATION PROCEEDINGS OF THE SIXTH SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION (OSDE '04), P137