Access Pattern disclosure on Searchable Encryption: Ramification, Attack and Mitigation
@inproceedings{Islam2012AccessPD, title={Access Pattern disclosure on Searchable Encryption: Ramification, Attack and Mitigation}, author={M. S. Islam and M. Kuzu and Murat Kantarcioglu}, booktitle={NDSS}, year={2012} }
The advent of cloud computing has ushered in an era of mass data storage in remote servers. [...] Key Method Additionally, we propose a simple technique to mitigate the risk against the proposed attack at the expense of a slight increment in computational resources and communication cost. Furthermore, our proposed mitigation technique is generic enough to be used in conjunction with any searchable encryption scheme that reveals data access pattern.Expand
Supplemental Presentations
481 Citations
Search pattern leakage in searchable encryption: Attacks and new construction
- Computer Science
- Inf. Sci.
- 2014
- 135
- Highly Influenced
- PDF
Analysis of heuristic based access pattern obfuscation
- Computer Science
- 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing
- 2013
A multi-server oblivious dynamic searchable encryption framework
- Computer Science
- J. Comput. Secur.
- 2019
- 2
- PDF
Preserving Access Pattern Privacy in SGX-Assisted Encrypted Search
- Computer Science
- 2018 27th International Conference on Computer Communication and Networks (ICCCN)
- 2018
- 12
A Leakage-Abuse Attack Against Multi-User Searchable Encryption
- Computer Science
- Proc. Priv. Enhancing Technol.
- 2017
- 22
- PDF
Practical and secure dynamic searchable encryption via oblivious access on distributed data structure
- Computer Science
- ACSAC
- 2016
- 22
- PDF
Inference attack against encrypted range queries on outsourced databases
- Computer Science
- CODASPY '14
- 2014
- 43
- PDF
Differentially Private Searchable Symmetric Encryption Scheme with Configurable Pattern Leakage
- Computer Science
- 2019
- Highly Influenced
References
SHOWING 1-10 OF 28 REFERENCES
Practical techniques for searches on encrypted data
- Computer Science
- Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000
- 2000
- 2,978
- Highly Influential
- PDF
Searchable symmetric encryption: Improved definitions and efficient constructions
- Computer Science
- J. Comput. Secur.
- 2011
- 865
- Highly Influential
- PDF
Building castles out of mud: practical access pattern privacy and correctness on untrusted storage
- Computer Science
- CCS
- 2008
- 273
- Highly Influential
- PDF
Hiding data accesses in steganographic file system
- Computer Science
- Proceedings. 20th International Conference on Data Engineering
- 2004
- 30
- PDF
Traffic Analysis Attacks on a Continuously-Observable Steganographic File System
- Computer Science
- Information Hiding
- 2007
- 15
- PDF