Corpus ID: 12703012

Access Pattern disclosure on Searchable Encryption: Ramification, Attack and Mitigation

@inproceedings{Islam2012AccessPD,
  title={Access Pattern disclosure on Searchable Encryption: Ramification, Attack and Mitigation},
  author={M. S. Islam and M. Kuzu and Murat Kantarcioglu},
  booktitle={NDSS},
  year={2012}
}
The advent of cloud computing has ushered in an era of mass data storage in remote servers. [...] Key Method Additionally, we propose a simple technique to mitigate the risk against the proposed attack at the expense of a slight increment in computational resources and communication cost. Furthermore, our proposed mitigation technique is generic enough to be used in conjunction with any searchable encryption scheme that reveals data access pattern.Expand
481 Citations
Search pattern leakage in searchable encryption: Attacks and new construction
  • 135
  • Highly Influenced
  • PDF
Analysis of heuristic based access pattern obfuscation
Efficient privacy-aware search over encrypted databases
  • 12
  • PDF
Distributed Search over Encrypted Big Data
  • 15
A multi-server oblivious dynamic searchable encryption framework
  • 2
  • PDF
Preserving Access Pattern Privacy in SGX-Assisted Encrypted Search
  • 12
A Leakage-Abuse Attack Against Multi-User Searchable Encryption
  • 22
  • PDF
Practical and secure dynamic searchable encryption via oblivious access on distributed data structure
  • 22
  • PDF
Differentially Private Searchable Symmetric Encryption Scheme with Configurable Pattern Leakage
  • Highly Influenced
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 28 REFERENCES
Poster: inference attacks against searchable encryption protocols
  • 5
Practical techniques for searches on encrypted data
  • 2,978
  • Highly Influential
  • PDF
Privacy Preserving Keyword Searches on Remote Encrypted Data
  • 1,048
  • PDF
Searchable symmetric encryption: Improved definitions and efficient constructions
  • 865
  • Highly Influential
  • PDF
Secure Indexes
  • Eu-Jin Goh
  • Computer Science
  • IACR Cryptol. ePrint Arch.
  • 2003
  • 813
  • Highly Influential
  • PDF
Building castles out of mud: practical access pattern privacy and correctness on untrusted storage
  • 273
  • Highly Influential
  • PDF
Hiding data accesses in steganographic file system
  • 30
  • PDF
Public Key Encryption That Allows PIR Queries
  • 269
  • PDF
On anonymizing query logs via token-based hashing
  • 100
  • PDF
...
1
2
3
...