2010
DOI: 10.1007/978-3-642-13651-1_15
|View full text |Cite
|
Sign up to set email alerts
|

Ensuring Data Storage Security against Frequency-Based Attacks in Wireless Networks

Abstract: Abstract. As wireless networks become more pervasive, the amount of the wireless data is rapidly increasing. One of the biggest challenges is how to store these data. To address this challenge, distributed data storage in wireless networks has attracted much attention recently, as it has major advantages over centralized approaches. To support the widespread adoption of distributed data storage, secure data storage must be achieved. In this work, we study the frequency-based attack, a type of attack that is di… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 19 publications
(9 citation statements)
references
References 13 publications
0
9
0
Order By: Relevance
“…Despite its authors' warning of lingering unanswered questions, the OPE scheme from [8] immediately received attention from the applied community [21,20,18,17,14]. We agree that a secure OPE is better than no encryption at all and understand why the idea of its implementation may sound appealing.…”
Section: Introductionmentioning
confidence: 94%
“…Despite its authors' warning of lingering unanswered questions, the OPE scheme from [8] immediately received attention from the applied community [21,20,18,17,14]. We agree that a secure OPE is better than no encryption at all and understand why the idea of its implementation may sound appealing.…”
Section: Introductionmentioning
confidence: 94%
“…2. Frequency attack: Frequency attacks are still possible on the keyed masking approach (without knowing the secret key), where the frequency distribution of a set of masked values matches the distribution of known global values [40].…”
Section: Introductionmentioning
confidence: 99%
“…Dataflow obfuscation: all data (queries and tuples) exchanged between the querier and the TDSs, and between TDSs themselves, can be spied by SSI and must therefore be encrypted. However, an honest-but-curious SSI can try to conduct frequency-based attacks [Liu et al 2010], i.e., exploiting prior knowledge about the data distribution to infer the plaintext values of ciphertexts. Depending on the protocols (see later), two kinds of encryption schemes will be used to prevent frequency-based attacks.…”
Section: Core Infrastructurementioning
confidence: 99%