Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security 2019
DOI: 10.1145/3319535.3354213
|View full text |Cite
|
Sign up to set email alerts
|

Mitigating Leakage in Secure Cloud-Hosted Data Structures

Abstract: Volume leakage has recently been identified as a major threat to the security of cryptographic cloud-based data structures by Kellaris et al. [CCS'16] (see also the attacks in Grubbs et al. [CCS'18] and Lacharité et al. [S&P'18]). In this work, we focus on volume-hiding implementations of encrypted multi-maps as first considered by Kamara and Moataz [Eurocrypt'19]. Encrypted multi-maps consist of outsourcing the storage of a multi-map to an untrusted server, such as a cloud storage system, while maintaining … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
132
0
1

Year Published

2020
2020
2021
2021

Publication Types

Select...
6
2
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 75 publications
(133 citation statements)
references
References 44 publications
0
132
0
1
Order By: Relevance
“…The storage overhead of AVLH is comparable to the overhead of BSL. Recent volume-hiding results by Patel, Persiano, Yeo and Yung [61] show how to get even better query complexity and storage overhead.…”
Section: Countermeasuresmentioning
confidence: 99%
“…The storage overhead of AVLH is comparable to the overhead of BSL. Recent volume-hiding results by Patel, Persiano, Yeo and Yung [61] show how to get even better query complexity and storage overhead.…”
Section: Countermeasuresmentioning
confidence: 99%
“…To an adversary observing memory accesses to the cuckoo tables, those two cases are indistinguishable. This feature makes cuckoo hashing attractive as a basis for oblivious hashing algorithms [CGLS17], with applications to Oblivious RAM and other cryptographic constructions, such as differentially-private SSE [PPYY19].…”
Section: Discussionmentioning
confidence: 99%
“…To enable detection, analysis, or process on encrypted traffic with outsourced (encrypted) network functions, more information will be disclosed than the traditional unmanageable encrypted packets (e.g., HTTPs traffic). For example, the SSE-based methods may be vulnerable to the leakage-abuse attacks [141], [147], [149], [150]. The deterministic search tokens reveal the statistical distribution of the traffic.…”
Section: Attacks On Outsourced Network Functionsmentioning
confidence: 99%