2020 IEEE European Symposium on Security and Privacy (EuroS&P) 2020
DOI: 10.1109/eurosp48549.2020.00030
|View full text |Cite
|
Sign up to set email alerts
|

Practical Volume-Based Attacks on Encrypted Databases

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(11 citation statements)
references
References 46 publications
0
11
0
Order By: Relevance
“…Mitigating Other Attacks. Existing attacks can be classified into: known-data/query attacks [5,10,23], inference attacks [21,33,34,41], and injection attacks [40,54]. For the first two types, the adversary is passive and requires an amount of auxiliary information, such as a subset of target databases/queries or a statistical distribution similar to the target databases/queries.…”
Section: Security Of Hdxtmentioning
confidence: 99%
“…Mitigating Other Attacks. Existing attacks can be classified into: known-data/query attacks [5,10,23], inference attacks [21,33,34,41], and injection attacks [40,54]. For the first two types, the adversary is passive and requires an amount of auxiliary information, such as a subset of target databases/queries or a statistical distribution similar to the target databases/queries.…”
Section: Security Of Hdxtmentioning
confidence: 99%
“…Those attacks aim to improve plaintext recovery rate without pre-fixed query distribution. There are also recent attacks that purely exploit size pattern leakage [21], [22], [23], [24], [25]. In summary, forward and backward private SSE schemes are still vulnerable to many leakage-abuse attacks.…”
Section: Leakages and Attacks Of Dssementioning
confidence: 99%
“…In particular, Blackstone et al [21] proposed attacks that rely on much weaker assumptions by only exploiting document size information, which can be applied not only to SSE with standard leakage but also to ORAM. Similarly, several attacks [22], [23], [24], [25] to encrypted database that only exploit size pattern leakage were also proposed. All these attacks emphasize that even seemingly harmless size pattern can be used to perform severe attacks.…”
Section: Ignored Size Pattern Leakagementioning
confidence: 99%
“…Since their inception [8,34], many authors have proposed SSE schemes with different privacy and utility trade-offs. Design-ing SSE schemes without access pattern leakage implies leveraging expensive primitives such as ORAM [11] or PIR [7], which incurs expensive bandwidth, computational, and storage costs, while still being vulnerable to certain volume-based attacks [14,19,30]. In this work we target efficient and deployable SSE schemes that leak the access and search patterns [2,4,5,8,16,18,21,22,26,27,34,35].…”
Section: Related Workmentioning
confidence: 99%