2014
DOI: 10.1016/j.ins.2013.11.021
|View full text |Cite
|
Sign up to set email alerts
|

Search pattern leakage in searchable encryption: Attacks and new construction

Abstract: Searching on remote encrypted data (commonly known as searchable encryption) has become an important issue in secure data outsourcing, since it allows users to outsource encrypted data to an untrusted third party while maintains the capability of keyword search on the data.Searchable encryption can be achieved using the classical method called oblivious RAM, but the resultant schemes are too inefficient to be applied in the real-world scenarios (e.g., cloud computing). Recently, a number of efficient searchabl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

2
118
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 177 publications
(120 citation statements)
references
References 17 publications
2
118
0
Order By: Relevance
“…Recent papers on leakage-abuse attacks [6,12,15,21,22,32] show that the threat caused by prior knowledge is becoming a matter of concern in single-user SE. This threat is even more serious in the multi-user setting where the dataset is owned and accessed by a number of users and users do not trust other users except the ones they explicitly authorize to search their data.…”
Section: Leakage-abuse Attacks Against Musementioning
confidence: 99%
“…Recent papers on leakage-abuse attacks [6,12,15,21,22,32] show that the threat caused by prior knowledge is becoming a matter of concern in single-user SE. This threat is even more serious in the multi-user setting where the dataset is owned and accessed by a number of users and users do not trust other users except the ones they explicitly authorize to search their data.…”
Section: Leakage-abuse Attacks Against Musementioning
confidence: 99%
“…It is an approach to outsource data with the aim of decreasing the data storage and reducing the management issues [21]. Main benefits of cloud computing implementation are: less infrastructure investment, convenience, flexibility, enhanced performance and cost reduction [5].…”
Section: Cloud Computingmentioning
confidence: 99%
“…Revealing the search pattern in SSE schemes is a serious problem, as it allows an attacker to perform statistical analysis on the occurrence frequency of each query. This allows an attacker to gain knowledge on the underlying plaintext keywords, rendering the encryption scheme less useful (as is convincingly demonstrated by Liu et al [20]). The problem of leaking the search pattern is not only recognized in the setting of SSE, but also in the setting of predicate encryption [25].…”
Section: Introductionmentioning
confidence: 97%