2018
DOI: 10.1007/s10115-018-1309-4
|View full text |Cite
|
Sign up to set email alerts
|

Searchable encryption approaches: attacks and challenges

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 63 publications
0
7
0
Order By: Relevance
“…A frequency analysis attack is one of the known ciphertext attacks. It is built on studying the frequency of letters or collections of letters in a ciphertext [24]. Hence, it takes advantage of the frequency of encrypted data uploaded to 𝑆𝐼, which is either term frequency 𝑇𝐹 or term frequencyinverse 𝑇𝐹_𝐼𝐷𝐹.…”
Section: ▪ Frequency Analysis Attackmentioning
confidence: 99%
See 1 more Smart Citation
“…A frequency analysis attack is one of the known ciphertext attacks. It is built on studying the frequency of letters or collections of letters in a ciphertext [24]. Hence, it takes advantage of the frequency of encrypted data uploaded to 𝑆𝐼, which is either term frequency 𝑇𝐹 or term frequencyinverse 𝑇𝐹_𝐼𝐷𝐹.…”
Section: ▪ Frequency Analysis Attackmentioning
confidence: 99%
“…The 𝐶𝑆 can then compute the probability of appearance of any two of these keywords in any document by observing the number of the same documents reverted for those corresponding trapdoors. By continuing the search and leaking the access pattern, thereby obtaining more probabilities, the server will be able to access the keywords that correspond to the trapdoors [24]. After a modest clarification of this attack, we can say that our scheme resists the IKK attack because the search result by the CS is encrypted, and the access pattern does not leak any important information.…”
mentioning
confidence: 92%
“…(b) Frequency Analysis Attack: This attack aims to deduce the plaintext index keyword from the encrypted TF values of the encrypted index [11,7]. It is based on the premise that the distribution details of plaintext TF values and the corresponding encrypted TF values will be the same for some specific keywords.…”
Section: Preliminariesmentioning
confidence: 99%
“…This scheme guarantees user to store the data on cloud after encryption and also makes easy to search operations on encrypted data. D. V. N. Siva Kumar [13] presented a brief review on all existing searchable encryption with respect to accuracy and security and also provided few remedial solutions for current existing problems like searching for a file in encrypted database which is present on cloud. Zuojie Deng et.al [14] proposed multiuser searchable encryption where users will encrypt the files before sending to cloud and also allows other users, who are authorized by cloud data owners to perform search operations on these files.…”
Section: Related Workmentioning
confidence: 99%