2017 IEEE Symposium on Security and Privacy (SP) 2017
DOI: 10.1109/sp.2017.10
|View full text |Cite
|
Sign up to set email alerts
|

SoK: Cryptographically Protected Database Search

Abstract: Abstract-Protected database search systems cryptographically isolate the roles of reading from, writing to, and administering the database. This separation limits unnecessary administrator access and protects data in the case of system breaches. Since protected search was introduced in 2000, the area has grown rapidly; systems are offered by academia, start-ups, and established companies.However, there is no best protected search system or set of techniques. Design of such systems is a balancing act between se… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
51
0
7

Year Published

2018
2018
2021
2021

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 86 publications
(59 citation statements)
references
References 113 publications
1
51
0
7
Order By: Relevance
“…The MSDB leakage-based attack targets on specific ORE schemes with specific leaky information, i.e., orders of underlying plaintexts and the first different bit of [44] Notes: The meaning of each bubble type is given below. Part of the summary listed here has been done in [15] and the superscripts around the corresponding indicators represent the attack number for each prior work paper that presents several attacks. Required leakage Auxiliary knowledge Runtime Keyword universe tested -structure -contents of full dataset -more than quadratic -more than 1000 -equality -contents of a subset of dataset -quadratic -less than 500 -all the search tokens -linear -distributional knowledge of dataset -a subset of search tokens -distributional knowledge of queries -keyword universe plaintexts.…”
Section: Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…The MSDB leakage-based attack targets on specific ORE schemes with specific leaky information, i.e., orders of underlying plaintexts and the first different bit of [44] Notes: The meaning of each bubble type is given below. Part of the summary listed here has been done in [15] and the superscripts around the corresponding indicators represent the attack number for each prior work paper that presents several attacks. Required leakage Auxiliary knowledge Runtime Keyword universe tested -structure -contents of full dataset -more than quadratic -more than 1000 -equality -contents of a subset of dataset -quadratic -less than 500 -all the search tokens -linear -distributional knowledge of dataset -a subset of search tokens -distributional knowledge of queries -keyword universe plaintexts.…”
Section: Attacksmentioning
confidence: 99%
“…In the literature there are some review papers [15,19,37] related to the security of efficient searchable encryption. However, they have different focuses from us.…”
Section: Related Workmentioning
confidence: 99%
“…These includes the Boolean search scheme [41], the scheme with improved locality [42] and a leakage suppression scheme [43]. Comprehensive surveys on searchable encryption can be found in [44], [45], [46].…”
Section: Queries On Encrypted Datamentioning
confidence: 99%
“…Recently the survey [13] categorized the entire field of encrypted or protected search, which offers several additional alternatives to our work. We can imagine a combination of the presented techniques with our ideas as possible future work.…”
Section: Related Privacy-preserving Technologiesmentioning
confidence: 99%