Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3576915.3623085acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Leakage-Abuse Attacks Against Forward and Backward Private Searchable Symmetric Encryption

Published: 21 November 2023 Publication History

Abstract

Dynamic searchable symmetric encryption (DSSE) enables a server to efficiently search and update over encrypted files. To minimize the leakage during updates, a security notion named forward and backward privacy is expected for newly proposed DSSE schemes. Those schemes are generally constructed in a way to break the linkability across search and update queries to a given keyword. However, it remains underexplored whether forward and backward private DSSE is resilient against practical leakage-abuse attacks (LAAs), where an attacker attempts to recover query keywords from the leakage passively collected during queries.
In this paper, we aim to be the first to answer this question firmly through two non-trivial efforts. First, we revisit the spectrum of forward and backward private DSSE schemes over the past few years, and unveil some inherent constructional limitations in most schemes. Those limitations allow attackers to exploit query equality and establish a guaranteed linkage among different (refreshed) query tokens surjective to a candidate keyword. Second, we refine volumetric leakage profiles of updates and queries by associating each with a specific operation. By further exploiting update volume and query response volume, we demonstrate that all forward and backward private DSSE schemes can leak the same volumetric information (e.g., insertion volume, deletion volume) as those without such security guarantees. To testify our findings, we realize two generic LAAs, i.e., frequency matching attack and volumetric inference attack, and we evaluate them over various experimental settings in the dynamic context. Finally, we call for new efficient schemes to protect query equality and volumetric information across search and update queries.

References

[1]
Ghous Amjad, Sarvar Patel, Giuseppe Persiano, Kevin Yeo, and Moti Yung. 2023. Dynamic Volume-Hiding Encrypted Multi-Maps with Applications to Searchable Encryption. In Proc. of PETS.
[2]
Vincent Bindschaedler, Paul Grubbs, David Cash, Thomas Ristenpart, and Vitaly Shmatikov. 2018. The Tao of Inference in Privacy-Protected Databases. PVLDB, Vol. 11, 11 (2018), 1715--1728.
[3]
Laura Blackstone, Seny Kamara, and Tarik Moataz. 2020. Revisiting Leakage Abuse Attacks. In Proc. of NDSS.
[4]
Angèle Bossuat, Raphael Bost, Pierre-Alain Fouque, Brice Minaud, and Michael Reichle. 2021. SSE and SSD: page-efficient searchable symmetric encryption. In Proc. of CRYPTO.
[5]
Raphael Bost. 2016. (sum)o(varphi)o(varsigma): Forward Secure Searchable Encryption. In Proc. of the ACM CCS.
[6]
Raphael Bost and Pierre-Alain Fouque. 2017. Thwarting Leakage Abuse Attacks against Searchable Encryption - A Formal Approach and Applications to Database Padding. Cryptology ePrint Archive.
[7]
Raphaël Bost, Brice Minaud, and Olga Ohrimenko. 2017. Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives. In Proc. of ACM CCS.
[8]
David Cash, Paul Grubbs, Jason Perry, and Thomas Ristenpart. 2015. Leakage-Abuse Attacks Against Searchable Encryption. In Proc. of ACM CCS.
[9]
David Cash, Joseph Jaeger, Stanislaw Jarecki, Charanjit S. Jutla, Hugo Krawczyk, Marcel-Catalin Rosu, and Michael Steiner. 2014. Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation. In Proc. of NDSS.
[10]
Javad Ghareh Chamani, Dimitrios Papadopoulos, Mohammadamin Karbasforushan, and Ioannis Demertzis. 2022. Dynamic Searchable Encryption with Optimal Search in the Presence of Deletions. In Proc. of USENIX Security.
[11]
Javad Ghareh Chamani, Dimitrios Papadopoulos, Charalampos Papamanthou, and Rasool Jalili. 2018. New Constructions for Forward and Backward Private Symmetric Searchable Encryption. In Proc. of ACM CCS.
[12]
Melissa Chase and Seny Kamara. 2010. Structured Encryption and Controlled Disclosure. In Proc. of ASIACRYPT.
[13]
Guoxing Chen, Ten-Hwang Lai, Michael K. Reiter, and Yinqian Zhang. 2018. Differentially Private Access Patterns for Searchable Symmetric Encryption. In Proc. of IEEE INFOCOM.
[14]
Marc Damie, Florian Hahn, and Andreas Peter. 2021. A Highly Accurate Query-Recovery Attack against Searchable Encryption using Non-Indexed Documents. In Proc. of USENIX Security.
[15]
Ioannis Demertzis, Dimitrios Papadopoulos, Charalampos Papamanthou, and Saurabh Shintre. 2020. SEAL: Attack Mitigation for Encrypted Databases via Adjustable Leakage. In Proc. of Usenix Security.
[16]
Ioannis Demertzis, Stavros Papadopoulos, Odysseas Papapetrou, Antonios Deligiannakis, and Minos N. Garofalakis. 2016. Practical Private Range Search Revisited. In Proc. of ACM SIGMOD.
[17]
F. Betü l Durak, Thomas M. DuBuisson, and David Cash. 2016. What Else is Revealed by Order-Revealing Encryption?. In Pro. of ACM CCS.
[18]
Enron Email Dataset. 2015. Online at: https://www.cs.cmu.edu/./enron.
[19]
Francesca Falzon, Evangelia Anna Markatou, Akshima, David Cash, Adam Rivkin, Jesse Stern, and Roberto Tamassia. 2020. Full Database Reconstruction in Two Dimensions. In Proc. of ACM CCS.
[20]
Sanjam Garg, Payman Mohassel, and Charalampos Papamanthou. 2016. TWORAM: Efficient Oblivious RAM in Two Rounds with Applications to Searchable Encryption. In Proc. of CRYPTO.
[21]
Marilyn George, Seny Kamara, and Tarik Moataz. 2021. Structured Encryption and Dynamic Leakage Suppression. In Proc. of EUROCRYPT.
[22]
Google. 2022. Google Trends. https://trends.google.com/trends/?geo=HK.
[23]
Google. 2023. FAQ about Google Trends data. https://support.google.com/trends/answer/4365533?hl=en.
[24]
Paul Grubbs, Anurag Khandelwal, Marie-Sarah Lacharité, Lloyd Brown, Lucy Li, Rachit Agarwal, and Thomas Ristenpart. 2020. Pancake: Frequency Smoothing for Encrypted Data Stores. In Proc. of USENIX Security.
[25]
Paul Grubbs, Marie-Sarah Lacharité, Brice Minaud, and Kenneth G. Paterson. 2018. Pump up the Volume: Practical Database Reconstruction from Volume Leakage on Range Queries. In Proc. of ACM CCS.
[26]
Paul Grubbs, Marie-Sarah Lacharité, Brice Minaud, and Kenneth G. Paterson. 2019. Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks. In Proc. of IEEE S&P.
[27]
Paul Grubbs, Kevin Sekniqi, Vincent Bindschaedler, Muhammad Naveed, and Thomas Ristenpart. 2017. Leakage-Abuse Attacks against Order-Revealing Encryption. In Proc. of IEEE S&P.
[28]
Zichen Gui, Oliver Johnson, and Bogdan Warinschi. 2019. Encrypted Databases: New Volume Attacks against Range Queries. In Proc. of ACM CCS.
[29]
Zichen Gui, Kenny Paterson, and Tianxin Tang. 2023 b. Security Analysis of MongoDB Queryable Encryption. In Proc. of USENIX Security.
[30]
Zicheng Gui, Kenneth G. Paterson, and Sikhar Patranabis. 2023 a. Rethinking Searchable Symmetric Encryption. In Proc. of IEEE S&P.
[31]
Mohammad Saiful Islam, Mehmet Kuzu, and Murat Kantarcioglu. 2012. Access Pattern disclosure on Searchable Encryption: Ramification, Attack and Mitigation. In Proc. of NDSS.
[32]
Seny Kamara, Abdelkarim Kati, Tarik Moataz, Thomas Schneider, Amos Treiber, and Michael Yonli. 2022. SoK: Cryptanalysis of Encrypted Search with LEAKER - A framework for LEakage AttacK Evaluation on Real-world data. In Proc. of IEEE EuroS&P.
[33]
Seny Kamara and Tarik Moataz. 2017. Boolean Searchable Symmetric Encryption with Worst-Case Sub-linear Complexity. In Proc. of EUROCRYPT.
[34]
Seny Kamara and Tarik Moataz. 2019. Computationally Volume-Hiding Structured Encryption. In Proc. of EUROCRYPT.
[35]
Seny Kamara, Tarik Moataz, and Olga Ohrimenko. 2018. Structured Encryption and Leakage Suppression. In Proc. of CRYPTO.
[36]
Seny Kamara, Tarik Moataz, Andrew Park, and Lucy Qin. 2021. A Decentralized and Encrypted National Gun Registry. In Proc. of IEEE S&P.
[37]
Seny Kamara and Charalampos Papamanthou. 2013. Parallel and Dynamic Searchable Symmetric Encryption. In Proc. of FC.
[38]
Seny Kamara, Charalampos Papamanthou, and Tom Roeder. 2012. Dynamic searchable symmetric encryption. In Proc. of ACM CCS.
[39]
Georgios Kellaris, George Kollios, Kobbi Nissim, and Adam O'Neill. 2016. Generic Attacks on Secure Outsourced Databases. In Proc. of ACM CCS.
[40]
Evgenios M. Kornaropoulos, Charalampos Papamanthou, and Roberto Tamassia. 2019. Data Recovery on Encrypted Databases With k-Nearest Neighbor Query Leakage. In Proc. of IEEE S&P.
[41]
Evgenios M. Kornaropoulos, Charalampos Papamanthou, and Roberto Tamassia. 2020. The State of the Uniform: Attacks on Encrypted Databases Beyond the Uniform Query Distribution. In Proc. of IEEE S&P.
[42]
Evgenios M. Kornaropoulos, Charalampos Papamanthou, and Roberto Tamassia. 2021. Response-Hiding Encrypted Ranges: Revisiting Security via Parametrized Leakage-Abuse Attacks. In Proc. of IEEE S&P.
[43]
Marie-Sarah Lacharité, Brice Minaud, and Kenneth G. Paterson. 2018. Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage. In Proc. IEEE S&P.
[44]
Shangqi Lai, Sikhar Patranabis, Amin Sakzad, Joseph K. Liu, Debdeep Mukhopadhyay, Ron Steinfeld, Shifeng Sun, Dongxi Liu, and Cong Zuo. 2018. Result Pattern Hiding Searchable Encryption for Conjunctive Queries. In Proc. of ACM CCS.
[45]
Lucene Email Dataset. 1999. Online at: https://lucene.apache.org/.
[46]
Evangelia Anna Markatou, Francesca Falzon, Roberto Tamassia, and William Schor. 2021. Reconstructing with Less: Leakage Abuse Attacks in Two Dimensions. In Proc. of ACM CCS.
[47]
Brice Minaud and Michael Reichle. 2022. Dynamic Local Searchable Symmetric Encryption. In Proc. of CRYPTO.
[48]
Muhammad Naveed, Seny Kamara, and Charles V. Wright. 2015. Inference Attacks on Property-Preserving Encrypted Databases. In Proc. of ACM CCS.
[49]
Muhammad Naveed, Manoj Prabhakaran, and Carl A. Gunter. 2014. Dynamic Searchable Encryption via Blind Storage. In Proc. of IEEE S&P.
[50]
Jianting Ning, Xinyi Huang, Geong Sen Poh, Jiaming Yuan, Yingjiu Li, Jian Weng, and Robert H. Deng. 2021. LEAP: Leakage-Abuse Attack on Efficiently Deployable, Efficiently Searchable Encryption with Partially Known Dataset. In Proc. of ACM CCS.
[51]
Simon Oya and Florian Kerschbaum. 2021. Hiding the Access Pattern is Not Enough: Exploiting Search Pattern Leakage in Searchable Encryption. In Proc. of USENIX Security.
[52]
Simon Oya and Florian Kerschbaum. 2022. IHOP: Improved Statistical Query Recovery against Searchable Symmetric Encryption through Quadratic Optimization. In Proc. of USENIX Security.
[53]
Yanjun Pan, Alon Efrat, Ming Li, Boyang Wang, Hanyu Quan, Joseph S. B. Mitchell, Jie Gao, and Esther M. Arkin. 2020. Data inference from encrypted databases: a multi-dimensional order-preserving matching approach. In Proc. of ACM Mobihoc.
[54]
Vasilis Pappas, Fernando Krell, Binh Vo, Vladimir Kolesnikov, Tal Malkin, Seung Geol Choi, Wesley George, Angelos D. Keromytis, and Steven M. Bellovin. 2014. Blind Seer: A Scalable Private DBMS. In Proc. of IEEE S&P.
[55]
Sarvar Patel, Giuseppe Persiano, and Kevin Yeo. 2020. Lower Bounds for Encrypted Multi-Maps and Searchable Encryption in the Leakage Cell Probe Model. In Proc. of CRYPTO.
[56]
Sarvar Patel, Giuseppe Persiano, Kevin Yeo, and Moti Yung. 2019. Mitigating Leakage in Secure Cloud-Hosted Data Structures: Volume-Hiding for Multi-Maps via Hashing. In Proc. of ACM CCS.
[57]
Rishabh Poddar, Stephanie Wang, Jianan Lu, and Raluca Ada Popa. 2020. Practical Volume-Based Attacks on Encrypted Databases. In Proc. of IEEE EuroS&P.
[58]
David Pouliot and Charles V. Wright. 2016. The Shadow Nemesis: Inference Attacks on Efficiently Deployable, Efficiently Searchable Encryption. In Proc. of ACM CCS.
[59]
Zhiwei Shang, Simon Oya, Andreas Peter, and Florian Kerschbaum. 2021. Obfuscated Access and Search Patterns in Searchable Encryption. In Proc. of NDSS.
[60]
Emil Stefanov, Charalampos Papamanthou, and Elaine Shi. 2014. Practical Dynamic Searchable Encryption with Small Leakage. In Proc. of NDSS.
[61]
Shifeng Sun, Ron Steinfeld, Shangqi Lai, Xingliang Yuan, Amin Sakzad, Joseph K. Liu, Surya Nepal, and Dawu Gu. 2021. Practical Non-Interactive Searchable Encryption with Forward and Backward Privacy. In Proc. of NDSS.
[62]
Shifeng Sun, Xingliang Yuan, Joseph K. Liu, Ron Steinfeld, Amin Sakzad, Viet Vo, and Surya Nepal. 2018. Practical Backward-Secure Searchable Encryption from Symmetric Puncturable Encryption. In Proc. of ACM CCS.
[63]
Viet Vo, Shangqi Lai, Xingliang Yuan, Shifeng Sun, Surya Nepal, and Joseph K. Liu. 2020. Accelerating Forward and Backward Private Searchable Encryption Using Trusted Execution. In Proc. of ACNS.
[64]
Viet Vo, Xingliang Yuan, Shi-Feng Sun, Joseph K. Liu, Surya Nepal, and Cong Wang. 2023. ShieldDB: An Encrypted Document Database With Padding Countermeasures. IEEE Trans. Knowl. Data Eng., Vol. 35, 4 (2023), 4236--4252.
[65]
Jianfeng Wang, Shifeng Sun, Tianci Li, Saiyu Qi, and Xiaofeng Chen. 2022. Practical Volume-Hiding Encrypted Multi-Maps with Optimal Overhead and Beyond. In Proc. of ACM CCS.
[66]
Tianhao Wang and Yunlei Zhao. 2016. Secure Dynamic SSE via Access Indistinguishable Storage. In Proc. of ACM AsiaCCS.
[67]
Lei Xu, Huayi Duan, Anxin Zhou, Xingliang Yuan, and Cong Wang. 2021. Interpreting and Mitigating Leakage-Abuse Attacks in Searchable Symmetric Encryption. IEEE Trans. Inf. Forensics Secur., Vol. 16 (2021), 5310--5325.
[68]
Lei Xu, Xingliang Yuan, Cong Wang, Qian Wang, and Chungen Xu. 2019. Hardening Database Padding for Searchable Encryption. In Proc.of IEEE INFOCOM.
[69]
Lei Xu, Leqian Zheng, Chengzhi Xu, and Xingliang Yuan Cong Wang and. 2023. Leakage-Abuse Attacks Against Forward and Backward Private Searchable Symmetric Encryption. CoRR (2023).
[70]
Lei Xu, Anxin Zhou, Huayi Duan, Cong Wang, Qian Wang, and Xiaohua Jia. 2022. Toward Full Accounting for Leakage Exploitation and Mitigation in Dynamic Encrypted Databases. IEEE Trans. Dependable Secur. Comput. (2022).
[71]
Xianglong Zhang, Wei Wang, Peng Xu, Laurence T. Yang, and Kaitai Liang. 2023. High Recovery with Fewer Injections: Practical Binary Volumetric Injection Attacks against Dynamic Searchable Encryption. In Proc. of USENIX Security.
[72]
Yupeng Zhang, Jonathan Katz, and Charalampos Papamanthou. 2015. All Your Queries Are Belong to Us: The Power of File-Injection Attacks on Searchable Encryption. In Proc. of USENIX Security.

Cited By

View all
  • (2025)Data Protection and Encryption in Cloud Network SecurityConvergence of Cybersecurity and Cloud Computing10.4018/979-8-3693-6859-6.ch017(377-402)Online publication date: 10-Jan-2025
  • (2025)Query Correlation Attack Against Searchable Symmetric Encryption With Supporting for Conjunctive QueriesIEEE Transactions on Information Forensics and Security10.1109/TIFS.2025.353069220(1924-1936)Online publication date: 2025
  • (2024)Leakage-abuse attacks against structured encryption for SQLProceedings of the 33rd USENIX Conference on Security Symposium10.5555/3698900.3699314(7411-7428)Online publication date: 14-Aug-2024
  • Show More Cited By

Index Terms

  1. Leakage-Abuse Attacks Against Forward and Backward Private Searchable Symmetric Encryption

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security
      November 2023
      3722 pages
      ISBN:9798400700507
      DOI:10.1145/3576915
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 21 November 2023

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. forward and backward privacy
      2. leakage attacks
      3. searchable encryption
      4. vulnerabilities

      Qualifiers

      • Research-article

      Funding Sources

      Conference

      CCS '23
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

      Upcoming Conference

      CCS '25

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)304
      • Downloads (Last 6 weeks)19
      Reflects downloads up to 19 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2025)Data Protection and Encryption in Cloud Network SecurityConvergence of Cybersecurity and Cloud Computing10.4018/979-8-3693-6859-6.ch017(377-402)Online publication date: 10-Jan-2025
      • (2025)Query Correlation Attack Against Searchable Symmetric Encryption With Supporting for Conjunctive QueriesIEEE Transactions on Information Forensics and Security10.1109/TIFS.2025.353069220(1924-1936)Online publication date: 2025
      • (2024)Leakage-abuse attacks against structured encryption for SQLProceedings of the 33rd USENIX Conference on Security Symposium10.5555/3698900.3699314(7411-7428)Online publication date: 14-Aug-2024
      • (2024)SWAT: A System-Wide Approach to Tunable Leakage Mitigation in Encrypted Data StoresProceedings of the VLDB Endowment10.14778/3675034.367503817:10(2445-2458)Online publication date: 6-Aug-2024
      • (2024)Evaluating Leakage Attacks Against Relational Encrypted SearchProceedings of the 2024 on Cloud Computing Security Workshop10.1145/3689938.3694776(15-28)Online publication date: 19-Nov-2024
      • (2024)Exploiting Update Leakage in Searchable Symmetric EncryptionProceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy10.1145/3626232.3653260(115-126)Online publication date: 19-Jun-2024
      • (2024)Encrypted Multi-map that Hides Query, Access, and Volume PatternsSecurity and Cryptography for Networks10.1007/978-3-031-71070-4_11(230-251)Online publication date: 11-Sep-2024

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media