Author:
Chen Haobin,Yang Yue,Lv Siyi
Abstract
AbstractDeterministic encryption (DET) allows for fast retrieval of encrypted information, but it would cause significant leakage of frequency information of the underlying data, which results in an array of inference attacks. Simply replacing DET with fully randomized encryption is often undesirable in the scenario of an encrypted database since it incurs a large overhead in query and storage. Frequency Smoothing Encryption (FSE) is a practical encryption scheme to protect frequency information. Current FSE constructions still fall short of efficiency and a reasonable security definition. We revisit FSE and propose two security definitions from both theoretical and practical perspectives. Furthermore, we adopt a novel partitioning strategy to construct a new FSE scheme to improve performance. Experimental results show that compared with others, our scheme achieves excellent query performance while attaining security against inference attacks.
Publisher
Springer Science and Business Media LLC
Reference23 articles.
1. Antonopoulos P, Arasu A, Singh KD, Eguro K, Gupta N, Jain R, Kaushik R, Kodavalla H, Kossmann D, Ogg N, et al (2020) Azure sql database always encrypted. In: Proceedings of the 2020 ACM SIGMOD international conference on management of data, pp 1511–1525
2. Arasu A, Blanas S, Eguro K, Joglekar M, Kaushik R, Kossmann D, Ramamurthy R, Upadhyaya P, Venkatesan R (2013) Secure database-as-a-service with cipherbase. In: Proceedings of the ACM SIGMOD international conference on management of data, pp 1033–1036. ACM Press, New York, New York, USA
3. Bindschaedler V, Grubbs P, Tech C, Cash D, Ristenpart T, Shmatikov V (2018) The tao of inference in privacy-protected databases. Proc VLDB Endow 11(5):1
4. Bureau UC (2015) American community survey (ACS) 2015. http://www.census.gov/programs-surveys/acs/
5. Cash D, Grubbs P, Perry J, Ristenpart T (2015) Leakage-abuse attacks against searchable encryption. In: Proceedings of the 22nd ACM SIGSAC conference on computer and communications security, vol. 2015-Octob, pp 668–679. ACM, New York, NY, USA