Update recovery attacks on encrypted database within two updates using range queries leakage
Recently, reconstruction attacks on static encrypted database supporting range queries have been proposed. However, attacks on encrypted database within two updates in the similar setting have not been studied extensively. As far as we know, the only work is the update recovery attack presented by G...
Saved in:
Main Authors: | , , , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2022
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/5998 https://ink.library.smu.edu.sg/context/sis_research/article/7001/viewcontent/Update_recovery_attacks_on_encrypted_database_2020_av.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-7001 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-70012022-08-10T07:13:47Z Update recovery attacks on encrypted database within two updates using range queries leakage NING, Jianting POH, Geong Sen HUANG, Xinyi DENG, Robert H. CAO, Shuwei CHANG, Ee-Chien Recently, reconstruction attacks on static encrypted database supporting range queries have been proposed. However, attacks on encrypted database within two updates in the similar setting have not been studied extensively. As far as we know, the only work is the update recovery attack presented by Grubbs et al. (CCS 2018). Following their seminal work, we present new update recovery attacks for dense dataset (i.e. at least one record corresponding to each value in the range), which enable a deeper understanding of the impact caused by leakages due to updates on dynamic encrypted database. Our first attack aims at recovering the value of a newly added record in the case of one database update. We further demonstrate that the attack can fully reconstruct the database counts if the updated value is either the minimum or maximum in the range. We then consider a setting where two distinct records are added separately, which leads to our second attack. We next extend our attacks to the setting where the update operation is deletion. To the best of our knowledge, update recovery attack on database supporting deletion has not been considered before. We demonstrate practicality of our attack via extensive simulations using real dataset. 2022-03-01T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/5998 info:doi/10.1109/TDSC.2020.3015997 https://ink.library.smu.edu.sg/context/sis_research/article/7001/viewcontent/Update_recovery_attacks_on_encrypted_database_2020_av.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Dynamic encrypted database information leakage range query update recovery attacks Information Security |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Dynamic encrypted database information leakage range query update recovery attacks Information Security |
spellingShingle |
Dynamic encrypted database information leakage range query update recovery attacks Information Security NING, Jianting POH, Geong Sen HUANG, Xinyi DENG, Robert H. CAO, Shuwei CHANG, Ee-Chien Update recovery attacks on encrypted database within two updates using range queries leakage |
description |
Recently, reconstruction attacks on static encrypted database supporting range queries have been proposed. However, attacks on encrypted database within two updates in the similar setting have not been studied extensively. As far as we know, the only work is the update recovery attack presented by Grubbs et al. (CCS 2018). Following their seminal work, we present new update recovery attacks for dense dataset (i.e. at least one record corresponding to each value in the range), which enable a deeper understanding of the impact caused by leakages due to updates on dynamic encrypted database. Our first attack aims at recovering the value of a newly added record in the case of one database update. We further demonstrate that the attack can fully reconstruct the database counts if the updated value is either the minimum or maximum in the range. We then consider a setting where two distinct records are added separately, which leads to our second attack. We next extend our attacks to the setting where the update operation is deletion. To the best of our knowledge, update recovery attack on database supporting deletion has not been considered before. We demonstrate practicality of our attack via extensive simulations using real dataset. |
format |
text |
author |
NING, Jianting POH, Geong Sen HUANG, Xinyi DENG, Robert H. CAO, Shuwei CHANG, Ee-Chien |
author_facet |
NING, Jianting POH, Geong Sen HUANG, Xinyi DENG, Robert H. CAO, Shuwei CHANG, Ee-Chien |
author_sort |
NING, Jianting |
title |
Update recovery attacks on encrypted database within two updates using range queries leakage |
title_short |
Update recovery attacks on encrypted database within two updates using range queries leakage |
title_full |
Update recovery attacks on encrypted database within two updates using range queries leakage |
title_fullStr |
Update recovery attacks on encrypted database within two updates using range queries leakage |
title_full_unstemmed |
Update recovery attacks on encrypted database within two updates using range queries leakage |
title_sort |
update recovery attacks on encrypted database within two updates using range queries leakage |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2022 |
url |
https://ink.library.smu.edu.sg/sis_research/5998 https://ink.library.smu.edu.sg/context/sis_research/article/7001/viewcontent/Update_recovery_attacks_on_encrypted_database_2020_av.pdf |
_version_ |
1770575732936802304 |