Update recovery attacks on encrypted database within two updates using range queries leakage

Recently, reconstruction attacks on static encrypted database supporting range queries have been proposed. However, attacks on encrypted database within two updates in the similar setting have not been studied extensively. As far as we know, the only work is the update recovery attack presented by G...

Full description

Saved in:
Bibliographic Details
Main Authors: NING, Jianting, POH, Geong Sen, HUANG, Xinyi, DENG, Robert H., CAO, Shuwei, CHANG, Ee-Chien
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2022
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/5998
https://ink.library.smu.edu.sg/context/sis_research/article/7001/viewcontent/Update_recovery_attacks_on_encrypted_database_2020_av.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-7001
record_format dspace
spelling sg-smu-ink.sis_research-70012022-08-10T07:13:47Z Update recovery attacks on encrypted database within two updates using range queries leakage NING, Jianting POH, Geong Sen HUANG, Xinyi DENG, Robert H. CAO, Shuwei CHANG, Ee-Chien Recently, reconstruction attacks on static encrypted database supporting range queries have been proposed. However, attacks on encrypted database within two updates in the similar setting have not been studied extensively. As far as we know, the only work is the update recovery attack presented by Grubbs et al. (CCS 2018). Following their seminal work, we present new update recovery attacks for dense dataset (i.e. at least one record corresponding to each value in the range), which enable a deeper understanding of the impact caused by leakages due to updates on dynamic encrypted database. Our first attack aims at recovering the value of a newly added record in the case of one database update. We further demonstrate that the attack can fully reconstruct the database counts if the updated value is either the minimum or maximum in the range. We then consider a setting where two distinct records are added separately, which leads to our second attack. We next extend our attacks to the setting where the update operation is deletion. To the best of our knowledge, update recovery attack on database supporting deletion has not been considered before. We demonstrate practicality of our attack via extensive simulations using real dataset. 2022-03-01T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/5998 info:doi/10.1109/TDSC.2020.3015997 https://ink.library.smu.edu.sg/context/sis_research/article/7001/viewcontent/Update_recovery_attacks_on_encrypted_database_2020_av.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Dynamic encrypted database information leakage range query update recovery attacks Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Dynamic encrypted database
information leakage
range query
update recovery attacks
Information Security
spellingShingle Dynamic encrypted database
information leakage
range query
update recovery attacks
Information Security
NING, Jianting
POH, Geong Sen
HUANG, Xinyi
DENG, Robert H.
CAO, Shuwei
CHANG, Ee-Chien
Update recovery attacks on encrypted database within two updates using range queries leakage
description Recently, reconstruction attacks on static encrypted database supporting range queries have been proposed. However, attacks on encrypted database within two updates in the similar setting have not been studied extensively. As far as we know, the only work is the update recovery attack presented by Grubbs et al. (CCS 2018). Following their seminal work, we present new update recovery attacks for dense dataset (i.e. at least one record corresponding to each value in the range), which enable a deeper understanding of the impact caused by leakages due to updates on dynamic encrypted database. Our first attack aims at recovering the value of a newly added record in the case of one database update. We further demonstrate that the attack can fully reconstruct the database counts if the updated value is either the minimum or maximum in the range. We then consider a setting where two distinct records are added separately, which leads to our second attack. We next extend our attacks to the setting where the update operation is deletion. To the best of our knowledge, update recovery attack on database supporting deletion has not been considered before. We demonstrate practicality of our attack via extensive simulations using real dataset.
format text
author NING, Jianting
POH, Geong Sen
HUANG, Xinyi
DENG, Robert H.
CAO, Shuwei
CHANG, Ee-Chien
author_facet NING, Jianting
POH, Geong Sen
HUANG, Xinyi
DENG, Robert H.
CAO, Shuwei
CHANG, Ee-Chien
author_sort NING, Jianting
title Update recovery attacks on encrypted database within two updates using range queries leakage
title_short Update recovery attacks on encrypted database within two updates using range queries leakage
title_full Update recovery attacks on encrypted database within two updates using range queries leakage
title_fullStr Update recovery attacks on encrypted database within two updates using range queries leakage
title_full_unstemmed Update recovery attacks on encrypted database within two updates using range queries leakage
title_sort update recovery attacks on encrypted database within two updates using range queries leakage
publisher Institutional Knowledge at Singapore Management University
publishDate 2022
url https://ink.library.smu.edu.sg/sis_research/5998
https://ink.library.smu.edu.sg/context/sis_research/article/7001/viewcontent/Update_recovery_attacks_on_encrypted_database_2020_av.pdf
_version_ 1770575732936802304