TY - JOUR
T1 - Search pattern leakage in searchable encryption
T2 - Attacks and new construction
AU - Liu, Chang
AU - Zhu, Liehuang
AU - Wang, Mingzhong
AU - Tan, Yu An
PY - 2014/5/1
Y1 - 2014/5/1
N2 - Searching on remote encrypted data (commonly known as searchable encryption) has become an important issue in secure data outsourcing, since it allows users to outsource encrypted data to an untrusted third party while maintains the capability of keyword search on the data. Searchable encryption can be achieved using the classical method called oblivious RAM, but the resultant schemes are too inefficient to be applied in the real-world scenarios (e.g., cloud computing). Recently, a number of efficient searchable encryption schemes have been proposed under weaker security guarantees. Such schemes, however, still leak statistical information about the users' search pattern. In this paper, we first present two concrete attack methods to show that the search pattern leakage will result in such a situation: an adversary who has some auxiliary knowledge can uncover the underlying keywords of user queries. To address this issue, we then develop a grouping-based construction (GBC) to transform an existing searchable encryption scheme to a new scheme hiding the search pattern. Finally, experiments based on the real-world dataset demonstrate the effectiveness of our attack methods and the feasibility of our construction.
AB - Searching on remote encrypted data (commonly known as searchable encryption) has become an important issue in secure data outsourcing, since it allows users to outsource encrypted data to an untrusted third party while maintains the capability of keyword search on the data. Searchable encryption can be achieved using the classical method called oblivious RAM, but the resultant schemes are too inefficient to be applied in the real-world scenarios (e.g., cloud computing). Recently, a number of efficient searchable encryption schemes have been proposed under weaker security guarantees. Such schemes, however, still leak statistical information about the users' search pattern. In this paper, we first present two concrete attack methods to show that the search pattern leakage will result in such a situation: an adversary who has some auxiliary knowledge can uncover the underlying keywords of user queries. To address this issue, we then develop a grouping-based construction (GBC) to transform an existing searchable encryption scheme to a new scheme hiding the search pattern. Finally, experiments based on the real-world dataset demonstrate the effectiveness of our attack methods and the feasibility of our construction.
KW - Cloud computing
KW - Fake query
KW - Grouping-based construction
KW - Search pattern
KW - Searchable encryption
UR - http://www.scopus.com/inward/record.url?scp=84893808472&partnerID=8YFLogxK
U2 - 10.1016/j.ins.2013.11.021
DO - 10.1016/j.ins.2013.11.021
M3 - Article
AN - SCOPUS:84893808472
SN - 0020-0255
VL - 265
SP - 176
EP - 188
JO - Information Sciences
JF - Information Sciences
ER -