Exploring the Security Vulnerability in Frequency-Hiding Order-Preserving Encryption

被引:0
|
作者
Yang, Jihye [1 ]
Kim, Kee Sung [1 ]
机构
[1] Department of Computer Software, Daegu Catholic University, Daegu, Korea, Republic of
关键词
Security of data;
D O I
10.1155/2024/2764345
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Frequency-hiding order-preserving encryption (FH-OPE) has emerged as an important tool in data security, particularly in cloud computing, because of its unique ability to preserve the order of plaintexts in their corresponding ciphertexts and enable efficient range queries on encrypted data. Despite its strong security model, indistinguishability under frequency analyzing ordered chosen plaintext attack (IND-FA-OCPA), our research identifies a vulnerability in its design, particularly the impact of range queries. In our research, we quantify the frequency of data exposure resulting from these range queries and present potential inference attacks on the FH-OPE scheme. Our findings are substantiated through experiments on real-world datasets, with the goal of measuring the frequency of data exposure resulting from range queries on FH-OPE encrypted databases. These results quantify the level of risk in practical applications of FH-OPE and reveal the potential for additional inference attacks and the urgency of addressing these threats. Consequently, our research highlights the need for a more comprehensive security model that considers the potential risks associated with range queries and underscores the importance of developing new range-query methods that prevent exposing these vulnerabilities. © 2024 JiHye Yang and Kee Sung Kim.
引用
收藏
相关论文
共 47 条
  • [1] On the Security of Frequency-Hiding Order-Preserving Encryption
    Maffei, Matteo
    Reinert, Manuel
    Schroder, Dominique
    CRYPTOLOGY AND NETWORK SECURITY (CANS 2017), 2018, 11261 : 51 - 70
  • [2] Frequency-Hiding Order-Preserving Encryption
    Kerschbaum, Florian
    CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 656 - 667
  • [3] Practical Frequency-Hiding Order-Preserving Encryption with Improved Update
    Yang, JiHye
    Kim, Kee Sung
    Security and Communication Networks, 2021, 2021
  • [4] Frequency-Hiding Order-Preserving Encryption with Small Client Storage
    Li, Dongjie
    Lv, Siyi
    Huang, Yanyu
    Liu, Yijing
    Li, Tong
    Liu, Zheli
    Guo, Liang
    PROCEEDINGS OF THE VLDB ENDOWMENT, 2021, 14 (13): : 3295 - 3307
  • [5] Practical Frequency-Hiding Order-Preserving Encryption with Improved Update
    Yang, JiHye
    Kim, Kee Sung
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [6] Frequency-revealing attacks against Frequency-hiding Order-preserving Encryption
    Cao, Xinle
    Liu, Jian
    Shen, Yongsheng
    Ye, Xiaohua
    Ren, Kui
    PROCEEDINGS OF THE VLDB ENDOWMENT, 2023, 16 (11): : 3124 - 3136
  • [7] Security of Stateful Order-Preserving Encryption
    Kim, Kee Sung
    Kim, Minkyu
    Lee, Dongsoo
    Park, Je Hong
    Kim, Woo-Hwan
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2017, 2018, 10779 : 39 - 56
  • [8] Frequency-hiding Dependency-preserving Encryption for Outsourced Databases
    Dong, Boxiang
    Wang, Wendy
    2017 IEEE 33RD INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2017), 2017, : 721 - 732
  • [9] Order-Preserving Symmetric Encryption
    Boldyreva, Alexandra
    Chenette, Nathan
    Lee, Younho
    O'Neill, Adam
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2009, 2009, 5479 : 224 - 241
  • [10] Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions
    Boldyreva, Alexandra
    Chenette, Nathan
    O'Neill, Adam
    ADVANCES IN CRYPTOLOGY - CRYPTO 2011, 2011, 6841 : 578 - 595