Exploring the Security Vulnerability in Frequency-Hiding Order-Preserving Encryption

被引:0
|
作者
Yang, Jihye [1 ]
Kim, Kee Sung [1 ]
机构
[1] Department of Computer Software, Daegu Catholic University, Daegu, Korea, Republic of
关键词
Security of data;
D O I
10.1155/2024/2764345
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Frequency-hiding order-preserving encryption (FH-OPE) has emerged as an important tool in data security, particularly in cloud computing, because of its unique ability to preserve the order of plaintexts in their corresponding ciphertexts and enable efficient range queries on encrypted data. Despite its strong security model, indistinguishability under frequency analyzing ordered chosen plaintext attack (IND-FA-OCPA), our research identifies a vulnerability in its design, particularly the impact of range queries. In our research, we quantify the frequency of data exposure resulting from these range queries and present potential inference attacks on the FH-OPE scheme. Our findings are substantiated through experiments on real-world datasets, with the goal of measuring the frequency of data exposure resulting from range queries on FH-OPE encrypted databases. These results quantify the level of risk in practical applications of FH-OPE and reveal the potential for additional inference attacks and the urgency of addressing these threats. Consequently, our research highlights the need for a more comprehensive security model that considers the potential risks associated with range queries and underscores the importance of developing new range-query methods that prevent exposing these vulnerabilities. © 2024 JiHye Yang and Kee Sung Kim.
引用
收藏
相关论文
共 47 条
  • [31] An Ideal-Security Protocol for Order-Preserving Encoding
    Popa, Raluca Ada
    Li, Frank H.
    Zeldovich, Nickolai
    2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2013, : 463 - 477
  • [32] Efficient Construction of Order-Preserving Encryption Using Pseudo Random Function
    Jho, Nam-Su
    Chang, Ku-Young
    Hong, Do-Won
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2015, E98B (07) : 1276 - 1283
  • [33] BOPE: Boundary Order-Preserving Encryption Scheme in Relational Database System
    Chen, Si
    Li, Lin
    Zhang, Wenyu
    Chang, Xiaolin
    Han, Zhen
    IEEE ACCESS, 2021, 9 : 30124 - 30134
  • [34] Ensuring Query Completeness In Outsourced Database using Order-Preserving Encryption
    Shen, Ning
    Yeh, Jyh-haw
    Chen, Chien-Ming
    Chen, Yeh-Cheng
    Zhang, Yunpeng
    2019 IEEE INTL CONF ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, BIG DATA & CLOUD COMPUTING, SUSTAINABLE COMPUTING & COMMUNICATIONS, SOCIAL COMPUTING & NETWORKING (ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM 2019), 2019, : 776 - 783
  • [35] A Ciphertext-Size Lower Bound for Order-Preserving Encryption with Limited Leakage
    Cash, David
    Zhang, Cong
    THEORY OF CRYPTOGRAPHY, TCC 2018, PT II, 2018, 11240 : 159 - 176
  • [36] Efficient and Secure Top-k Queries With Top Order-Preserving Encryption
    Quan, Hanyu
    Wang, Boyang
    Zhang, Yuqing
    Wu, Gaofei
    IEEE ACCESS, 2018, 6 : 31525 - 31540
  • [37] MPOPE: Multi-provider Order-Preserving Encryption for Cloud Data Privacy
    Liang, Jinwen
    Qin, Zheng
    Xiao, Sheng
    Zhang, Jixin
    Yin, Hui
    Li, Keqin
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2017, 2018, 238 : 808 - 822
  • [38] Paillier-Based Fuzzy Multi-Keyword Searchable Encryption Scheme with Order-Preserving
    Li, Xiehua
    Li, Fang
    Jiang, Jie
    Mei, Xiaoyu
    CMC-COMPUTERS MATERIALS & CONTINUA, 2020, 65 (02): : 1707 - 1721
  • [39] GOPES: Group Order-Preserving Encryption Scheme Supporting Query Processing over Encrypted Data
    Lee, Hyunjo
    Song, Youngho
    Chang, Jae-Woo
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2018, 14 (05): : 1087 - 1101
  • [40] An improved negative binomial approximation with high accuracy to the negative hypergeometric probability for order-preserving encryption
    Hu, Dongping
    JOURNAL OF DIFFERENCE EQUATIONS AND APPLICATIONS, 2017, 23 (1-2) : 88 - 99