Exploring the Security Vulnerability in Frequency-Hiding Order-Preserving Encryption

被引:0
|
作者
Yang, Jihye [1 ]
Kim, Kee Sung [1 ]
机构
[1] Department of Computer Software, Daegu Catholic University, Daegu, Korea, Republic of
关键词
Security of data;
D O I
10.1155/2024/2764345
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Frequency-hiding order-preserving encryption (FH-OPE) has emerged as an important tool in data security, particularly in cloud computing, because of its unique ability to preserve the order of plaintexts in their corresponding ciphertexts and enable efficient range queries on encrypted data. Despite its strong security model, indistinguishability under frequency analyzing ordered chosen plaintext attack (IND-FA-OCPA), our research identifies a vulnerability in its design, particularly the impact of range queries. In our research, we quantify the frequency of data exposure resulting from these range queries and present potential inference attacks on the FH-OPE scheme. Our findings are substantiated through experiments on real-world datasets, with the goal of measuring the frequency of data exposure resulting from range queries on FH-OPE encrypted databases. These results quantify the level of risk in practical applications of FH-OPE and reveal the potential for additional inference attacks and the urgency of addressing these threats. Consequently, our research highlights the need for a more comprehensive security model that considers the potential risks associated with range queries and underscores the importance of developing new range-query methods that prevent exposing these vulnerabilities. © 2024 JiHye Yang and Kee Sung Kim.
引用
收藏
相关论文
共 47 条
  • [41] Secure Database Using Order-Preserving Encryption Scheme Based on Arithmetic Coding and Noise Function
    Krendelev, Sergey
    Yakovlev, Mikhail
    Usoltseva, Maria
    INFORMATION AND COMMUNICATION TECHNOLOGY, 2015, 9357 : 193 - 202
  • [42] Ciphertext Expansion in Limited-Leakage Order-Preserving Encryption: A Tight Computational Lower Bound
    Segev, Gil
    Shahaf, Ido
    THEORY OF CRYPTOGRAPHY, TCC 2018, PT II, 2018, 11240 : 177 - 191
  • [43] Post-Quantum, Order-Preserving Encryption for the Confidential Inference in Decision Trees: FPGA Design and Implementation
    Karn, Rupesh Raj
    Nawaz, Kashif
    Elfadel, Ibrahim M.
    2023 IFIP/IEEE 31ST INTERNATIONAL CONFERENCE ON VERY LARGE SCALE INTEGRATION, VLSI-SOC, 2023, : 118 - 123
  • [44] An Order-Preserving Encryption Scheme Based on Weighted Random Interval Division for Ciphertext Comparison in Wearable Systems
    Gui, Ruowei
    Yang, Liu
    Gui, Xiaolin
    SENSORS, 2022, 22 (20)
  • [45] A Group Order-Preserving Encryption Scheme based on Periodic Functions for Efficient Query Processing on Encrypted Data
    Lee, Hyunjo
    Choi, MunChol
    Chang, Jae-Woo
    2015 IEEE 17TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2015 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CYBERSPACE SAFETY AND SECURITY, AND 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS), 2015, : 923 - 923
  • [46] Security of Applications Involving Multiple Organizations - Order Preserving Encryption in Hybrid Cloud Environments
    Ahmadian, Mohammad
    Paya, Ashkan
    Marinescu, Dan C.
    PROCEEDINGS OF 2014 IEEE INTERNATIONAL PARALLEL & DISTRIBUTED PROCESSING SYMPOSIUM WORKSHOPS (IPDPSW), 2014, : 895 - 904
  • [47] Security Analysis on One-to-Many Order Preserving Encryption-Based Cloud Data Search
    Li, Ke
    Zhang, Weiming
    Yang, Ce
    Yu, Nenghai
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (09) : 1918 - 1926