Security Analysis on One-to-Many Order Preserving Encryption-Based Cloud Data Search

被引:46
|
作者
Li, Ke [1 ]
Zhang, Weiming [1 ]
Yang, Ce [1 ]
Yu, Nenghai [1 ]
机构
[1] Univ Sci & Technol China, CAS Key Lab Electromagnet Space Informat, Hefei 230026, Peoples R China
基金
中国国家自然科学基金;
关键词
Searchable encryption; order preserving encryption; privacy; cloud computing;
D O I
10.1109/TIFS.2015.2435697
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
For ranked search in encrypted cloud data, order preserving encryption (OPE) is an efficient tool to encrypt relevance scores of the inverted index. When using deterministic OPE, the ciphertexts will reveal the distribution of relevance scores. Therefore, Wang et al. proposed a probabilistic OPE, called one-to-many OPE, for applications of searchable encryption, which can flatten the distribution of the plaintexts. In this paper, we proposed a differential attack on one-to-many OPE by exploiting the differences of the ordered ciphertexts. The experimental results show that the cloud server can get a good estimate of the distribution of relevance scores by a differential attack. Furthermore, when having some background information on the outsourced documents, the cloud server can accurately infer the encrypted keywords using the estimated distributions.
引用
收藏
页码:1918 / 1926
页数:9
相关论文
共 50 条
  • [1] An enhanced encryption-based security framework in the CPS Cloud
    R. Priyadarshini
    Abdul Quadir Md
    N. Rajendran
    V. Neelanarayanan
    H. Sabireen
    Journal of Cloud Computing, 11
  • [2] An enhanced encryption-based security framework in the CPS Cloud
    Priyadarshini, R.
    Quadir, Abdul Md
    Rajendran, N.
    Neelanarayanan, V
    Sabireen, H.
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2022, 11 (01):
  • [3] One-to-many image encryption with privacy-preserving homomorphic outsourced decryption based on compressed sensing
    Xie, Dong
    Chen, Fulong
    Luo, Yonglong
    Li, Lixiang
    DIGITAL SIGNAL PROCESSING, 2019, 95
  • [4] A Lookup Tree Based Security for One-To-Many Communication
    Abuelyaman, Eltayeb
    2014 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE, ELECTRONICS AND ELECTRICAL ENGINEERING (ISEEE), VOLS 1-3, 2014, : 1292 - 1296
  • [5] A homomorphic encryption-based privacy preserving data aggregation scheme for smart grid
    Zhou Wei-jing
    Zhu He-chun
    Yao Shi-ying
    Li Tong
    2019 15TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS 2019), 2019, : 315 - 319
  • [6] Solution for Traversal Vulnerability and an Encryption-Based Security Solution for an Inter-cloud Environment
    Kirthica, S.
    Sridhar, Rajeswari
    COMPUTATIONAL INTELLIGENCE IN DATA MINING, VOL 2, 2015, 32 : 283 - 291
  • [7] Preserving Order Encryption Algorithm for Cloud-Assisted Data
    Yan, Li
    Wang, Gaozhou
    Yin, Tian
    Liu, PeiShun
    Feng, Hongxin
    Zhang, Wenbin
    Hu, Hailin
    Pan, Fading
    2024 9TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS, ICCCS 2024, 2024, : 225 - 230
  • [8] A Column Encryption-Based Privacy-Preserving Framework for Hadoop Big Data Sets
    Baig, Hidayath Ali
    BAGHDAD SCIENCE JOURNAL, 2024, 21 (05) : 1798 - 1810
  • [9] Performance Analysis of Attribute based Encryption and Cloud Health data Security
    Priyanka, J.
    Ramakrishnan, M.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS 2020), 2020, : 989 - 994
  • [10] Blockchain and homomorphic encryption-based privacy-preserving data aggregation model in smart grid
    Singh, Parminder
    Masud, Mehedi
    Hossain, M. Shamim
    Kaur, Avinash
    COMPUTERS & ELECTRICAL ENGINEERING, 2021, 93