Security Analysis on One-to-Many Order Preserving Encryption-Based Cloud Data Search

被引:46
|
作者
Li, Ke [1 ]
Zhang, Weiming [1 ]
Yang, Ce [1 ]
Yu, Nenghai [1 ]
机构
[1] Univ Sci & Technol China, CAS Key Lab Electromagnet Space Informat, Hefei 230026, Peoples R China
基金
中国国家自然科学基金;
关键词
Searchable encryption; order preserving encryption; privacy; cloud computing;
D O I
10.1109/TIFS.2015.2435697
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
For ranked search in encrypted cloud data, order preserving encryption (OPE) is an efficient tool to encrypt relevance scores of the inverted index. When using deterministic OPE, the ciphertexts will reveal the distribution of relevance scores. Therefore, Wang et al. proposed a probabilistic OPE, called one-to-many OPE, for applications of searchable encryption, which can flatten the distribution of the plaintexts. In this paper, we proposed a differential attack on one-to-many OPE by exploiting the differences of the ordered ciphertexts. The experimental results show that the cloud server can get a good estimate of the distribution of relevance scores by a differential attack. Furthermore, when having some background information on the outsourced documents, the cloud server can accurately infer the encrypted keywords using the estimated distributions.
引用
收藏
页码:1918 / 1926
页数:9
相关论文
共 50 条
  • [21] Blockchain-enabled one-to-many searchable encryption supporting designated server and multi-keywords for Cloud-IoMT
    Yu, Hongtao
    Liu, Suhui
    Chen, Liquan
    Gao, Yuan
    JOURNAL OF SYSTEMS ARCHITECTURE, 2024, 149
  • [22] Reversible DatabaseWatermarking Based on Order-preserving Encryption for Data Sharing
    Hu, Donghui
    Wang, Qing
    Yan, Song
    Liu, Xiaojun
    Li, Meng
    Zheng, Shuli
    ACM TRANSACTIONS ON DATABASE SYSTEMS, 2023, 48 (02):
  • [23] DPP: Data Privacy-Preserving for Cloud Computing based on Homomorphic Encryption
    Wang, Jing
    Wu, Fengheng
    Zhang, Tingbo
    Wu, Xiaohua
    2022 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY, CYBERC, 2022, : 29 - 32
  • [24] Additive Order Preserving Encryption Based Encrypted Documents Ranking in Secure Cloud Storage
    Zhang, Jiuling
    Deng, Beixing
    Li, Xing
    ADVANCES IN SWARM INTELLIGENCE, ICSI 2012, PT II, 2012, 7332 : 58 - 65
  • [25] Privacy-Preserving Cloud Data Security : Integrating the Novel Opacus Encryption and Blockchain Key Management
    Poorani, S.
    Anitha, R.
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2023, 17 (11): : 3182 - 3203
  • [26] SFOM-DT: A Secure and Fair One-to-Many Data Trading Scheme Based on Blockchain
    Xiong, Shuming
    Chen, Pengchao
    Ge, Shusheng
    Ni, Qiang
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 10029 - 10042
  • [27] One-to-many optical information encryption transmission method based on temporal ghost imaging and code division multiple access
    YI KANG
    LEIHONG ZHANG
    HUALONG YE
    MANTONG ZHAO
    SAIMA KANWAL
    CHUNYAN BAI
    DAWEI ZHANG
    Photonics Research, 2019, 7 (12) : 1370 - 1380
  • [28] One-to-many optical information encryption transmission method based on temporal ghost imaging and code division multiple access
    Kang, Yi
    Zhang, Leihong
    Ye, Hualong
    Zhao, Mantong
    Kanwal, Saima
    Bai, Chunyan
    Zhang, Dawei
    PHOTONICS RESEARCH, 2019, 7 (12) : 1370 - 1380
  • [29] One-to-many optical information encryption transmission method based on temporal ghost imaging and code division multiple access
    YI KANG
    LEIHONG ZHANG
    HUALONG YE
    MANTONG ZHAO
    SAIMA KANWAL
    CHUNYAN BAI
    DAWEI ZHANG
    Photonics Research, 2019, (12) : 1370 - 1380
  • [30] Hyper Elliptic Curve Based Homomorphic Encryption Scheme for Cloud Data Security
    Selvi, S.
    Gobi, M.
    INTERNATIONAL CONFERENCE ON INTELLIGENT DATA COMMUNICATION TECHNOLOGIES AND INTERNET OF THINGS, ICICI 2018, 2019, 26 : 71 - 78