Security Analysis on One-to-Many Order Preserving Encryption-Based Cloud Data Search

被引:46
|
作者
Li, Ke [1 ]
Zhang, Weiming [1 ]
Yang, Ce [1 ]
Yu, Nenghai [1 ]
机构
[1] Univ Sci & Technol China, CAS Key Lab Electromagnet Space Informat, Hefei 230026, Peoples R China
基金
中国国家自然科学基金;
关键词
Searchable encryption; order preserving encryption; privacy; cloud computing;
D O I
10.1109/TIFS.2015.2435697
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
For ranked search in encrypted cloud data, order preserving encryption (OPE) is an efficient tool to encrypt relevance scores of the inverted index. When using deterministic OPE, the ciphertexts will reveal the distribution of relevance scores. Therefore, Wang et al. proposed a probabilistic OPE, called one-to-many OPE, for applications of searchable encryption, which can flatten the distribution of the plaintexts. In this paper, we proposed a differential attack on one-to-many OPE by exploiting the differences of the ordered ciphertexts. The experimental results show that the cloud server can get a good estimate of the distribution of relevance scores by a differential attack. Furthermore, when having some background information on the outsourced documents, the cloud server can accurately infer the encrypted keywords using the estimated distributions.
引用
收藏
页码:1918 / 1926
页数:9
相关论文
共 50 条
  • [41] An improved one-to-many authentication scheme based on bilinear pairings with provable security for mobile pay-TV systems
    Heydari, Mohammad
    Sadough, Seyed Mohammad Sajad
    Chaudhry, Shehzad Ashraf
    Farash, Mohammad Sabzinejad
    Mahmood, Khalid
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (12) : 14225 - 14245
  • [42] Adaptive Attribute-Based Honey Encryption: A Novel Solution for Cloud Data Security
    Siyal, Reshma
    Asim, Muhammad
    Jun, Long
    Elaffendi, Mohammed
    Iftikhar, Sundas
    Alnashwan, Rana
    Chelloug, Samia Allaoua
    CMC-COMPUTERS MATERIALS & CONTINUA, 2025, 82 (02): : 2637 - 2664
  • [43] Ensuring Data Storage Security in Cloud. Computing Based on Hybrid Encryption Schemes
    Sarkar, Mrinal Kanti
    Kumar, Sanjay
    2016 FOURTH INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (PDGC), 2016, : 320 - 325
  • [44] Data Security for Cloud Datasets With Bloom Filters on Ciphertext Policy Attribute Based Encryption
    Kumar, G. Sravan
    Krishna, A. Sri
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2019, 13 (04) : 12 - 27
  • [45] Query based computations on encrypted data through homomorphic encryption in cloud computing security
    Biksham, V.
    Vasumathi, D.
    2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 3820 - 3825
  • [46] Fusion-based advanced encryption algorithm for enhancing the security of Big Data in Cloud
    Vidhya, A.
    Kumar, P. Mohan
    CONCURRENT ENGINEERING-RESEARCH AND APPLICATIONS, 2022, 30 (02): : 171 - 180
  • [47] Secure Anonymous Query-Based Encryption for Data Privacy Preserving in Cloud: Moye(Omega)
    Konan, Martin
    Wang, Wenyong
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2018, 12 (04) : 1 - 23
  • [48] An improved attribute-based encryption technique towards the data security in cloud computing
    Namasudra, Suyel
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (03):
  • [49] Security Encryption Analysis of Economic Big Data Based on Homomorphic Encryption and Attribute Base
    Chen, Limin
    International Journal of Network Security, 2024, 26 (02) : 299 - 304
  • [50] Parallel search over encrypted data under attribute based encryption on the Cloud Computing
    Bouabana-Tebibel, Thouraya
    Kaci, Abdellah
    COMPUTERS & SECURITY, 2015, 54 : 77 - 91