Security analysis of secure kNN and ranked keyword search over encrypted data

被引:0
|
作者
Wakaha Ogata
Takaaki Otemori
机构
[1] Tokyo Institute of Technology,
关键词
Encrypted database; Secure kNN search; Ranked keyword search; Key-recovery attack;
D O I
暂无
中图分类号
学科分类号
摘要
Wong et al. proposed a novel symmetric encryption scheme in which we can find the k-nearest neighbors from encrypted data and an encrypted query. Their scheme uses a pair of encryption functions that has an inner-product preserving property. Because of this property, the pair of encryption functions has been used in several encryption schemes involving ranked multi-keyword search as applications. On the other hand, Yao et al. pointed out that the pair of encryption functions is insecure when the attacker can get plaintext–ciphertext pairs. To prevent this attack, some countermeasures are given in the applications, e.g., randomizing plaintexts before encrypted. In this paper, we reanalyze the security of the inner-product preserving encryption functions. We first discuss the countermeasures against Yao et al.’s attack used in the applications. In particular, we show that one of them is ineffective. Next, we show that the first encryption function is breakable by the known plaintext attack by showing a concrete key-recovery procedure. Unlike Yao et al.’s attack, our attack does not use the second encryption function.
引用
收藏
页码:419 / 425
页数:6
相关论文
共 50 条
  • [21] Ranked Keyword Search Over Encrypted Cloud Data Through Machine Learning Method
    Miao, Yinbin
    Zheng, Wei
    Jia, Xiaohua
    Liu, Ximeng
    Choo, Kim-Kwang Raymond
    Deng, Robert H.
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (01) : 525 - 536
  • [22] A Survey on Multi-Keyword Ranked Search Manipulations over Encrypted Cloud Data
    Ponnusamy, P. Priya
    Vidhyapriya, R.
    Maheswari, S. Uma
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2017,
  • [23] Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data
    Wang, Cong
    Cao, Ning
    Ren, Kui
    Lou, Wenjing
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2012, 23 (08) : 1467 - 1479
  • [24] Confusing-Keyword Based Secure Search over Encrypted Cloud Data
    Zhangjie Fu
    Yangen Liu
    Xingming Sun
    Yuling Liu
    Zuwei Tian
    [J]. Mobile Networks and Applications, 2020, 25 : 125 - 132
  • [25] Confusing-Keyword Based Secure Search over Encrypted Cloud Data
    Fu, Zhangjie
    Liu, Yangen
    Sun, Xingming
    Liu, Yuling
    Tian, Zuwei
    [J]. MOBILE NETWORKS & APPLICATIONS, 2020, 25 (01): : 125 - 132
  • [26] An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over Encrypted Cloud Data
    Peng, Tianyue
    Lin, Yaping
    Yao, Xin
    Zhang, Wei
    [J]. IEEE ACCESS, 2018, 6 : 21924 - 21933
  • [27] Practical Multi-Keyword Ranked Search With Access Control Over Encrypted Cloud Data
    Li, Jiayi
    Ma, Jianfeng
    Miao, Yinbin
    Yang, Ruikang
    Liu, Ximeng
    Choo, Kim-Kwang Raymond
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (03) : 2005 - 2019
  • [28] Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
    Cao, Ning
    Wang, Cong
    Li, Ming
    Ren, Kui
    Lou, Wenjing
    [J]. 2011 PROCEEDINGS IEEE INFOCOM, 2011, : 829 - 837
  • [29] Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data
    Cao, Ning
    Wang, Cong
    Li, Ming
    Ren, Kui
    Lou, Wenjing
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (01) : 222 - 233
  • [30] DMRS: an efficient dynamic multi-keyword ranked search over encrypted cloud data
    Lanxiang Chen
    Linbing Qiu
    Kuan-Ching Li
    Wenbo Shi
    Nan Zhang
    [J]. Soft Computing, 2017, 21 : 4829 - 4841