SoK: A Systematic Study of Attacks in Efficient Encrypted Cloud Data Search

Jing Yao, Yifeng Zheng, Yu Guo, Cong Wang

Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

11 Citations (Scopus)

Abstract

Searchable encryption allows one to search encrypted data hosted by an untrusted cloud. In terms of efficiency, symmetric key-based searchable encryption is promising for practical deployment and has been a rich area of research. In the literature, there are mainly two lines of research accordingly: searchable symmetric encryption (SSE) for encrypted matching queries and order-preserving or order-revealing encryption (OPE/ORE) for encrypted range queries. Despite the efficiency, these searchable encryption techniques all allow leakages in their security frameworks and have been shown to be vulnerable to various attacks in recent years. There has been little work regarding a comprehensive investigation on these attacks. In this paper, we provide a systematic survey on the recent advances on attacks in efficient encrypted cloud data search backed by SSE or OPE/ORE. Specifically, we first provide a categorization of the adversary model from diverse dimensions. Then we systematically examine the existing attacks against SSE and OPE/ORE under different adversary types and the leakages allowed in the security frameworks. The goal of this paper is to provide pointers for understanding the security of efficient searchable encryption techniques and to call for further motivated research activities.

Original languageEnglish
Title of host publicationSBC 2020 - Proceedings of the 8th International Workshop on Security in Blockchain and Cloud Computing, Co-located with AsiaCCS 2020
PublisherAssociation for Computing Machinery, Inc
Pages14-20
Number of pages7
ISBN (Electronic)9781450376099
DOIs
Publication statusPublished - 6 Oct 2020
Event8th International Workshop on Security in Blockchain and Cloud Computing, SBC 2020, Co-located with AsiaCCS 2020 - Virtual, Online, Taiwan
Duration: 6 Oct 2020 → …

Publication series

NameSBC 2020 - Proceedings of the 8th International Workshop on Security in Blockchain and Cloud Computing, Co-located with AsiaCCS 2020

Conference

Conference8th International Workshop on Security in Blockchain and Cloud Computing, SBC 2020, Co-located with AsiaCCS 2020
Country/TerritoryTaiwan
CityVirtual, Online
Period6/10/20 → …

Keywords

  • attacks
  • cloud computing
  • encrypted search
  • order-preserving/revealing encryption
  • searchable symmetric encryption

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Computer Science Applications
  • Information Systems
  • Software

Fingerprint

Dive into the research topics of 'SoK: A Systematic Study of Attacks in Efficient Encrypted Cloud Data Search'. Together they form a unique fingerprint.

Cite this