Abstract
Searchable symmetric encryption has been vulnerable to inference attacks that rely on uniqueness in leakage patterns. However, many keywords in datasets lack distinctive leakage patterns, limiting the effectiveness of such attacks. The file injection attacks, initially proposed by Cash et al. (CCS 2015), have shown impressive performance with 100% accuracy and no prior knowledge requirement. Nevertheless, this attack fails to recover queries with underlying keywords not present in the injected files. To address these limitations, our research introduces a novel attack strategy called LEAP-Hierarchical Fusion Attack (LHFA) that combines the strengths of both file injection attacks and inference attacks. Before initiating keyword injection, we introduce a new approach for inert/active keyword selection. In the phase of selecting injected keywords, we focus on keywords without unique leakage patterns and recover them, leveraging their presence for document recovery. Our goal is to achieve an amplified effect in query recovery. We demonstrate a minimum query recovery rate of 1.3 queries per injected keyword with a 10% data leakage of a real-life dataset, and initiate further research to overcome challenges associated with non-distinctive keywords.
Original language | English |
---|---|
Title of host publication | Proceedings of the 2024 IEEE 37th Computer Security Foundations Symposium (CSF) |
Editors | L. O’Conner |
Place of Publication | Piscataway |
Publisher | IEEE |
Pages | 311-323 |
Number of pages | 13 |
ISBN (Electronic) | 979-8-3503-6203-9 |
ISBN (Print) | 979-8-3503-6204-6 |
DOIs | |
Publication status | Published - 2024 |
Event | 37th IEEE Computer Security Foundations Symposium, CSF 2024 - Enschede, Netherlands Duration: 8 Jul 2024 → 12 Jul 2024 |
Publication series
Name | Proceedings - IEEE Computer Security Foundations Symposium |
---|---|
ISSN (Print) | 1940-1434 |
Conference
Conference | 37th IEEE Computer Security Foundations Symposium, CSF 2024 |
---|---|
Country/Territory | Netherlands |
City | Enschede |
Period | 8/07/24 → 12/07/24 |
Bibliographical note
Green Open Access added to TU Delft Institutional Repository 'You share, we take care!' - Taverne project https://www.openaccess.nl/en/you-share-we-take-careOtherwise as indicated in the copyright section: the publisher is the copyright holder of this work and the author uses the Dutch legislation to make this work public.
Keywords
- Access pattern
- File injection attack
- Inference attack
- Searchable symmetric encryption