Published March 2, 2024 | Version v1
Conference paper Open

Query Recovery from Easy to Hard: Jigsaw Attack against SSE

  • 1. ROR icon Huazhong University of Science and Technology
  • 2. Hubei Key Laboratory of Distributed System Security
  • 3. JinYinHu Laboratory
  • 4. ROR icon State Key Laboratory of Cryptology
  • 5. ROR icon St. Francis Xavier University
  • 6. ROR icon Delft University of Technology

Description

Searchable symmetric encryption schemes often unintentionally disclose certain sensitive information, such as access, volume, and search patterns. Attackers can exploit such leakages and other available knowledge related to the user's database to recover queries. We find that the effectiveness of query recovery attacks depends on the volume/frequency distribution of keywords. Queries containing keywords with high volumes/frequencies are more susceptible to recovery, even when countermeasures are implemented. Attackers can also effectively leverage these ``special'' queries to recover all others.
By exploiting the above finding, we propose a Jigsaw attack that begins by accurately identifying and recovering those distinctive queries. Leveraging the volume, frequency, and co-occurrence information, our attack achieves 90% accuracy in three tested datasets, which is comparable to previous attacks (Oya et al., USENIX' 22 and Damie et al., USENIX' 21). With the same runtime, our attack demonstrates an advantage over the attack proposed by Oya et al (approximately 15% more accuracy when the keyword universe size is 15k). Furthermore, our proposed attack outperforms existing attacks against widely studied countermeasures, achieving roughly 60% and 85% accuracy against the padding and the obfuscation, respectively. In this context, with a large keyword universe (3k), it surpasses current state-of-the-art attacks by more than 20%

Files

Query Recovery from Easy to Hard Jigsaw Attack against SSE.pdf

Files (3.2 MB)

Additional details

Funding

European Commission
TENSOR - Reliable biomeTric tEhNologies to asSist Police authorities in cOmbating terrorism and oRganized crime 101073920
European Commission
TANGO - Digital Technologies ActiNg as a Gatekeeper to information and data flOws 101070052
European Commission
REWIRE - REWiring the ComposItional Security VeRification and AssurancE of Systems of Systems Lifecycle 101070627
Ministry of Science and Technology of the People's Republic of China
National Key Research and Development Program of China No. 2021YFB3101304
National Natural Science Foundation of China
National Natural Science Foundation of China No. 62372201
National Natural Science Foundation of China
National Natural Science Foundation China No. 62272186

References

  • Laura Blackstone, Seny Kamara, and Tarik Moataz. Revisiting leakage abuse attacks. In NDSS, 2020
  • Raphael Bost. ∑oϕoς: Forward secure searchable encryption. In CCS, 2016
  • Raphael Bost and Pierre-Alain Fouque. Thwarting leakage abuse attacks against searchable encryption - A formal approach and applications to database padding. Cryptology ePrint Archive, 2017. http://eprint.iacr.org/2017/1060.
  • Raphaël Bost, Brice Minaud, and Olga Ohrimenko. Forward and backward private searchable encryption from constrained cryptographic primitives. In CCS, 2017
  • David Cash, Paul Grubbs, Jason Perry, and Thomas Ristenpart. Leakage-abuse attacks against searchable encryption. In CCS, 2015
  • David Cash, Stanislaw Jarecki, Charanjit S. Jutla, Hugo Krawczyk, Marcel-Catalin Rosu, and Michael Steiner. Highly-scalable searchable symmetric encryption with support for boolean queries. In CRYPTO, 2013
  • David Cash and Stefano Tessaro. The locality of searchable symmetric encryption. In EUROCRYPT, 2014
  • Javad Ghareh Chamani, Dimitrios Papadopoulos, Charalampos Papamanthou, and Rasool Jalili. New constructions for forward and backward private symmetric searchable encryption. In CCS, 2018
  • Yan-Cheng Chang and Michael Mitzenmacher. Privacy preserving keyword searches on remote encrypted data. In ACNS, 2005
  • Guoxing Chen, Ten-Hwang Lai, Michael K. Reiter, and Yinqian Zhang. Differentially private access patterns for searchable symmetric encryption. In INFOCOM, 2018
  • Benny Chor, Oded Goldreich, Eyal Kushilevitz, and Madhu Sudan. Private information retrieval. In FOCS, 1995
  • Reza Curtmola, Juan A. Garay, Seny Kamara, and Rafail Ostrovsky. Searchable symmetric encryption: improved definitions and efficient constructions. In CCS, 2006
  • Marc Damie, Florian Hahn, and Andreas Peter. A highly accurate Query-Recovery attack against searchable encryption using Non Indexed documents. In USENIX Security, 2021
  • Apache Foundation. Mail archieves of lucene, 1999. https://mail-archives.apache.org/mod_mbox/#lucene
  • Wikipedia Foundation. Wikipedia databases, 2020. https://www.wikipedia.org
  • Sanjam Garg, Payman Mohassel, and Charalampos Papamanthou. TWORAM: efficient oblivious RAM in two rounds with applications to searchable encryption. In CRYPTO, 2016
  • Oded Goldreich and Rafail Ostrovsky. Software protection and simulation on oblivious rams. J. ACM, 1996
  • Google. Google trends, 2004. https://trends.google.com/trends/
  • Paul Grubbs, Anurag Khandelwal, Marie-Sarah Lacharité, Lloyd Brown, Lucy Li, Rachit Agarwal, and Thomas Ristenpart. Pancake: Frequency smoothing for encrypted data stores. In USENIX Security, 2020
  • Alexandra Henzinger, Matthew M Hong, Henry Corrigan-Gibbs, Sarah Meiklejohn, and Vinod Vaikuntanathan. One server for the price of two: Simple and fast single-server private information retrieval. In USENIX Security, 2023
  • Mohammad Saiful Islam, Mehmet Kuzu, and Murat Kantarcioglu. Access pattern disclosure on searchable encryption: ramification, attack and mitigation. In NDSS, 2012
  • Seny Kamara and Tarik Moataz. Boolean searchable symmetric encryption with worst-case sub-linear complexity. In EUROCRYPT, 2017
  • Seny Kamara, Charalampos Papamanthou, and Tom Roeder. Dynamic searchable symmetric encryption. In CCS, 2012
  • Steven Lambregts, Huanhuan Chen, Jianting Ning, and Kaitai Liang. VAL: volume and access pattern leakage-abuse attack with leaked documents. In ESORICS, 2022
  • Chang Liu, Liehuang Zhu, Mingzhong Wang, and Yu-an Tan. Search pattern leakage in searchable encryption: Attacks and new construction. Information Sciences, 2014
  • Marcel Ruiz Forns MusikAnimal, Kaldari. Pageviews toolforge, 2015. https://pageviews.toolforge.org/
  • Muhammad Naveed, Manoj Prabhakaran, and Carl A. Gunter. Dynamic searchable encryption via blind storage. In S&P, 2014
  • Hao Nie, Wei Wang, Peng XU, Xianglong Zhang, Laurence T. Yang, and Kaitai Liang. Query recovery from easy to hard: Jigsaw attack against SSE. ArXiv, 2024. https://arxiv.org/abs/2403.01155.
  • Jianting Ning, Xinyi Huang, Geong Sen Poh, Jiaming Yuan, Yingjiu Li, Jian Weng, and Robert H Deng. Leap: Leakage-abuse attack on efficiently deployable, efficiently searchable encryption with partially known dataset. In CCS, 2021
  • Simon Oya and Florian Kerschbaum. Hiding the access pattern is not enough: Exploiting search pattern leakage in searchable encryption. In USENIX Security, 2021
  • Simon Oya and Florian Kerschbaum. IHOP: Improved statistical query recovery against searchable symmetric encryption through quadratic optimization. In USENIX Security, 2022
  • Sarvar Patel, Giuseppe Persiano, and Kevin Yeo. Symmetric searchable encryption with sharing and unsharing. In ESORICS, 2018
  • Rishabh Poddar, Stephanie Wang, Jianan Lu, and Raluca Ada Popa. Practical volume-based attacks on encrypted databases. In EuroS&P, 2020
  • David Pouliot and Charles V Wright. The shadow nemesis: Inference attacks on efficiently deployable, efficiently searchable encryption. In CCS, 2016
  • Zhiwei Shang, Simon Oya, Andreas Peter, and Florian Kerschbaum. Obfuscated access and search patterns in searchable encryption. In NDSS, 2021
  • David Shapiro. Convert wikipedia database dumps into plaintext files, 2021. https://github.com/daveshap/PlainTextWikipedia.
  • Dawn Xiaoding Song, David Wagner, and Adrian Perrig. Practical techniques for searches on encrypted data. In S&P, 2000
  • Emil Stefanov, Charalampos Papamanthou, and Elaine Shi. Practical dynamic searchable encryption with small leakage. In NDSS, 2014
  • Liling Tan Steven Bird. Nltk corpus, 2021. https://www.nltk.org/howto/corpus.html
  • Shifeng Sun, Xingliang Yuan, Joseph K. Liu, Ron Steinfeld, Amin Sakzad, Viet Vo, and Surya Nepal. Practical backward-secure searchable encryption from symmetric puncturable encryption. In CCS, 2018
  • Shinji Umeyama. An eigendecomposition approach to weighted graph matching problems. IEEE transactions on pattern analysis and machine intelligence, 1988
  • Viet Vo, Xingliang Yuan, Shifeng Sun, Joseph K Liu, Surya Nepal, and Cong Wang. Shielddb: An encrypted document database with padding countermeasures. TKDE, 2021
  • CMU William W. Cohen, MLD. Enron email datasets, 2015. https://www.cs.cmu.edu/~./enron/
  • Zhiqiang Wu and Rui Li. OBI: a multi-path oblivious RAM for forward and-backward-secure searchable encryption. In NDSS, 2023
  • Lei Xu, Huayi Duan, Anxin Zhou, Xingliang Yuan, and Cong Wang. Interpreting and mitigating leakage-abuse attacks in searchable symmetric encryption. TIFS, 2021.
  • Peng Xu, Willy Susilo, Wei Wang, Tianyang Chen, Qianhong Wu, Kaitai Liang, and Hai Jin. Rose: Robust searchable encryption with forward and backward security. TIFS, 2022
  • Mikhail Zaslavskiy, Francis Bach, and Jean-Philippe Vert. A path following algorithm for the graph matching problem. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2008
  • Xianglong Zhang, Wei Wang, Peng Xu, Laurence T. Yang, and Kaitai Liang. High recovery with fewer injections: Practical binary volumetric injection attacks against dynamic searchable encryption. In USENIX Security, 2023.
  • Yupeng Zhang, Jonathan Katz, and Charalampos Papamanthou. All your queries are belong to us: The power of file-injection attacks on searchable encryption. In USENIX Security, 2016
  • George Kingsley Zipf. Human behavior and the principle of least effort: An introduction to human ecology. Ravenio Books, 2016