Security and privacy implications on database systems in big data era: A survey

GD Samaraweera, JM Chang - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
For over many decades, relational database model has been considered as the leading
model for data storage and management. However, as the Big Data explosion has …

Hiding the access pattern is not enough: Exploiting search pattern leakage in searchable encryption

S Oya, F Kerschbaum - 30th USENIX security symposium (USENIX …, 2021 - usenix.org
Recent Searchable Symmetric Encryption (SSE) schemes enable secure searching over an
encrypted database stored in a server while limiting the information leaked to the server …

Practical non-interactive searchable encryption with forward and backward privacy

SF Sun, R Steinfeld, S Lai, X Yuan… - Usenix Network and …, 2021 - research.monash.edu
Abstract In Dynamic Symmetric Searchable Encryption (DSSE), forward privacy ensures that
previous search queries cannot be associated with future updates, while backward privacy …

Waldo: A private time-series database from function secret sharing

E Dauterman, M Rathee, RA Popa… - 2022 IEEE Symposium …, 2022 - ieeexplore.ieee.org
Applications today rely on cloud databases for storing and querying time-series data. While
outsourcing storage is convenient, this data is often sensitive, making data breaches a …

Mitigating leakage in secure cloud-hosted data structures: Volume-hiding for multi-maps via hashing

S Patel, G Persiano, K Yeo, M Yung - Proceedings of the 2019 ACM …, 2019 - dl.acm.org
Volume leakage has recently been identified as a major threat to the security of
cryptographic cloud-based data structures by Kellaris\em et al. CCS'16 (see also the attacks …

Leakage inversion: Towards quantifying privacy in searchable encryption

EM Kornaropoulos, N Moyer, C Papamanthou… - Proceedings of the …, 2022 - dl.acm.org
Searchable encryption (SE) provides cryptographic guarantees that a user can efficiently
search over encrypted data while only disclosing patterns about the data, also known as …

A Survey on Searchable Symmetric Encryption

F Li, J Ma, Y Miao, X Liu, J Ning, RH Deng - ACM Computing Surveys, 2023 - dl.acm.org
Outsourcing data to the cloud has become prevalent, so Searchable Symmetric Encryption
(SSE), one of the methods for protecting outsourced data, has arisen widespread interest …

The state of the uniform: Attacks on encrypted databases beyond the uniform query distribution

EM Kornaropoulos, C Papamanthou… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
Recent foundational work on leakage-abuse attacks on encrypted databases has
broadened our understanding of what an adversary can accomplish with a standard leakage …

Pancake: Frequency smoothing for encrypted data stores

P Grubbs, A Khandelwal, MS Lacharité… - 29th USENIX Security …, 2020 - usenix.org
We present PANCAKE, the first system to protect key-value stores from access pattern
leakage attacks with small constant factor bandwidth overhead. PANCAKE uses a new …

Encrypted databases: New volume attacks against range queries

Z Gui, O Johnson, B Warinschi - Proceedings of the 2019 ACM SIGSAC …, 2019 - dl.acm.org
We present a range of novel attacks which exploit information about the volume of answers
to range queries in encrypted database. Our attacks rely on a strategy which is simple yet …