The shadow nemesis: Inference attacks on efficiently deployable, efficiently searchable encryption

D Pouliot, CV Wright - Proceedings of the 2016 ACM SIGSAC conference …, 2016 - dl.acm.org
Encrypting Internet communications has been the subject of renewed focus in recent years.
In order to add end-to-end encryption to legacy applications without losing the convenience …

The tao of inference in privacy-protected databases

V Bindschaedler, P Grubbs, D Cash… - Cryptology ePrint …, 2017 - eprint.iacr.org
To protect database confidentiality even in the face of full compromise while supporting
standard functionality, recent academic proposals and commercial products rely on a mix of …

Why your encrypted database is not secure

P Grubbs, T Ristenpart, V Shmatikov - … of the 16th workshop on hot …, 2017 - dl.acm.org
Encrypted databases, a popular approach to protecting data from compromised database
management systems (DBMS's), use abstract threat models that capture neither realistic …

An efficiently searchable encrypted data structure for range queries

F Kerschbaum, A Tueno - … –ESORICS 2019: 24th European Symposium on …, 2019 - Springer
At CCS 2015 Naveed et al. presented first attacks on efficiently searchable encryption, such
as deterministic and order-preserving encryption. These plaintext guessing attacks have …

Waffle: An online oblivious datastore for protecting data access patterns

S Maiyya, SC Vemula, D Agrawal, A El Abbadi… - Proceedings of the …, 2023 - dl.acm.org
We present Waffle, a datastore that protects an application's data access patterns from a
passive persistent adversary. Waffle achieves this without prior knowledge of the input data …

Information leakage in encrypted deduplication via frequency analysis: Attacks and defenses

J Li, PPC Lee, C Tan, C Qin, X Zhang - ACM Transactions on Storage …, 2020 - dl.acm.org
Encrypted deduplication combines encryption and deduplication to simultaneously achieve
both data security and storage efficiency. State-of-the-art encrypted deduplication systems …

Information leakage in encrypted deduplication via frequency analysis

J Li, C Qin, PPC Lee, X Zhang - 2017 47th Annual IEEE/IFIP …, 2017 - ieeexplore.ieee.org
Encrypted deduplication seamlessly combines encryption and deduplication to
simultaneously achieve both data security and storage efficiency. State-of-the-art encrypted …

Frequency-smoothing encryption: preventing snapshot attacks on deterministically encrypted data

MS Lacharité, KG Paterson - Cryptology ePrint Archive, 2017 - eprint.iacr.org
Statistical analysis of ciphertexts has been recently used to carry out devastating inference
attacks on deterministic encryption (Naveed, Kamara, and Wright, CCS 2015), order …

Equi-joins over encrypted data for series of queries

M Shafieinejad, S Gupta, JY Liu… - 2022 IEEE 38th …, 2022 - ieeexplore.ieee.org
Encryption provides a method to protect data out-sourced to a DBMS provider, eg, in the
cloud. However, performing database operations over encrypted data requires specialized …

SQL queries over encrypted databases: a survey

B Sun, S Zhao, G Tian - Connection Science, 2024 - Taylor & Francis
Limited by the local storage resource, data users have to encrypt their data and outsource
the encrypted databases to cloud servers to enjoy low-cost, professional data management …