Paper 2023/1465

Too Close for Comfort? Measuring Success of Sampled-Data Leakage Attacks Against Encrypted Search

Dominique Dittert, Technical University of Darmstadt
Thomas Schneider, Technical University of Darmstadt
Amos Treiber, Technical University of Darmstadt
Abstract

The well-defined information leakage of Encrypted Search Algorithms (ESAs) is predominantly analyzed by crafting so-called leakage attacks. These attacks utilize adversarially known auxiliary data and the observed leakage to attack an ESA instance built on a user's data. Known-data attacks require the auxiliary data to be a subset of the user's data. In contrast, sampled-data attacks merely rely on auxiliary data that is, in some sense, statistically close to the user's data and hence reflect a much more realistic attack scenario where the auxiliary data stems from a publicly available data source instead of the private user's data. Unfortunately, it is unclear what "statistically close" means in the context of sampled-data attacks. This leaves open how to measure whether data is close enough for attacks to become a considerable threat. Furthermore, sampled-data attacks have so far not been evaluated in the more realistic attack scenario where the auxiliary data stems from a source different to the one emulating the user's data. Instead, auxiliary and user data have been emulated with data from one source being split into distinct training and testing sets. This leaves open whether and how well attacks work in the mentioned attack scenario with data from different sources. In this work, we address these open questions by providing a measurable metric for statistical closeness in encrypted keyword search. Using real-world data, we show a clear exponential relation between our metric and attack performance. We uncover new data that are intuitively similar yet stem from different sources. We discover that said data are not "close enough" for sampled-data attacks to perform well. Furthermore, we provide a re-evaluation of sampled-data keyword attacks with varying evaluation parameters and uncover that some evaluation choices can significantly affect evaluation results.

Metadata
Available format(s)
PDF
Category
Attacks and cryptanalysis
Publication info
Published elsewhere. 2023 Cloud Computing Security Workshop (CCSW ’23)
DOI
10.1145/3605763.3625243
Keywords
Encrypted SearchLeakage AttacksPrivacy Metric
Contact author(s)
dominique dittert @ stud tu-darmstadt de
schneider @ encrypto cs tu-darmstadt de
treiber @ encrypto cs tu-darmstadt de
History
2023-09-27: approved
2023-09-24: received
See all versions
Short URL
https://ia.cr/2023/1465
License
Creative Commons Attribution-NonCommercial
CC BY-NC

BibTeX

@misc{cryptoeprint:2023/1465,
      author = {Dominique Dittert and Thomas Schneider and Amos Treiber},
      title = {Too Close for Comfort? Measuring Success of Sampled-Data Leakage Attacks Against Encrypted Search},
      howpublished = {Cryptology ePrint Archive, Paper 2023/1465},
      year = {2023},
      doi = {10.1145/3605763.3625243},
      note = {\url{https://eprint.iacr.org/2023/1465}},
      url = {https://eprint.iacr.org/2023/1465}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.