Paper 2019/396
Mitigation Techniques for Attacks on 1-Dimensional Databases that Support Range Queries
Evangelia Anna Markatou and Roberto Tamassia
Abstract
In recent years, a number of attacks have been developed that can reconstruct encrypted one-dimensional databases that support range queries under the persistent passive adversary model. These attacks allow an (honest but curious) adversary (such as the cloud provider) to find the order of the elements in the database and, in some cases, to even reconstruct the database itself.
In this paper we present two mitigation techniques to make it harder for the adversary to reconstruct the database. The first technique makes it impossible for an adversary to reconstruct the values stored in the database with an error smaller than
Metadata
- Available format(s)
-
PDF
- Category
- Applications
- Publication info
- Preprint. MINOR revision.
- Keywords
- Searchable EncryptionEncrypted DatabasesLeakage-Abuse AttacksMitigation
- Contact author(s)
- markatou @ brown edu
- History
- 2019-09-18: revised
- 2019-04-18: received
- See all versions
- Short URL
- https://ia.cr/2019/396
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2019/396, author = {Evangelia Anna Markatou and Roberto Tamassia}, title = {Mitigation Techniques for Attacks on 1-Dimensional Databases that Support Range Queries}, howpublished = {Cryptology {ePrint} Archive, Paper 2019/396}, year = {2019}, url = {https://eprint.iacr.org/2019/396} }