improved reconstruction attacks on encrypted data using
play

Improved Reconstruction Attacks on Encrypted Data Using Range Query - PowerPoint PPT Presentation

Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage Marie-Sarah Lacharit, Brice Minaud , Kenny Paterson Information Security Group IEEE Symposium on Security and Privacy, May 21, 2018 Outsourcing Data with Search


  1. Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage Marie-Sarah Lacharité, Brice Minaud , Kenny Paterson Information Security Group IEEE Symposium on Security and Privacy, May 21, 2018

  2. Outsourcing Data with Search Capabilities Server Client 2

  3. Outsourcing Data with Search Capabilities Data upload Server Client 2

  4. Outsourcing Data with Search Capabilities Data upload Search query Matching records Server Client 2

  5. Outsourcing Data with Search Capabilities Data upload Search query Matching records Server Client For an encrypted database management system : • Data = collection of records in a database. e.g. health records. • Search query examples: - find records with given value. e.g. patients aged 57. - find records within a given range. e.g. patients aged 55-65. 2

  6. Security of Data Outsourcing Solutions Search query Matching records Adversarial Client server Adversaries : • Snapshot : breaks into server, gets snapshot of memory. • Persistent : corrupts server, sees all communication transcripts. Can be server itself. Security goal = privacy. → Adversary learns as little as possible about the client’s data and queries. 3

  7. Solutions • Structure-preserving encryption. Vulnerable to snapshot attackers. 4

  8. Solutions • Structure-preserving encryption. Vulnerable to snapshot attackers. • Second-generation schemes : Aim to protect against snapshot and persistent attackers. 4

  9. Solutions • Structure-preserving encryption. Vulnerable to snapshot attackers. • Second-generation schemes : Aim to protect against snapshot and persistent attackers. • Very active research topic. [AKSX04], [BCLO09], [PKV+14], [BLR+15], [NKW15], [KKNO16], [LW16], [FVY+17], [SDY+17], [DP17], [HLK18], [PVC18], [MPC+18]… 4

  10. Schemes Supporting Range Queries Range = [40,100] Server Client 3 1 2 4 45 6 83 28 5

  11. Schemes Supporting Range Queries Range = [40,100] 1 3 45 83 Server Client 3 1 2 4 45 6 83 28 5

  12. Schemes Supporting Range Queries Range = [40,100] 1 3 45 83 Server Client 3 1 2 4 45 6 83 28 5

  13. Schemes Supporting Range Queries Range = [40,100] 1 3 45 83 Server Client 3 1 2 4 45 6 83 28 • Most schemes leak set of matching records = access pattern leakage. OPE, ORE schemes, POPE, [HK16], BlindSeer, [Lu12], [FJ+15], … 5

  14. Schemes Supporting Range Queries Range = [40,100] 1 3 45 83 Server Client 3 1 2 4 45 6 83 28 • Most schemes leak set of matching records = access pattern leakage. OPE, ORE schemes, POPE, [HK16], BlindSeer, [Lu12], [FJ+15], … • Some schemes also leak #records below queried endpoints = rank leakage. FH-OPE, Lewi-Wu, Arx, Cipherbase, EncKV, … 5

  15. Exploiting Leakage • Most schemes prove that nothing more leaks than their leakage model allows. For example, leakage = access pattern + rank. What can we really learn from this leakage? 6

  16. Exploiting Leakage • Most schemes prove that nothing more leaks than their leakage model allows. For example, leakage = access pattern + rank. What can we really learn from this leakage? • Our goal : full reconstruction = recovering the exact value of every record. 6

  17. Exploiting Leakage • Most schemes prove that nothing more leaks than their leakage model allows. For example, leakage = access pattern + rank. What can we really learn from this leakage? • Our goal : full reconstruction = recovering the exact value of every record. • [KKNO16] : O( N 2 log N ) queries suffice for full reconstruction using only access pattern leakage! - where N is the number of possible values (e.g. 125 for age in years). 6

  18. Assumptions for our Analysis • Data is dense: all values appear in at least one record. • Queries are uniformly distributed . Our algorithms don’t actually care though – the assumption is for computing data upper bounds. 7

  19. Our Main Results • Full reconstruction with O( N · log N ) queries from access pattern leakage – in fact, N · (3 + log N ). 8

  20. Our Main Results • Full reconstruction with O( N · log N ) queries from access pattern leakage – in fact, N · (3 + log N ). Approximate reconstruction with relative accuracy ε with O( N · (log 1/ ε )) • queries. 8

  21. Our Main Results • Full reconstruction with O( N · log N ) queries from access pattern leakage – in fact, N · (3 + log N ). Approximate reconstruction with relative accuracy ε with O( N · (log 1/ ε )) • queries. • Approximate reconstruction using an auxiliary distribution and access pattern + rank leakage. 8

  22. Our Main Results • Full reconstruction with O( N · log N ) queries from access pattern leakage – in fact, N · (3 + log N ). Approximate reconstruction with relative accuracy ε with O( N · (log 1/ ε )) • queries. • Approximate reconstruction using an auxiliary distribution and access pattern + rank leakage. 8

  23. Full reconstruction

  24. Full Reconstruction Algorithm Set of all records M 1 M 2 M 3 M 4 M 5 Assume N = 7 values, and 5 queries. M i = set of records matched by i -th query. 10

  25. Step 1: Partitioning M 1 M 2 M 3 M 4 M 5 11

  26. Step 1: Partitioning M 1 M 2 M 3 M 4 M 5 … … 11

  27. Step 1: Partitioning M 1 M 2 M 3 M 4 M 5 … … If there are N minimal subsets → each of them correspond to a single value. 11

  28. Step 2a: Finding an Endpoint M 1 M 2 M 3 M 4 M 5 M 1 ∪ M 3 cover all but 1 minimal set 12

  29. Step 2a: Finding an Endpoint M 1 M 2 M 3 M 4 M 5 Endpoint! M 1 ∪ M 3 cover all but 1 minimal set 12

  30. Step 2a: Finding an Endpoint 7 M 1 M 2 M 3 M 4 M 5 Endpoint! M 1 ∪ M 3 cover all but 1 minimal set 12

  31. Step 2b: Propagating 7 M 1 M 1 M 2 M 3 M 4 M 5 • Intersect 13

  32. Step 2b: Propagating 7 M 1 M 1 M 2 M 3 M 4 M 5 • Intersect • Trim 13

  33. Step 2b: Propagating 7 M 1 M 1 M 1 M 2 M 3 M 4 M 5 • Intersect • Trim 13

  34. Step 2b: Propagating 7 M 1 M 1 M 1 M 2 M 3 M 4 M 5 Next point! • Intersect • Trim 13

  35. Step 2b: Propagating 7 6 M 1 M 1 M 1 M 2 M 3 M 4 M 5 Next point! • Intersect • Trim 13

  36. Step 2b: Propagating 5 7 6 M 1 M 2 M 3 M 4 M 5 • Intersect • Trim 14

  37. Step 2b: Propagating 4 5 7 6 M 1 M 2 M 3 M 4 M 5 • Intersect • Trim 15

  38. Step 2b: Propagating 3 4 5 7 6 M 1 M 2 M 3 M 4 M 5 • Intersect • Trim 16

  39. Step 2b: Propagating 2 3 4 5 7 6 M 1 M 2 M 3 M 4 M 5 • Intersect • Trim 17

  40. Done! 1 2 3 4 5 7 6 M 1 M 2 M 3 M 4 M 5 • Intersect • Trim 18

  41. Full Reconstruction: Conclusion • Generic setting: only access pattern leakage. • Partiotioning , then sorting steps. • Expectation of #queries sufficient for reconstruction: N · (3 + log N ) for N ≥ 26 • Expectation of #queries necessary for reconstruction: 1/2 · N · log N – O(N) for any algorithm. • Our algorithm is data-optimal. 19

  42. Reconstruction with Auxiliary Data + Rank Leakage

  43. Auxiliary Data Attack with Rank Leakage • Assume access pattern + rank leakage. • Also assume an approximation to the distribution on values is known. “Auxiliary distribution”. From aggregate data, or from another reference source. • We show experimentally that, under these assumptions, far fewer queries are needed. 21

  44. Auxiliary Data Attack Algorithm Set of all records M 1 M 2 Assume N = 125 values, and 2 queries. M i = set of records matched by i -th query. 22

  45. Partitioning and Matching M 1 M 2 23

  46. Partitioning and Matching M 1 M 2 23

  47. Partitioning and Matching M 1 M 2 % records 10% below 23

  48. Partitioning and Matching M 1 M 2 % records 10% 32% below 23

  49. Partitioning and Matching M 1 M 2 % records 10% 32% 77% below 23

  50. Partitioning and Matching M 1 M 2 % records 10% 32% 77% 85% below 23

  51. Partitioning and Matching M 1 M 2 % records 10% 32% 77% 85% below Matching with aux. distribution Age 12 23

  52. Partitioning and Matching M 1 M 2 % records 10% 32% 77% 85% below Matching with aux. distribution Age 12 43 23

  53. Partitioning and Matching M 1 M 2 % records 10% 32% 77% 85% below Matching with aux. distribution Age 12 43 60 23

  54. Partitioning and Matching M 1 M 2 % records 10% 32% 77% 85% below Matching with aux. distribution Age 12 43 60 72 23

  55. Partitioning and Matching M 1 M 2 % records 10% 32% 77% 85% below Matching with aux. distribution Age 12 43 60 72 Expectation 19 23

  56. Partitioning and Matching M 1 M 2 % records 10% 32% 77% 85% below Matching with aux. distribution Age 12 43 60 72 Expectation 19 50 23

  57. Partitioning and Matching M 1 M 2 % records 10% 32% 77% 85% below Matching with aux. distribution Age 12 43 60 72 Expectation 19 50 65 23

  58. Auxiliary Data Attack: Experimental Evaluation • Ages, N = 125. • Health records from US hospitals (NIS HCUP 2009). • Target: age of individual hospitals' records. • Auxiliary data: aggregate of 200 hospitals' records. • Measure of success: proportion of records with value guessed within ε . 24

  59. Results with Imperfect Auxiliary Data 25

  60. Conclusions

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend