skip to main content
10.1145/3372297.3417275acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Full Database Reconstruction in Two Dimensions

Published:02 November 2020Publication History

ABSTRACT

In the past few years, we have seen multiple attacks on one-dimensional databases that support range queries. These attacks achieve full database reconstruction by exploiting access pattern leakage along with known query distribution or search pattern leakage. We are the first to go beyond one dimension, exploring this threat in two dimensions. We unveil an intrinsic limitation of reconstruction attacks by showing that there can be an exponential number of distinct databases that produce equivalent leakage. Next, we present a full database reconstruction attack. Our algorithm runs in polynomial time and returns a poly-size encoding of all databases consistent with the given leakage profile. We implement our algorithm and observe real-world databases that admit a large number of equivalent databases, which aligns with our theoretical results.

Skip Supplemental Material Section

Supplemental Material

Copy of CCS2020_fpx247_Francesca Falzon_Evangelia Anna Markatou - Andrew Diehl.mov

mov

201.5 MB

References

  1. Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikant, and Yirong Xu. 2004. Order Preserving Encryption for Numeric Data. In Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data (SIGMOD 2004).Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Akshima, David Cash, Francesca Falzon, Adam Rivkin, and Jesse Stern. 2020. Multidimensional Database Reconstruction from Range Query Access Patterns. Cryptology ePrint Archive, Report 2020/296. (2020). https://eprint.iacr.org/2020/296.Google ScholarGoogle Scholar
  3. Vincent Bindschaedler, Paul Grubbs, David Cash, Thomas Ristenpart, and Vitaly Shmatikov. 2018. The Tao of Inference in Privacy-Protected Databases. Proc. VLDB Endow. , Vol. 11, 11 (July 2018), 1715--1728.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Alexandra Boldyreva, Nathan Chenette, Younho Lee, and Adam O'Neill. 2009. Order-Preserving Symmetric Encryption. In Advances in Cryptology - EUROCRYPT 2009 .Google ScholarGoogle Scholar
  5. Alexandra Boldyreva, Nathan Chenette, and Adam O'Neill. 2011. Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions. In Advances in Cryptology -- CRYPTO 2011 .Google ScholarGoogle Scholar
  6. David Cash, Joseph Jaeger, Stanislaw Jarecki, Charanjit S Jutla, Hugo Krawczyk, Marcel-Catalin Rosu, and Michael Steiner. 2014. Dynamic searchable encryption in very-large databases: data structures and implementation. In 21st Annual Network and Distributed System Security Symposium 2014 (NDSS 2014).Google ScholarGoogle ScholarCross RefCross Ref
  7. Javad Ghareh Chamani, Dimitrios Papadopoulos, Charalampos Papamanthou, and Rasool Jalili. 2018. New Constructions for Forward and Backward Private Symmetric Searchable Encryption. In Proc. of ACM Conf. on Computer and Communications Security 2018 (CCS 2018).Google ScholarGoogle Scholar
  8. Melissa Chase and Seny Kamara. 2010. Structured Encryption and Controlled Disclosure. Advances in Cryptology -- ASIACRYPT 2010 .Google ScholarGoogle Scholar
  9. Ciphercloud. 2020. CipherCloud: Cloud Data Security Company. (2020). http://www.ciphercloud.com Accessed on May 3, 2020.Google ScholarGoogle Scholar
  10. Reza Curtmola, Juan Garay, Seny Kamara, and Rafail Ostrovsky. 2011. Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions. Journal of Computer Security , Vol. 19, 5 (2011), 895--934.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Ioannis Demertzis, Javad Ghareh Chamani, Dimitrios Papadopoulos, and Charalampos Papamanthou. 2020 a. Dynamic Searchable Encryption with Small Client Storage. In 27th Annual Network and Distributed System Security Symposium 2020 (NDSS 2020).Google ScholarGoogle Scholar
  12. Ioannis Demertzis, Dimitrios Papadopoulos, Charalampos Papamanthou, and Saurabh Shintre. 2020 b. SEAL: Attack Mitigation for Encrypted Databases via Adjustable Leakage. In 29th USENIX Security Symposium (USENIX Security 20) .Google ScholarGoogle Scholar
  13. F. Betül Durak, Thomas M. DuBuisson, and David Cash. 2016. What Else is Revealed by Order-Revealing Encryption?. In Proc. ACM Conf. on Computer and Communications Security 2016 (CCS 2016).Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Sky Faber, Stanislaw Jarecki, Hugo Krawczyk, Quan Nguyen, Marcel-Catalin Rosu, and Michael Steiner. 2015. Rich Queries on Encrypted Data: Beyond Exact Matches. In 20th European Symposium on Research in Computer Security 2015 (ESORICS 2015).Google ScholarGoogle Scholar
  15. B. Fuller, M. Varia , A. Yerukhimovich, E. Shen , A. Hamlin, V. Gadepally , R. Shay, J. D. Mitchell, and R. K. Cunningham. 2017. SoK: Cryptographically Protected Database Search. In Proc. IEEE Symposium on Security and Privacy 2017 (S&P 2017).Google ScholarGoogle ScholarCross RefCross Ref
  16. Sanjam Garg, Payman Mohassel, and Charalampos Papamanthou. 2016. TWORAM: Efficient Oblivious RAM in Two Rounds with Applications to Searchable Encryption. In Advances in Cryptology - CRYPTO 2016 .Google ScholarGoogle Scholar
  17. Paul Grubbs, Anurag Khandelwal, Marie-Sarah Lacharité , Lloyd Brown, Lucy Li, Rachit Agarwal, and Thomas Ristenpart. 2020. Pancake: Frequency Smoothing for Encrypted Data Stores. In 29th USENIX Security Symposium (USENIX Security 20) .Google ScholarGoogle Scholar
  18. P. Grubbs, M. Lacharité, B. Minaud, and K. G. Paterson. 2019. Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks. In Proc. IEEE Symp. on Security and Privacy 2019 (S&P 2019).Google ScholarGoogle ScholarCross RefCross Ref
  19. Paul Grubbs, Marie-Sarah Lacharité, Brice Minaud, and Kenneth G. Paterson. 2018. Pump Up the Volume: Practical Database Reconstruction from Volume Leakage on Range Queries. In Proc. ACM Conf. on Computer and Communications Security 2018 (CCS 2018).Google ScholarGoogle Scholar
  20. P. Grubbs, K. Sekniqi, V. Bindschaedler, M. Naveed, and T. Ristenpart. 2017. Leakage-Abuse Attacks against Order-Revealing Encryption. In Proc. IEEE Symp. on Security and Privacy 2017 (S&P 2017).Google ScholarGoogle ScholarCross RefCross Ref
  21. Seny Kamara and Tarik Moataz. 2018. SQL on Structurally-Encrypted Databases. In Advances in Cryptology -- ASIACRYPT 2018 .Google ScholarGoogle Scholar
  22. Seny Kamara, Tarik Moataz, Stan Zdonik, and Zheguang Zhao. 2020. An Optimal Relational Database Encryption Scheme. Cryptology ePrint Archive, Report 2020/274. (2020). https://eprint.iacr.org/2020/274.Google ScholarGoogle Scholar
  23. Georgios Kellaris, George Kollios, Kobbi Nissim, and Adam O'Neill. 2016. Generic Attacks on Secure Outsourced Databases. In Proc. ACM Conf. on Computer and Communications Security 2016 (CCS 2016).Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Evgenios M. Kornaropoulos, Charalampos Papamanthou, and Roberto Tamassia. 2019. Data Recovery on Encrypted Databases With k-Nearest Neighbor Query Leakage. In Proc. IEEE Symp. on Security and Privacy 2019 (S&P 2019).Google ScholarGoogle ScholarCross RefCross Ref
  25. Evgenios M. Kornaropoulos, Charalampos Papamanthou, and Roberto Tamassia. 2020. The State of the Uniform: Attacks on Encrypted Databases Beyond the Uniform Query Distribution. In Proc. IEEE Symp.on Security and Privacy 2020 (S&P 2020).Google ScholarGoogle ScholarCross RefCross Ref
  26. Marie-Sarah Lacharité , Brice Minaud, and Kenneth G Paterson. 2018. Improved reconstruction attacks on encrypted data using range query leakage. In Proc. IEEE Symp. on Security and Privacy 2018 (S&P 2018).Google ScholarGoogle ScholarCross RefCross Ref
  27. Evangelia Anna Markatou and Roberto Tamassia. 2019 a. Full Database Reconstruction with Access and Search Pattern Leakage. In Proc. Int. Conf on Information Security 2019 (ISC 2019).Google ScholarGoogle ScholarCross RefCross Ref
  28. Evangelia Anna Markatou and Roberto Tamassia. 2019 b. Mitigation Techniques for Attacks on 1-Dimensional Databases that Support Range Queries. In Proc. Int. Conf on Information Security 2019 (ISC 2019).Google ScholarGoogle ScholarCross RefCross Ref
  29. Evangelia Anna Markatou and Roberto Tamassia. 2020. Database Reconstruction Attacks in Two Dimensions. Cryptology ePrint Archive, Report 2020/284. (2020). https://eprint.iacr.org/2020/284.Google ScholarGoogle Scholar
  30. Charalampos Mavroforakis, Nathan Chenette, Adam O'Neill, George Kollios, and Ran Canetti. 2015. Modular Order-Preserving Encryption, Revisited. In Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data (SIGMOD 2015).Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Muhammad Naveed, Seny Kamara, and Charles V. Wright. 2015. Inference Attacks on Property-Preserving Encrypted Databases. In Proc. ACM Conf. on Computer and Communications Security 2015 (CCS 2015).Google ScholarGoogle Scholar
  32. Skyhigh Networks. 2020. Skyhigh Networks. (2020). https://www.skyhighnetworks.com accessed on May 3, 2020.Google ScholarGoogle Scholar
  33. Antonis Papadimitriou, Ranjita Bhagwan, Nishanth Chandran, Ramachandran Ramjee, Andreas Haeberlen, Harmeet Singh, Abhishek Modi, and Saikrishna Badrinarayanan. 2016. Big Data Analytics over Encrypted Datasets with Seabed. In 12th USENIX Symposium on Operating Systems Design and Implementation 2016 (OSDI 2016).Google ScholarGoogle Scholar
  34. Rishabh Poddar, Tobias Boelter, and Raluca Ada Popa. 2019. Arx: An Encrypted Database using Semantically Secure Encryption. Proc. VLDB Endow. , Vol. 12, 11 (August 2019), 1664--1678.Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Raluca Ada Popa, Catherine M. S. Redfield, Nickolai Zeldovich, and Hari Balakrishnan. CryptDB: Protecting Confidentiality with Encrypted Query Processing. In Proc. of the Twenty-Third ACM Symposium on Operating Systems Principles 2011 (SOSP '11).Google ScholarGoogle Scholar
  36. Malte Spitz. 2011. CRAWDAD dataset spitz/cellular (v. 2011-05-04). Downloaded from https://crawdad.org/spitz/cellular/20110504. (May 2011).Google ScholarGoogle Scholar
  37. Boyang Wang, Yantian Hou, Ming Li, Haitao Wang, and Hui Li. 2014. Maple: Scalable Multi-Dimensional Range Search over Encrypted Cloud Data with Tree-Based Index. In Proc. of the 9th ACM Symposium on Information, Computer and Communications Security (ASIA CCS '14).Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Full Database Reconstruction in Two Dimensions

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        CCS '20: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security
        October 2020
        2180 pages
        ISBN:9781450370899
        DOI:10.1145/3372297

        Copyright © 2020 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 2 November 2020

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate1,261of6,999submissions,18%

        Upcoming Conference

        CCS '24
        ACM SIGSAC Conference on Computer and Communications Security
        October 14 - 18, 2024
        Salt Lake City , UT , USA

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader