University of Waterloo COVID-19 update

The University of Waterloo is constantly updating its most frequently asked questions.

Questions about buildings and services? Please visit the list of modified services.

Please note: The University of Waterloo is closed for all events until further notice.

Master’s Thesis Presentation • Cryptography, Security, and Privacy (CrySP) — Differentially Private Searchable Symmetric Encryption Scheme with Configurable Pattern LeakageExport this event to calendar

Tuesday, December 10, 2019 — 1:00 PM EST

Zhiwei Shang, Master’s candidate
David R. Cheriton School of Computer Science

Searchable symmetric encryption scheme allows data owner to outsource its data to a cloud server while maintaining the ability to search over it. Most existing SSE schemes allow access-pattern leakage, which are vulnerable to query recovery attacks like IKK attack. Oblivious RAM and PIR can be used to construct SSE schemes fully hiding access patterns. However, such schemes are suffering heavy communication overhead or computation overhead making them impractical. Chen et al. proposed an obfuscation mechanism to protect existing SSE schemes against access-pattern leakage. This mechanism can produce differentially private access patterns per keyword. However, it cannot hide whether the same keyword has been searched for multiple times, i.e. the search patterns.

In this paper, we proposed a stronger security definition for differentially private searchable symmetric encryption scheme and presented a real construction DPSSE fulfilling it. On the one hand, DPSSE is adaptively semantically secure and provides differential privacy for both keywords and documents. On the other hand, DPSSE has communication complexity as small as O(|D(w)| × log log n) and computation complexity of O(n × log log n) while querying relatively frequent keyword w. When assuming queries follow Zipfian distribution, the amortized communication complexity would be O(|D(w)| × log n log log n). By replicating IKK attack, we showed that DPSSE could actually hide access patterns and make it difficult to extract useful information from differentially private access-pattern leakage. By performing KMeans clustering algorithm, we were able to show that inferring search patterns from differentially private access-pattern leakage is difficult, namely search patterns are hidden.

Location 
DC - William G. Davis Computer Research Centre
1304
200 University Avenue West

Waterloo, ON N2L 3G1
Canada

S M T W T F S
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
1
2
3
4
  1. 2020 (74)
    1. May (3)
    2. April (7)
    3. March (17)
    4. February (25)
    5. January (22)
  2. 2019 (255)
    1. December (21)
    2. November (25)
    3. October (16)
    4. September (20)
    5. August (18)
    6. July (12)
    7. June (23)
    8. May (23)
    9. April (32)
    10. March (25)
    11. February (16)
    12. January (24)
  3. 2018 (220)
  4. 2017 (36)
  5. 2016 (21)
  6. 2015 (36)
  7. 2014 (33)
  8. 2013 (23)
  9. 2012 (4)
  10. 2011 (1)
  11. 2010 (1)
  12. 2009 (1)
  13. 2008 (1)