• DocumentCode
    651707
  • Title

    Analysis of heuristic based access pattern obfuscation

  • Author

    Ulusoy, Huseyin ; Kantarcioglu, Murat ; Thuraisingham, Bhavani ; Cankaya, Ebru Celikel ; Pattuk, Erman

  • Author_Institution
    Univ. of Texas at Dallas, Dallas, TX, USA
  • fYear
    2013
  • fDate
    20-23 Oct. 2013
  • Firstpage
    537
  • Lastpage
    544
  • Abstract
    As cloud computing becomes popular, the security and privacy issues emerge as important hindrances to more widespread adoption of cloud computing. In particular, outsourcing sensitive data to untrusted cloud service providers creates important security and regulatory compliance challenges. Encryption of the outsourced data has been introduced as an alternative to protect privacy and security. In the context of searchable symmetric encryption, many solutions have been proposed to perform efficient search on the encrypted outsourced data. Some of them achieve protecting privacy of outsourced data, but may disclose the access patterns (i.e., they disclose which data items are retrieved based on the query execution). Recently, it has been shown that such access pattern disclosures could be exploited even further to infer sensitive information about underlying data, even if the data is stored in encrypted form. To address the access pattern disclosures, oblivious RAM and heuristic based techniques are proposed. However, the overhead of oblivious RAM based solutions is too high in many cases, and the security and scalability of heuristic based techniques have not been carefully analyzed yet. In this paper, we provide the first framework to analyze and compare the security and efficiency of such heuristics (e.g., caching, fake data access, and data duplication). In addition, we provide extensive empirical analysis that yields important insights into how to use such heuristics effectively in practice; and we discuss how such heuristics can be combined to improve security and efficiency.
  • Keywords
    cloud computing; cryptography; data privacy; security of data; RAM; access pattern disclosures; cloud computing; data privacy; data security; heuristic based access pattern obfuscation; heuristic based techniques; outsourced data encryption; searchable symmetric encryption; sensitive data outsourcing; untrusted cloud service providers; Cloud computing; Encryption; Indexes; Protocols; Random access memory;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Collaborative Computing: Networking, Applications and Worksharing (Collaboratecom), 2013 9th International Conference Conference on
  • Conference_Location
    Austin, TX
  • Type

    conf

  • Filename
    6680022