Quantifying Information Leakage of Deterministic Encryption

VenueCategory
CCSW'19Deterministic Encryption

Quantifying Information Leakage of Deterministic Encryption1. SummaryMotivation of this paperQuantitative Information Flow (QIF)Implementation and Evaluation2. Strength (Contributions of the paper)3. Weakness (Limitations of the paper)4. Some Insights

1. Summary

Motivation of this paper

enable clients to make queries on sensitive data. the security implications of deterministic encryption are not well understood.

This paper provides a leakage analysis of deterministic encryption through the application of the framework of quantitative information flow.

Quantitative Information Flow (QIF)

different operational scenarios require different leakage measures.

it is natural to measure the leakage of the channel by comparing the prior g-vulnerability with the posterior g-vulnerability.

  1. uniform distribution
  2. an arbitrarily chosen non-uniform distribution
  3. a distribution in which two values has the same probability
  4. a distribution in which two values' probabilities are very close but not the same.

Implementation and Evaluation

2. Strength (Contributions of the paper)

  1. This paper provides a comprehensive information leakage analysis via considering different distribution and different operational scenarios of the adversary.

3. Weakness (Limitations of the paper)

4. Some Insights

  1. This paper mentions the way to mitigate inference attack by inserting fake entries prior to uploading the database to the cloud.

For encrypted deduplication, can we insert fake chunk to the original workload to mitigate the attack?

  1. This paper considers different distribution and analyzes the information leakage in different cases.

In our paper, we do not provide a fine-grain information leakage analysis, we just use KLD as a coarse measurement for information leakage.