CS6262 Lecture 19 - Property Preserving Encryption

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/37

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

38 Terms

1
New cards
What makes shared resources in cloud computing both beneficial and risky?
Shared resources increase efficiency but also create security vulnerabilities
2
New cards
In a cloud environment, what is a common target for attackers?
Data stored or processed in the cloud
3
New cards
Why is data considered a valuable target in cloud environments?
Attackers aim to steal sensitive information stored or processed in the cloud
4
New cards
What is the main challenge when encrypting data for cloud applications?
Encryption protects data from adversaries but prevents applications from using it directly
5
New cards
How does property-preserving encryption differ from standard encryption?
It preserves selective properties of plaintext such as equality or order
6
New cards
What is the purpose of searchable encryption?
To enable searching of encrypted data using encrypted keywords
7
New cards
What does secure computation enable in a multi-party setting?
Multiple parties can compute a function with inputs that remain private
8
New cards
How does homomorphic encryption work?
Computations performed on ciphertext produce results equivalent to computations on plaintext
9
New cards
What is functional encryption designed to do?
Provides the ability to learn a function of encrypted data without learning the data itself
10
New cards
What is the main advantage of Property Preserving Encryption in cloud environments?
Applications can work on encrypted data without modification
11
New cards
What is a potential concern with Property Preserving Encryption?
Preserving properties may leak sensitive information
12
New cards
In equality-preserving encryption, what property is maintained?
Equality between values
13
New cards
What type of information is leaked in equality-preserving encryption?
Frequency of repeated values
14
New cards
In order-preserving encryption, what property of the plaintext is preserved?
Relative ordering
15
New cards
What types of information are leaked in order-preserving encryption?
Order and frequency distributions
16
New cards
What is the goal of an inference attack in a cloud environment?
Recover plaintext from ciphertext using auxiliary information
17
New cards
What type of public information can help inference attacks?
Auxiliary data such as statistical distributions
18
New cards
What type of attack can defeat equality-preserving encryption?
Frequency analysis attack
19
New cards
How does an attacker begin a frequency analysis attack?
Sort encrypted values and record their frequencies
20
New cards
How does an attacker match ciphertext to plaintext during a frequency attack?
By comparing encrypted frequency histograms to known plaintext distributions
21
New cards
What is the goal in a generalized frequency analysis attack?
To find the best mapping between ciphertext and plaintext minimizing histogram mismatch
22
New cards
What does the cost function represent in a generalized frequency attack?
The mismatch between ciphertext and plaintext histograms
23
New cards
What type of attack is more effective than sorting for order-preserving encryption?
Cumulative attack
24
New cards
What can an adversary learn from a column encrypted with order-preserving encryption?
Frequencies and relative ordering of values
25
New cards
What is the empirical cumulative distribution function (CDF) used for in cumulative attacks?
Matching ciphertext to plaintext using ordering information
26
New cards
How does a cumulative attack improve plaintext matching?
Uses both frequency and CDF information to minimize mismatch
27
New cards
Which mathematical problem category does cumulative attack mapping fall into?
Linear Sum Assignment Problem
28
New cards
What is the main privacy risk when encrypting data on a cloud server but keeping keys locally?
Data access patterns may reveal sensitive information
29
New cards
Why is fetching encrypted data locally for computation inefficient?
Access patterns still leak usage information
30
New cards
What is the main goal of Oblivious RAM (ORAM) in cloud computing?
To hide access patterns from the cloud provider
31
New cards
How does ORAM make access patterns independent of real operations?
Uses fixed-size blocks, dummy operations, and re-encryption/shuffling
32
New cards
What type of encryption does ORAM use?
Standard encryption
33
New cards
Why are dummy accesses used in ORAM?
To make read and write operations indistinguishable
34
New cards
How does ORAM handle data objects to prevent distinguishing them?
All objects are fixed size and appear identical
35
New cards
What is the current status of ORAM research?
It is an active and ongoing research area
36
New cards
Why does an ORAM client need a private source of randomness?
To generate unpredictable access sequences
37
New cards
Is data encryption still required when using ORAM?
Yes, encryption protects data content from the cloud provider
38
New cards
What is the purpose of performing both a read and a write for each ORAM access?
To hide whether the operation is actually a read or write