database. Moreover, we only add one false positive
by document.
Countermeasure for the Mask Attack. The Mask
Attack targets L4-SSE schemes. Assume we want
to keep information on occurrence and order of key-
words for the same reason as above. Again, we au-
thorize false positives. Hence we can add a random
keyword at a random position in each document. In
this way, the mask of the original document does not
correspond to those of the new document. Moreover,
if the adversary tries to find the correct identifier of
a document in the encrypted database, it has a low
probability to find the added keyword and its posi-
tion. A possible alternative to not add false positive
is to choose the added keyword among those of the
original document. This increases the chance for the
adversary to guess the added keyword.
8 CONCLUSION
Prior work (Zhang et al., 2016) taught us that SSE
schemes have no hope of being secure in a setting
where the adversary can inject chosen files. Addition-
ally, (Cash et al., 2015; Islam et al., 2012; Pouliot and
Wright, 2016) have shown that passive observations
of search tokens reveal the underlying searched key-
word when the data set is fully known. This paper
focuses on passive attacks of L4, L3 and L2 schemes
currently used as commercially solutions, e.g. Ci-
pherCloud. The most glaring conclusion is that our
attacks are devastating and have a real impact on the
protected data in the cloud: regardless of the leak-
age profile, knowing a mere 1% of the document sets
translates into over 90% of documents whose content
is revealed over 70%. Moreover, having same knowl-
edge from the data set, we show that we recover same
rate of keywords whether it is with L4- or with L3-
SSE schemes. We show too that the gap of security
that exists between L2- and L1-SSE schemes is impor-
tant since L1 attacks need to know a large amount of
information to recover frequent keywords contrary to
our L2 attack. Our results give a better understanding
of the practical security of SSE schemes and hope-
fully will help practitioners make more secure SSE
schemes. Future work may deal with countermea-
sures in depth and with the study of the degradation
from L1 to L2 in the presence of queries.
ACKNOWLEDGEMENTS
This research was conducted with the support of the
FEDER program of 2014-2020, the region council of
Auvergne-Rh
ˆ
one-Alpes, the Indo-French Centre for
the Promotion of Advanced Research (IFCPAR) and
the Center Franco-Indien Pour La Promotion De La
Recherche Avanc
´
ee (CEFIPRA) through the project
DST/CNRS 2015-03 under DST-INRIA-CNRS Tar-
geted Programme.
REFERENCES
Berkhin, P. (2006). A Survey of Clustering Data Mining
Techniques.
Cash, D., Grubbs, P., Perry, J., and Ristenpart, T. (2015).
Leakage-Abuse Attacks Against Searchable Encryp-
tion. In CCS 2015, New York, NY, USA. ACM.
Cash, D., Jaeger, J., Jarecki, S., Jutla, C. S., Krawczyk, H.,
Rosu, M., and Steiner, M. (2014). Dynamic search-
able encryption in very-large databases: Data struc-
tures and implementation. In NDSS 2014.
Cash, D., Jarecki, S., Jutla, C. S., Krawczyk, H., Rosu,
M., and Steiner, M. (2013). Highly-Scalable Search-
able Symmetric Encryption with Support for Boolean
Queries. In CRYPTO 2013.
Curtmola, R., Garay, J. A., Kamara, S., and Ostrovsky, R.
(2006). Searchable symmetric encryption: improved
definitions and efficient constructions. In CCS 2006.
Faber, S., Jarecki, S., Krawczyk, H., Nguyen, Q., Rosu, M.,
and Steiner, M. (2015). Rich Queries on Encrypted
Data: Beyond Exact Matches. In ESORICS 2015.
Goldreich, O. (1998). Secure Multi-party Computation.
Working Draft.
He, W., Akhawe, D., Jain, S., Shi, E., and Song, D. (2014).
ShadowCrypt: Encrypted Web Applications for Ev-
eryone. In CCS 2014.
Islam, M. S., Kuzu, M., and Kantarcioglu, M. (2012).
Access Pattern disclosure on Searchable Encryption:
Ramification, Attack and Mitigation. In NDSS 2012.
Kamara, S., Papamanthou, C., and Roeder, T. (2012). Dy-
namic Searchable Symmetric Encryption. In CCS
2012.
Lau, B., Chung, S., Song, C., Jang, Y., Lee, W., and
Boldyreva, A. (2014). Mimesis Aegis: A Mimicry
Privacy Shield–A System’s Approach to Data Privacy
on Public Cloud. In USENIX Security 2014.
Porter, M. F. (1980). An algorithm for suffix striping. Pro-
gram.
Pouliot, D. and Wright, C. V. (2016). The Shadow Neme-
sis: Inference Attacks on Efficiently Deployable, Effi-
ciently Searchable Encryption. In CCS 2016.
Song, D. X., Wagner, D., and Perrig, A. (2000). Practical
Techniques for Searches on Encrypted Data. In SP
2000. IEEE Computer Society.
Zhang, Y., Katz, J., and Papamanthou, C. (2016). All
Your Queries Are Belong to Us: The Power of File-
Injection Attacks on Searchable Encryption. Cryptol-
ogy ePrint Archive, Report 2016/172.
Practical Passive Leakage-abuse Attacks Against Symmetric Searchable Encryption
211