
Leqian Zheng, Lei Xu, Cong Wang, Sheng Wang, Yuke Hu, Zhan Qin, Feifei Li, and Kui Ren
relative error
𝜖
needs
Ω(𝜖
−4
)
queries [
33
]. Hence, mitigating partial
yet signicant leakage with manageable performance overheads is
destined and admissible. Considering diverse and complex deploy-
ment scenarios, such a trade-o between performance and security
should ideally be tunable.
From the perspective of system leakage, most countermeasures
protect only subsets of leakage patterns. For instance, ObliDB [
25
]
provides a set of customized oblivious operators to conceal mem-
ory access patterns across various query workloads, yet it ignores
hiding the sizes of the intermediate and result tables (i.e., volume
pattern). Most volume-hiding solutions [
2
,
45
,
61
,
96
] ignore the
query equality pattern, which indicates whether two queries re-
peat. Pancake [
31
] mitigates the access pattern via smoothing the
access frequency to entries in an encrypted data store, while the
exposed query correlation pattern has been shown to be vulnerable
to IHOP attack [
60
]. It is hence essential to consider system-wide
leakage while designing encrypted data stores. This problem is
more pronounced in leakage mitigation schemes, where relaxing
protection over existing leakage may inadvertently expose new
and detrimental leakage patterns. A notable example is that relax-
ing oblivious access to frequency-smoothed access introduces the
query correlation pattern [31, 60].
From the perspective of protection applied, existing solutions
typically apply a uniform security notion over all supported work-
loads. This approach simplies the comprehension of the system’s
security but impedes the attainment of ne-tuned and improved
privacy-eciency trade-os. For instance, Adore [
68
] protects a
set of common workloads in relational databases in a dierentially
oblivious approach, which ensures that the access pattern complies
with the dierential privacy notion. However, some workloads,
such as table joins that do not preserve neighboring outputs (as
discussed in §5), may not align well with such a protection mea-
sure. Besides,
E
psolute [
12
] applies the same dierentially private
sanitizer to both point and range queries, while we could leverage
a more ecient scheme [
61
] to hide the volume pattern in point
queries. It is hence valuable to identify the nuanced privacy re-
quirements inherent in each specic workload, with the primary
challenge being that eciently and securely accommodating a new
workload may necessitate modications to the existing ones.
1.1 Our Contributions
Drawing on the above insights, we investigate the system-wide
approach towards tunable leakage mitigation by following recent
enclave-based encrypted data stores [
3
,
25
,
84
,
91
]. To this end,
we present Swat, an ecient encrypted data store that progres-
sively supports key-value, range-query, and dynamic workloads
with tunable system-wide leakage mitigation. We adopt a widely
accepted assumption [
12
,
31
] that posits the existence of a trusted
client proxy. The proxy is responsible for routing client queries to
the enclave deployed on the cloud server via a secure and authenti-
cated channel. We additionally assume a dedicated communication
channel as the billing model based on network bandwidth (rather
than data transferred) usage per month (or year), which we denote
as pay-by-bandwidth, is a standard practice in cloud services
1
.
1
Examples in alphabetical order include Alibaba Cloud, AWS Direct Connect, Azure
ExpressRoute, and Tencent Cloud.
Our work starts from the key-value workload due to its simplicity,
where keys and equal-length values are protected by pseudorandom
functions and authenticated encryption. We mitigate the primary
leakage, i.e., access and query correlation patterns, via frequency
smoothing and partial query decorrelation respectively. We adopt
Pancake for the former one due to its noteworthy gains in balancing
performance and security. Pancake provides provable assurance
of achieving a uniform access frequency for each entry in the key-
value store, irrespective of their original access distribution, as long
as each query is generated independently. However, it falls short in
protecting encrypted data stores when queries are correlated [60].
We hence devise an elegant and almost-for-free security patch,
modeled as
𝜃
-query decorrelation, to mitigate this leakage pattern.
This technique also holds potential for broader applications in other
searchable encryption systems.
We then extend Swat to handle range queries that inherently
expose more leakage, such as order and volume patterns. To sys-
tem widely address these leakage patterns, we introduce a formal
security notion aimed at reducing leakage of range query systems
to that of the previous stage (i.e., key-value stores). Intuitively, no
adversary under this notion can distinguish between a sequence of
data accesses from range queries (sampled from an arbitrary dis-
tribution) and those from uniformly random sampling. To achieve
this, we develop an ecient protocol that sets up the encrypted
data store by partitioning the input dataset into buckets without
revealing their order, and handles queries by accessing the data
store at a xed rate and retrieving a xed number of buckets in
each access. This protocol eectively suppresses order, volume, and
search timestamp patterns, with reasonable monetary cost (thanks
to the pay-by-bandwidth billing model).
Subsequently, we introduce a data-structure dynamization tech-
nique to enable updates over the encrypted data store. In order to
maintain query eciency, the data store requires a well-structured,
albeit hidden from anyone but the trusted proxy (for security),
search index. Unless properly mitigated, the memory access pattern
during index updates will expose sensitive information regarding
the underlying structure of the encrypted data. We capture such
a dominant privacy demand by formulating a dierential obliv-
iousness notion [
17
] since it oers principled privacy-eciency
trade-os. We also evolve a
𝑘
-way dierentially oblivious merge
algorithm from the 2-way one [
17
], which serves as the foundation
of dynamization, to oer better privacy guarantees. Moreover, we
improve the practical performance of the dierentially oblivious
merge algorithm by notably reducing the size of its oblivious buer
without hurting the security guarantees it claims.
We then implement an end-to-end system Swat that realizes
the above functionalities on top of Intel SGX. Swat is about 10
.
6
×
slower than an encryption-only database that exposes all detrimen-
tal leakage patterns and 31
.
6
×
faster than a trivial solution that
eliminates all these patterns. We also compare it to ObliDB [
59
],
the state-of-the-art oblivious database, and
E
psolute [
12
], the state-
of-the-art range-query system mitigating the volume pattern and
eliminating the memory access pattern. The result shows that our
design provides competitive performance while mitigating system-
wide leakage patterns. We also run extensive experiments with
various settings and compiled a detailed result analysis.
We summarize our contributions in this work as follows:
文档被以下合辑收录
评论