Understanding database reconstruction attacks on public data
نویسندگان
چکیده
منابع مشابه
Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage
We analyse the security of database encryption schemes supporting range queries against persistent adversaries. Security against such an adversary captures, among other things, the privacy of the client’s data with respect to the server hosting the encrypted database. The bulk of our work applies to a generic setting, where the view of the adversary is limited to the set of records or documents...
متن کاملComment on the Public Key Substitution Attacks
In this paper we present a comment on some previous works about the Public Key Substitution Attacks (PKSA in brief). Though there exist some security flaws for the schemes being attacked, we point out that these attacks on them are either trivial or avoidable after a little modification.
متن کاملOn Dimensions of Reconstruction in Database Forensics
Although very little amount of research has been done on database forensics, current research has tacitly focused on digital examination and reconstruction of databases from a number of dimensions. The general assumption is that only one of these dimensions needs to be handled during database forensics investigations. This paper analyses the dimensions in which research in database forensics ha...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Communications of the ACM
سال: 2019
ISSN: 0001-0782,1557-7317
DOI: 10.1145/3287287