How can pattern analysis be used to work out the values in a database
Data in a column in a database may feature many reoccurring values (e.g. gender, age), while the data may be encrypted, if the ciphertexts are all always the same for the same plaintext, the data in these columns can be mapped to a known frequency distribution to predict the values.
What does using an encrypted email search not hide?
The result of the search, as if the user then sends a request to download the emails the server knows which emails the user found from the search.
How do you search an encrypted email server?
The server has names and several indexes for each email. Each index is a document name encrypted with a key word as the key. Every document name is encrypted with the search term and compared to any stored indexes. For any matches the email is returned.
What is ORAM?
Oblivious RAM. Designed to hide the ways in which data is accessed from the server in a client-server model. (Which data, when, how, frequency, relationship between consecutive accesses)