Metadata Security Flashcards

(4 cards)

1
Q

How can pattern analysis be used to work out the values in a database

A

Data in a column in a database may feature many reoccurring values (e.g. gender, age), while the data may be encrypted, if the ciphertexts are all always the same for the same plaintext, the data in these columns can be mapped to a known frequency distribution to predict the values.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does using an encrypted email search not hide?

A

The result of the search, as if the user then sends a request to download the emails the server knows which emails the user found from the search.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How do you search an encrypted email server?

A

The server has names and several indexes for each email. Each index is a document name encrypted with a key word as the key. Every document name is encrypted with the search term and compared to any stored indexes. For any matches the email is returned.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is ORAM?

A

Oblivious RAM. Designed to hide the ways in which data is accessed from the server in a client-server model. (Which data, when, how, frequency, relationship between consecutive accesses)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly