Encrypted search provides a search functionality on encrypted data, e.g., via encrypted SQL queries on a relational encrypted database . These schemes usually possess some well-defined information leakage. Leakage attacks on encrypted search (see  for an overview) aim to abuse this revealed information with auxiliary knowledge to uncover sensitive plaintext information. However, these have largely not been considered for the case of relational databases. Furthermore, they often rely on basic estimates of, e.g., the cardinality. To optimize relational Database Management Systems (DBMS), query estimator techniques  for, e.g., the cardinality using some knowledge of the data also play an important role in DBMS research and are significantly more advanced than those used in leakage attacks thus far.
This thesis aims at leveraging DBMS techniques  in attacks against relational encrypted search . Suitable candidates should be found, selected, and evaluated. Existing applicable attacks should be transformed into the relational setting, targeting the construction of . Candidate estimators should be incorporated into these attacks. The relational attacks should be implemented in the LEAKER framework for leakage attack evaluations , building on an already existing relational backend. The attacks should be evaluated on a range of real-world relational data, e.g., the medical data set MIMIC  to see the efficacy of the different attacks and estimators on this setting.
-  Peter J Haas, Ihab F Ilyas, Guy M Lohman, and Volker Markl. (opens in new tab). In Statistical Analysis and Data Mining: The ASA Data Science Journal, 2009. Discovering and exploiting statistical properties for query optimization in relational databases: A survey
-  Seny Kamara, Abdelkarim Kati, Tarik Moataz, Thomas Schneider, Amos Treiber, and Michael Yonli. . In EuroS&P, 2022. SoK: Cryptanalysis of encrypted search with LEAKER – a framework for LEakage AttacK Evaluation on Real-world data
-  Seny Kamara, Tarik Moataz, Stan Zdonik, and Zheguang Zhao. (opens in new tab). In ePrint 2020/274, 2020. An Optimal Relational Database Encryption Scheme
-  https://physionet.org/content/mimiciii/1.4/