skip to main content
10.1145/948109.948124acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Balancing confidentiality and efficiency in untrusted relational DBMSs

Published:27 October 2003Publication History

ABSTRACT

The scope and character of today's computing environments are progressively shifting from traditional, one-on-one client-server interaction to the new cooperative paradigm. It then becomes of primary importance to provide means of protecting the secrecy of the information, while guaranteeing its availability to legitimate clients. Operating on-line querying services securely on open networks is very difficult; therefore many enterprises outsource their data center operations to external application service providers. A promising direction towards prevention of unauthorized access to outsourced data is represented by encryption. However, data encryption is often supported for the sole purpose of protecting the data in storage and assumes trust in the server, that decrypts data for query execution.In this paper, we present a simple yet robust single-server solution for remote querying of encrypted databases on untrusted servers. Our approach is based on the use of indexing information attached to the encrypted database which can be used by the server to select the data to be returned in response to a query without the need of disclosing the database content. Our indexes balance the trade off between efficiency requirements in query execution and protection requirements due to possible inference attacks exploiting indexing information. We also investigate quantitative measures to model inference exposure and provide some related experimental results.

References

  1. L. Bouganim and P. Pucheral. Chip-secured data access: Confidential data on untrusted servers. In Proc. of the 28th International Conference on Very Large Data Bases, pages 131--142, Hong Kong, China, August 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. S. Ceri, M. Negri, and G. Pelagatti. Horizontal data partitioning in database systems. In Proc. of the ACM SIGMOD International Conference on Management of Data, Orlando, Florida, 1982. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. H. Chao, T.Y. Wu, and J. Chen. Security-enhanced packet video with dynamic multicast throughput adjustment. International Journal of Network Management, 11(3):147--159, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. T.H. Cormen, C.E. Leiserson, and R.L. Rivest. Introduction to Algorithms. McGraw-Hill, New York, 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. G.I. Davida, D.L. Wells, and J.B. Kam. A database encryption system with subkeys. ACM Transactions on Database Systems, 6(2):312--328, June 1981. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. D.E. Denning. Cryptography and Data Security. Addison-Wesley, 1982. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. S. Ghandeharizadeh and D. DeWitt. A multiuser performance analysis of alternative declustering strategies. In Proc. of the 6th Int. Conf. on Data Engineering, 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. H. Hacigümüs, B. Iyer, C. Li, and S. Mehrotra. Executing SQL over encrypted data in the database-service-provider model. In Proc. of the ACM SIGMOD'2002, Madison, Wisconsin, USA, June 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. H. Hacigümüs, B. Iyer, and S. Mehrotra. Providing database as a service. In Proc. of the 18th International Conference on Data Engineering, San Jose, California, USA, February 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. C.D. Jensen. Cryptocache: a secure sharable file cache for roaming users. In Proc. of the 9th Workshop on ACM SIGOPS European workshop: beyond the PC: new challenges for the operating system, pages 73--78, Kolding, Denmark, September 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. S.T. Klein, A. Bookstein, and S. Deerwester. Storing Text retrieval systems on CD-ROM: compression and encryption considerations. ACM Transactions on Information Systems, 7(3):230--245, July 1989. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. B.D. McKay. Practical graph isomorphism. Congressus Numerantium, 30:45--87, 1981.Google ScholarGoogle Scholar
  13. P. Samarati. Protecting respondent's privacy in microdata release. IEEE Transactions on Knowledge and Data Engineering, 13(6):1010--1017, November/December 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. D.X. Song, D. Wagner, and A. Perrig. Practical techniques for searches on encrypted data. In Proc. of the 2000 IEEE Symposium on Security and Privacy, pages 44--55, Oakland, CA, USA, May 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. J.P. Walton. Developing an enterprise information security policy. In Proc. of the 30th annual ACM SIGUCCS Conference on User Services, Providence, Rhode Island, USA, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. J. Ward, M. O'Sullivan, T. Shahoumian, and J. Wilkes. Appia: Automatic storage area network fabric design. In Proc. of the Conference on File and Storage Technologies (FAST 2002), Monterey, CA, January 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. E.Y. Yang, J. Xu, and K.H. Bennett. Private information retrieval in the presence of malicious failures. In Proc. of the 26th Annual International Computer Software and Applications Conference, Oxford, England, August 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Balancing confidentiality and efficiency in untrusted relational DBMSs

                Recommendations

                Comments

                Login options

                Check if you have access through your login credentials or your institution to get full access on this article.

                Sign in
                • Published in

                  cover image ACM Conferences
                  CCS '03: Proceedings of the 10th ACM conference on Computer and communications security
                  October 2003
                  374 pages
                  ISBN:1581137389
                  DOI:10.1145/948109

                  Copyright © 2003 ACM

                  Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                  Publisher

                  Association for Computing Machinery

                  New York, NY, United States

                  Publication History

                  • Published: 27 October 2003

                  Permissions

                  Request permissions about this article.

                  Request Permissions

                  Check for updates

                  Qualifiers

                  • Article

                  Acceptance Rates

                  Overall Acceptance Rate1,261of6,999submissions,18%

                  Upcoming Conference

                  CCS '24
                  ACM SIGSAC Conference on Computer and Communications Security
                  October 14 - 18, 2024
                  Salt Lake City , UT , USA

                PDF Format

                View or Download as a PDF file.

                PDF

                eReader

                View online with eReader.

                eReader