ABSTRACT
The scope and character of today's computing environments are progressively shifting from traditional, one-on-one client-server interaction to the new cooperative paradigm. It then becomes of primary importance to provide means of protecting the secrecy of the information, while guaranteeing its availability to legitimate clients. Operating on-line querying services securely on open networks is very difficult; therefore many enterprises outsource their data center operations to external application service providers. A promising direction towards prevention of unauthorized access to outsourced data is represented by encryption. However, data encryption is often supported for the sole purpose of protecting the data in storage and assumes trust in the server, that decrypts data for query execution.In this paper, we present a simple yet robust single-server solution for remote querying of encrypted databases on untrusted servers. Our approach is based on the use of indexing information attached to the encrypted database which can be used by the server to select the data to be returned in response to a query without the need of disclosing the database content. Our indexes balance the trade off between efficiency requirements in query execution and protection requirements due to possible inference attacks exploiting indexing information. We also investigate quantitative measures to model inference exposure and provide some related experimental results.
- L. Bouganim and P. Pucheral. Chip-secured data access: Confidential data on untrusted servers. In Proc. of the 28th International Conference on Very Large Data Bases, pages 131--142, Hong Kong, China, August 2002. Google ScholarDigital Library
- S. Ceri, M. Negri, and G. Pelagatti. Horizontal data partitioning in database systems. In Proc. of the ACM SIGMOD International Conference on Management of Data, Orlando, Florida, 1982. Google ScholarDigital Library
- H. Chao, T.Y. Wu, and J. Chen. Security-enhanced packet video with dynamic multicast throughput adjustment. International Journal of Network Management, 11(3):147--159, 2001. Google ScholarDigital Library
- T.H. Cormen, C.E. Leiserson, and R.L. Rivest. Introduction to Algorithms. McGraw-Hill, New York, 1990. Google ScholarDigital Library
- G.I. Davida, D.L. Wells, and J.B. Kam. A database encryption system with subkeys. ACM Transactions on Database Systems, 6(2):312--328, June 1981. Google ScholarDigital Library
- D.E. Denning. Cryptography and Data Security. Addison-Wesley, 1982. Google ScholarDigital Library
- S. Ghandeharizadeh and D. DeWitt. A multiuser performance analysis of alternative declustering strategies. In Proc. of the 6th Int. Conf. on Data Engineering, 1990. Google ScholarDigital Library
- H. Hacigümüs, B. Iyer, C. Li, and S. Mehrotra. Executing SQL over encrypted data in the database-service-provider model. In Proc. of the ACM SIGMOD'2002, Madison, Wisconsin, USA, June 2002. Google ScholarDigital Library
- H. Hacigümüs, B. Iyer, and S. Mehrotra. Providing database as a service. In Proc. of the 18th International Conference on Data Engineering, San Jose, California, USA, February 2002. Google ScholarDigital Library
- C.D. Jensen. Cryptocache: a secure sharable file cache for roaming users. In Proc. of the 9th Workshop on ACM SIGOPS European workshop: beyond the PC: new challenges for the operating system, pages 73--78, Kolding, Denmark, September 2000. Google ScholarDigital Library
- S.T. Klein, A. Bookstein, and S. Deerwester. Storing Text retrieval systems on CD-ROM: compression and encryption considerations. ACM Transactions on Information Systems, 7(3):230--245, July 1989. Google ScholarDigital Library
- B.D. McKay. Practical graph isomorphism. Congressus Numerantium, 30:45--87, 1981.Google Scholar
- P. Samarati. Protecting respondent's privacy in microdata release. IEEE Transactions on Knowledge and Data Engineering, 13(6):1010--1017, November/December 2001. Google ScholarDigital Library
- D.X. Song, D. Wagner, and A. Perrig. Practical techniques for searches on encrypted data. In Proc. of the 2000 IEEE Symposium on Security and Privacy, pages 44--55, Oakland, CA, USA, May 2000. Google ScholarDigital Library
- J.P. Walton. Developing an enterprise information security policy. In Proc. of the 30th annual ACM SIGUCCS Conference on User Services, Providence, Rhode Island, USA, 2002. Google ScholarDigital Library
- J. Ward, M. O'Sullivan, T. Shahoumian, and J. Wilkes. Appia: Automatic storage area network fabric design. In Proc. of the Conference on File and Storage Technologies (FAST 2002), Monterey, CA, January 2002. Google ScholarDigital Library
- E.Y. Yang, J. Xu, and K.H. Bennett. Private information retrieval in the presence of malicious failures. In Proc. of the 26th Annual International Computer Software and Applications Conference, Oxford, England, August 2002. Google ScholarDigital Library
Index Terms
- Balancing confidentiality and efficiency in untrusted relational DBMSs
Recommendations
Modeling and assessing inference exposure in encrypted databases
The scope and character of today's computing environments are progressively shifting from traditional, one-on-one client-server interaction to the new cooperative paradigm. It then becomes of primary importance to provide means of protecting the secrecy ...
Improved efficiency of Kiltz07-KEM
Kiltz proposed a practical key encapsulation mechanism (Kiltz07-KEM) which is secure against adaptive chosen ciphertext attacks (IND-CCA2) under the gap hashed Diffie-Hellman (GHDH) assumption [Eike Kiltz, Chosen-ciphertext secure key encapsulation ...
Public-Key encryption from ID-Based encryption without one-time signature
OTM'06: Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part IDesign a secure public key encryption scheme and its security proof are one of the main interests in cryptography In 2004, Canetti, Halevi and Katz [8] constructed a public key encryption (PKE) from a selective identity-based encryption scheme with a ...
Comments