SWAT: A System-Wide Approach to Tunable Leakage Mitigation in Encrypted Data Stores

被引:0
|
作者
Zheng, Leqian [1 ]
Xu, Lei [2 ]
Wang, Cong [1 ]
Wang, Sheng [3 ]
Hu, Yuke [4 ]
Qin, Zhan [4 ]
Li, Feifei [3 ]
Ren, Kui [4 ]
机构
[1] City Univ Hong Kong, Hong Kong, Peoples R China
[2] Nanjing Univ Sci & Technol, Nanjing, Peoples R China
[3] Alibaba Grp, Hangzhou, Peoples R China
[4] Zhejiang Univ, State Key Lab Blockchain & Data Secur, Hangzhou, Peoples R China
来源
PROCEEDINGS OF THE VLDB ENDOWMENT | 2024年 / 17卷 / 10期
基金
中国国家自然科学基金;
关键词
QUERIES; PRIVACY; ATTACKS;
D O I
10.14778/3675034.3675038
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Numerous studies have underscored the significant privacy risks associated with various leakage patterns in encrypted data stores. While many solutions have been proposed to mitigate these leakages, they either (1) incur substantial overheads, (2) focus on specific subsets of leakage patterns, or (3) apply the same security notion across various workloads, thereby impeding the attainment of fine-tuned privacy-efficiency trade-offs. In light of various detrimental leakage patterns, this paper starts with an investigation into which specific leakage patterns require our focus in the contexts of key-value, range-query, and dynamic workloads, respectively. Subsequently, we introduce new security notions tailored to the specific privacy requirements of these workloads. Accordingly, we propose and instantiate SWAT, an efficient construction that progressively enables these workloads, while provably mitigating system-wide leakage via a suite of algorithms with tunable privacy-efficiency trade-offs. We conducted extensive experiments and compiled a detailed result analysis, showing the efficiency of our solution. SWAT is about an order of magnitude slower than an encryption-only data store that reveals various leakage patterns and is two orders of magnitude faster than a trivial zero-leakage solution. Meanwhile, the performance of SWAT remains highly competitive compared to other designs that mitigate specific types of leakage.
引用
收藏
页码:2445 / 2458
页数:14
相关论文
共 50 条
  • [1] CloudDBGuard: A framework for encrypted data storage in NoSQL wide column stores
    Wiese, Lena
    Waage, Tim
    Brenner, Michael
    DATA & KNOWLEDGE ENGINEERING, 2020, 126
  • [2] AN APPROACH TO SYSTEM-WIDE FAULT TOLERANCE FOR FPGAS
    Gebelein, Jano
    Engel, Heiko
    Kebschull, Udo
    FPL: 2009 INTERNATIONAL CONFERENCE ON FIELD PROGRAMMABLE LOGIC AND APPLICATIONS, 2009, : 467 - 471
  • [3] Grounding practices - A system-wide, systematic approach
    Kosc, D
    Hamer, PS
    INDUSTRY APPLICATIONS SOCIETY 49TH ANNUAL PETROLEUM AND CHEMICAL INDUSTRY CONFERENCE, 2002, : 301 - 312
  • [4] Grounding practices - A system-wide systematic approach
    Kosc, D
    Hamer, PS
    IEEE TRANSACTIONS ON INDUSTRY APPLICATIONS, 2003, 39 (05) : 1475 - 1485
  • [5] THE SYSTEM-WIDE APPROACH TO MICROECONOMICS - THEIL,H
    BRONSARD, C
    CANADIAN JOURNAL OF ECONOMICS-REVUE CANADIENNE D ECONOMIQUE, 1981, 14 (04): : 729 - 732
  • [6] A new approach for system-wide power system frequency model validation via measurement data
    Sajjadi, Mahsa
    Seifi, Hossein
    Delkhosh, Hamed
    ENGINEERING REPORTS, 2022, 4 (01)
  • [7] Transforming health care: an approach to system-wide implementation
    Bengoa, Rafael
    INTERNATIONAL JOURNAL OF INTEGRATED CARE, 2013, 13
  • [8] The trade effect of price risk: a system-wide approach
    Dengjun Zhang
    Empirical Economics, 2015, 48 : 1149 - 1167
  • [9] The trade effect of price risk: a system-wide approach
    Zhang, Dengjun
    EMPIRICAL ECONOMICS, 2015, 48 (03) : 1149 - 1167
  • [10] Application of Niching Genetic Algorithms in system-wide voltage sag mitigation studies
    Zhang, Yan
    Milanovic, J. V.
    2007 IEEE LAUSANNE POWERTECH, VOLS 1-5, 2007, : 1515 - 1521