Randomly Partitioned Encryption for Cloud Databases

被引:0
|
作者
Sanamrad, Tahmineh [1 ]
Braun, Lucas [1 ]
Kossmann, Donald [1 ]
Venkatesan, Ramarathnam [2 ]
机构
[1] Swiss Fed Inst Technol, Syst Grp, Dept Comp Sci, Zurich, Switzerland
[2] Microsoft Res, Redmond, CA USA
关键词
Database Encryption; Efficient Query Processing; Domain Attack; Frequency Attack; Query Log Attack; Randomly Partitioned Encryption; FULLY HOMOMORPHIC ENCRYPTION; KEY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the current advances in Cloud Computing, outsourcing data has never been so tempting. Along with outsourcing a database comes the privacy versus performance discussion. Order-Preserving Encryption (OPE) is one of the most attractive techniques for database encryption since it allows to execute range and rank queries efficiently without decrypting the data. On the other hand, people are reluctant to use OPE-based techniques in practice because of their vulnerability against adversaries with knowledge of the domain, its frequency distribution and query logs. This paper formally defines three real world driven attacks, called Domain Attack, Frequency Attack and Query Log Attack, typically launched by an honest-but-curious database or systems administrator. We also introduce measures to capture the probability distribution of the adversary's advantage under each attacker model. Most importantly, we present a novel technique called Randomly Partitioned Encryption (RPE) to minimize the adversary's advantage. Finally, we show that RPE not only withstands real world database adversaries, but also shows good performance that is close to state-of-art OPE schemes for both, read-and write-intensive workloads.
引用
下载
收藏
页码:307 / 323
页数:17
相关论文
共 50 条
  • [31] Secured Data Storage and Retrieval Algorithm Using Map Reduce Techniques and Chaining Encryption in Cloud Databases
    Muthurajkumar, S.
    Vijayalakshmi, M.
    Kannan, A.
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (04) : 5621 - 5633
  • [32] Secured Data Storage and Retrieval Algorithm Using Map Reduce Techniques and Chaining Encryption in Cloud Databases
    S. Muthurajkumar
    M. Vijayalakshmi
    A. Kannan
    Wireless Personal Communications, 2017, 96 : 5621 - 5633
  • [33] Searchable Encryption to Reduce Encryption Degradation in Adjustably Encrypted Databases
    Kerschbaum, Florian
    Harterich, Martin
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXXI, DBSEC 2017, 2017, 10359 : 325 - 336
  • [34] Homomorphic Encryption in the Cloud
    Hrestak, Darko
    Picek, Stjepan
    2014 37TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2014, : 1400 - 1404
  • [35] The Effectiveness Of Cloud Databases
    Jain, Niraja
    Raghu, B.
    Deshpande, A. V.
    Khanaa, V.
    2017 INTERNATIONAL CONFERENCE ON ALGORITHMS, METHODOLOGY, MODELS AND APPLICATIONS IN EMERGING TECHNOLOGIES (ICAMMAET), 2017,
  • [36] UAS SECURITY: ENCRYPTION KEY NEGOTIATION FOR PARTITIONED DATA
    Steinmann, Jessica A.
    Babiceanu, Radu F.
    Seker, Remzi
    2016 INTEGRATED COMMUNICATIONS NAVIGATION AND SURVEILLANCE (ICNS), 2016,
  • [37] FURTHER RESULTS ON THE SECURITY OF PARTITIONED DYNAMIC STATISTICAL DATABASES
    MCLEISH, M
    ACM TRANSACTIONS ON DATABASE SYSTEMS, 1989, 14 (01): : 98 - 113
  • [38] Privacy Preserving Associative Classification on Vertically Partitioned Databases
    Raghuram, B.
    Gyani, Jayadev
    2012 IEEE INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES (ICACCCT), 2012, : 188 - 192
  • [39] READ-ONLY TRANSACTIONS IN PARTITIONED REPLICATED DATABASES
    BRAHMADATHAN, K
    RAMARAO, KVS
    PROCEEDINGS : FIFTH INTERNATIONAL CONFERENCE ON DATA ENGINEERING, 1989, : 522 - 529
  • [40] Cryptanalysis of a Fast Encryption Scheme for Databases
    Jacob, Stephane
    2010 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, 2010, : 2468 - 2472