Secure Data Outsourcing with Adversarial Data Dependency Constraints

被引:3
|
作者
Dong, Boxiang [1 ]
Wang, Wendy [1 ]
Yang, Jie [2 ]
机构
[1] Stevens Inst Technol, Hoboken, NJ 07030 USA
[2] South China Univ Technol, Guangzhou 510641, Guangdong, Peoples R China
关键词
D O I
10.1109/BigDataSecurity-HPSC-IDS.2016.17
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing enables end-users to outsource their dataset and data management needs to a third-party service provider. One of the major security concerns of the outsourcing paradigm is how to protect sensitive information in the outsourced dataset. In general, the sensitive information can be protected by encryption. However, data dependency constraints in the outsourced data may serve as adversary knowledge and bring security vulnerabilities. In this paper, we focus on functional dependency (FD), an important type of data dependency constraints, and study the security threats by the adversarial FDs. We design the practical scheme that can defend against the FD attack by encrypting a small amount of non-sensitive data (encryption overhead). We prove that searching for the scheme that leads to the optimal encryption overhead is NP-complete, and design efficient heuristic algorithms. We conduct an extensive set of experiments on two real-world datasets. The experiment results show that our heuristic approach brings small amounts of encryption overhead (at most 1% more than the optimal overhead), and enjoys a ten times speedup compared with the optimal solution. Besides, our approach can reduce up to 90% of the encryption overhead of the-state-of-art solution.
引用
收藏
页码:73 / 78
页数:6
相关论文
共 50 条
  • [1] Secure Outsourcing of Geospatial Vector Data
    Chaudhari, Sangita
    Venkatachalam, Parvatham
    Buddhiraju, Krishna Mohan
    2019 IEEE INTERNATIONAL GEOSCIENCE AND REMOTE SENSING SYMPOSIUM (IGARSS 2019), 2019, : 871 - 874
  • [2] Dividing secrets to secure data outsourcing
    Emekci, Fatih
    Methwally, Ahmed
    Agrawal, Divyakant
    El Abbadi, Amr
    INFORMATION SCIENCES, 2014, 263 : 198 - 210
  • [3] Towards a Hybrid Data Partitioning Technique for Secure Data Outsourcing
    Badran, Sultan
    Arman, Nabil
    Farajallah, Mousa
    2020 21ST INTERNATIONAL ARAB CONFERENCE ON INFORMATION TECHNOLOGY (ACIT), 2020,
  • [4] Efficient and secure outsourcing of genomic data storage
    Sousa, Joao Sa
    Lefebvre, Cedric
    Huang, Zhicong
    Raisaro, Jean Louis
    Aguilar-Melchor, Carlos
    Killijian, Marc-Olivier
    Hubaux, Jean-Pierre
    BMC MEDICAL GENOMICS, 2017, 10
  • [5] Efficient and secure outsourcing of genomic data storage
    João Sá Sousa
    Cédric Lefebvre
    Zhicong Huang
    Jean Louis Raisaro
    Carlos Aguilar-Melchor
    Marc-Olivier Killijian
    Jean-Pierre Hubaux
    BMC Medical Genomics, 10
  • [6] A Fast and Secure Scheme for Data Outsourcing in the Cloud
    Liu, Yanjun
    Wu, Hsiao-Ling
    Chang, Chin-Chen
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (08): : 2708 - 2721
  • [7] Secure Outsourcing of Network Flow Data Analysis
    Nassar, Mohamed
    al Bouna, Bechara
    Malluhi, Qutaibah
    2013 IEEE INTERNATIONAL CONGRESS ON BIG DATA, 2013, : 431 - +
  • [8] Privacy Issues and Protection in Secure Data Outsourcing
    Khodadadi, Touraj
    Islam, A. K. M. Muzahidul
    Baharun, Sabariah
    Komaki, Shozo
    JURNAL TEKNOLOGI-SCIENCES & ENGINEERING, 2014, 69 (06):
  • [9] A Comprehensive Framework for Secure Outsourcing of XML Data
    Carminati, Barbara
    Ferrari, Elena
    Bertino, Elisa
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2008, 3 (04): : 289 - 303
  • [10] Advances in Cryptography and Secure Hardware for Data Outsourcing
    Sharma, Shantanu
    Burtsev, Anton
    Mehrotra, Sharad
    2020 IEEE 36TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2020), 2020, : 1798 - 1801