Secure Data Outsourcing with Adversarial Data Dependency Constraints

被引:3
|
作者
Dong, Boxiang [1 ]
Wang, Wendy [1 ]
Yang, Jie [2 ]
机构
[1] Stevens Inst Technol, Hoboken, NJ 07030 USA
[2] South China Univ Technol, Guangzhou 510641, Guangdong, Peoples R China
关键词
D O I
10.1109/BigDataSecurity-HPSC-IDS.2016.17
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing enables end-users to outsource their dataset and data management needs to a third-party service provider. One of the major security concerns of the outsourcing paradigm is how to protect sensitive information in the outsourced dataset. In general, the sensitive information can be protected by encryption. However, data dependency constraints in the outsourced data may serve as adversary knowledge and bring security vulnerabilities. In this paper, we focus on functional dependency (FD), an important type of data dependency constraints, and study the security threats by the adversarial FDs. We design the practical scheme that can defend against the FD attack by encrypting a small amount of non-sensitive data (encryption overhead). We prove that searching for the scheme that leads to the optimal encryption overhead is NP-complete, and design efficient heuristic algorithms. We conduct an extensive set of experiments on two real-world datasets. The experiment results show that our heuristic approach brings small amounts of encryption overhead (at most 1% more than the optimal overhead), and enjoys a ten times speedup compared with the optimal solution. Besides, our approach can reduce up to 90% of the encryption overhead of the-state-of-art solution.
引用
收藏
页码:73 / 78
页数:6
相关论文
共 50 条
  • [21] Encrypted data indexing for the secure outsourcing of spectral clustering
    Liu, Bozhong
    Chen, Ling
    Zhu, Xingquan
    Qiu, Weidong
    KNOWLEDGE AND INFORMATION SYSTEMS, 2019, 60 (03) : 1307 - 1328
  • [22] Blockchain based secure medical data outsourcing with data deduplication in cloud environment
    Benil, T.
    Jasper, J.
    COMPUTER COMMUNICATIONS, 2023, 209 : 1 - 13
  • [23] A Semi-Outsourcing Secure Data Privacy Scheme for IoT Data Transmission
    Zhang, Xiaoshuai
    Poslad, Stefan
    Ma, Zixiang
    2017 IEEE 28TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2017,
  • [24] Uncertain Data Dependency Constraints in Matrix Models
    Gervet, C.
    Galichet, S.
    INTEGRATION OF AI AND OR TECHNIQUES IN CONSTRAINT PROGRAMMING, 2015, 9075 : 173 - 181
  • [25] Recent Advances in Information-Theoretically Secure Data Outsourcing
    Mehrotra, Sharad
    Sharma, Shantanu
    PROCEEDINGS OF THE SIXTH INTERNATIONAL WORKSHOP ON SECURITY AND PRIVACY ANALYTICS (IWSPA'20), 2020, : 31 - 32
  • [26] Efficient Secure Data Provenance Scheme in Multimedia Outsourcing and Sharing
    Yang, Zhen
    Huang, Yongfeng
    Li, Xing
    Wang, Wenyu
    CMC-COMPUTERS MATERIALS & CONTINUA, 2018, 56 (01): : 1 - 17
  • [27] Data Outsourcing based on Secure Association Rule Mining Processes
    Sujatha, V.
    Bhattacharyya, Debnath
    Chaitanya, P. Silpa
    Kim, Tai-hoon
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (03): : 41 - 48
  • [28] GeoSecure: Towards Secure Outsourcing of GPS Data over Cloud
    Patil, Vikram
    Parikh, Shivam
    Singh, Priyanka
    Atrey, Pradeep K.
    2017 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2017, : 495 - 501
  • [29] Hybrid Deduplication for Secure and Efficient Data Outsourcing in Fog Computing
    Koo, Dongyoung
    Shin, Youngjoo
    Yun, Joobeom
    Hur, Junbeom
    2016 8TH IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM 2016), 2016, : 285 - 293
  • [30] Efficient Architecture for Secure Outsourcing of Data and Computation in Hybrid Cloud
    Lunawat, Sonali
    Patankar, Abhijit
    PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON RELIABILTY, OPTIMIZATION, & INFORMATION TECHNOLOGY (ICROIT 2014), 2014, : 380 - 383