Secure Data Outsourcing with Adversarial Data Dependency Constraints

被引:3
|
作者
Dong, Boxiang [1 ]
Wang, Wendy [1 ]
Yang, Jie [2 ]
机构
[1] Stevens Inst Technol, Hoboken, NJ 07030 USA
[2] South China Univ Technol, Guangzhou 510641, Guangdong, Peoples R China
关键词
D O I
10.1109/BigDataSecurity-HPSC-IDS.2016.17
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing enables end-users to outsource their dataset and data management needs to a third-party service provider. One of the major security concerns of the outsourcing paradigm is how to protect sensitive information in the outsourced dataset. In general, the sensitive information can be protected by encryption. However, data dependency constraints in the outsourced data may serve as adversary knowledge and bring security vulnerabilities. In this paper, we focus on functional dependency (FD), an important type of data dependency constraints, and study the security threats by the adversarial FDs. We design the practical scheme that can defend against the FD attack by encrypting a small amount of non-sensitive data (encryption overhead). We prove that searching for the scheme that leads to the optimal encryption overhead is NP-complete, and design efficient heuristic algorithms. We conduct an extensive set of experiments on two real-world datasets. The experiment results show that our heuristic approach brings small amounts of encryption overhead (at most 1% more than the optimal overhead), and enjoys a ten times speedup compared with the optimal solution. Besides, our approach can reduce up to 90% of the encryption overhead of the-state-of-art solution.
引用
收藏
页码:73 / 78
页数:6
相关论文
共 50 条
  • [31] CryptoML: Secure Outsourcing of Big Data Machine Learning Applications
    Mirhoseini, Azalia
    Sadeghi, Ahmad-Reza
    Koushanfar, Farinaz
    PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2016, : 149 - 154
  • [32] Secure data outsourcing in presence of the inference problem: issues and directions
    Jebali, Adel
    Sassi, Salma
    Jemai, Abderrazak
    JOURNAL OF INFORMATION AND TELECOMMUNICATION, 2021, 5 (01) : 16 - 34
  • [33] Authorized Keyword Search on Mobile Devices in Secure Data Outsourcing
    Liu, Qin
    Peng, Yu
    Jiang, Hongbo
    Wu, Jie
    Wang, Tian
    Peng, Tao
    Wang, Guojun
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2024, 23 (05) : 4181 - 4195
  • [34] Secure kNN Computation and Integrity Assurance of Data Outsourcing in the Cloud
    Hong, Jun
    Wen, Tao
    Guo, Quan
    Ye, Zhengwang
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2017, 2017
  • [35] A novel secure data outsourcing scheme based on data hiding and secret sharing for relational databases
    Rahmani, Peyman
    Taheri, Mohammad
    Fakhrahmad, Seyed Mostafa
    IET COMMUNICATIONS, 2023, 17 (07) : 775 - 789
  • [36] MANAGING DATA DEPENDENCY CONSTRAINTS THROUGH BUSINESS PROCESSES
    Lin, Joe Y-C
    Sadiq, Shazia
    ICEIS 2010: PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS, VOL 3: INFORMATION SYSTEMS ANALYSIS AND SPECIFICATION, 2010, : 52 - 59
  • [37] A novel smart multilevel security approach for secure data outsourcing in crisis
    Sarhan, Akram Y.
    PEERJ COMPUTER SCIENCE, 2023, 9
  • [38] A Tutorial on Secure Outsourcing of Large-scale Computations for Big Data
    Salinas, Sergio
    Chen, Xuhui
    Ji, Jinlong
    Li, Pan
    IEEE ACCESS, 2016, 4 : 1406 - 1416
  • [39] Efficient information-theoretically secure schemes for cloud data outsourcing
    Sobati-Moghadam, Somayeh
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (04): : 3591 - 3606
  • [40] Efficient information-theoretically secure schemes for cloud data outsourcing
    Somayeh Sobati-Moghadam
    Cluster Computing, 2021, 24 : 3591 - 3606