Secure Data Outsourcing with Adversarial Data Dependency Constraints

被引:3
|
作者
Dong, Boxiang [1 ]
Wang, Wendy [1 ]
Yang, Jie [2 ]
机构
[1] Stevens Inst Technol, Hoboken, NJ 07030 USA
[2] South China Univ Technol, Guangzhou 510641, Guangdong, Peoples R China
关键词
D O I
10.1109/BigDataSecurity-HPSC-IDS.2016.17
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing enables end-users to outsource their dataset and data management needs to a third-party service provider. One of the major security concerns of the outsourcing paradigm is how to protect sensitive information in the outsourced dataset. In general, the sensitive information can be protected by encryption. However, data dependency constraints in the outsourced data may serve as adversary knowledge and bring security vulnerabilities. In this paper, we focus on functional dependency (FD), an important type of data dependency constraints, and study the security threats by the adversarial FDs. We design the practical scheme that can defend against the FD attack by encrypting a small amount of non-sensitive data (encryption overhead). We prove that searching for the scheme that leads to the optimal encryption overhead is NP-complete, and design efficient heuristic algorithms. We conduct an extensive set of experiments on two real-world datasets. The experiment results show that our heuristic approach brings small amounts of encryption overhead (at most 1% more than the optimal overhead), and enjoys a ten times speedup compared with the optimal solution. Besides, our approach can reduce up to 90% of the encryption overhead of the-state-of-art solution.
引用
收藏
页码:73 / 78
页数:6
相关论文
共 50 条
  • [41] Secure data stream outsourcing with publicly verifiable integrity in cloud storage
    Wu, Qiyu
    Zhou, Fucai
    Xu, Jian
    Wang, Qiang
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 49
  • [42] Towards semantically secure outsourcing of association rule mining on categorical data
    Lai, Junzuo
    Li, Yingjiu
    Deng, Robert H.
    Weng, Jian
    Guan, Chaowen
    Yan, Qiang
    INFORMATION SCIENCES, 2014, 267 : 267 - 286
  • [43] Separating Indexes from Data: A Distributed Scheme for Secure Database Outsourcing
    Soltani, Somayeh
    Hadavi, Mohammad Ali
    Jalili, Rasool
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2011, 3 (02): : 121 - 133
  • [44] Efficient and Secure Outsourcing of Differentially Private Data Publishing With Multiple Evaluators
    Li, Jin
    Ye, Heng
    Li, Tong
    Wang, Wei
    Lou, Wenjing
    Hou, Y. Thomas
    Liu, Jiqiang
    Lu, Rongxing
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (01) : 67 - 76
  • [45] Experimental analysis and comparative study of secure data outsourcing schemes in cloud
    Sudarsan Rao V.
    Satyanarayana N.
    International Journal of Cloud Computing, 2019, 8 (01) : 83 - 101
  • [46] Feasible Region of Secure and Distributed Data Storage in Adversarial Networks
    Ren, Jian
    Li, Jian
    Li, Tongtong
    Mutka, Matt W.
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (11) : 8980 - 8988
  • [47] Generative Adversarial Networks for Secure Data Transmission in Wireless Network
    Jayabalan, E.
    Pugazendi, R.
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2023, 35 (03): : 3757 - 3784
  • [48] Horizontal Fragmentation for Data Outsourcing with Formula-Based Confidentiality Constraints
    Wiese, Lena
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, 2010, 6434 : 101 - 116
  • [49] A Business Process Driven Approach to Manage Data Dependency Constraints
    Lin, Joe Y. -C.
    Sadiq, Shazia
    ENTERPRISE INFORMATION SYSTEMS, 2011, 73 : 326 - 339
  • [50] Towards secure and reliable cloud storage against data re-outsourcing
    Jiang, Tao
    Chen, Xiaofeng
    Li, Jin
    Wong, Duncan S.
    Ma, Jianfeng
    Liu, Joseph K.
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2015, 52 : 86 - 94