SafeRegions: Performance evaluation of multi-party protocols on HBase

被引:3
|
作者
Pontes, Rogerio [1 ]
Maia, Francisco
Paulo, Joao
Vilaca, Ricardo
机构
[1] INESC TEC, HASLab, Oporto, Portugal
关键词
HBase; Secure databases; Multi party computation;
D O I
10.1109/SRDSW.2016.16
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
On-line applications and services are now a critical part of our everyday life. Using these services typically requires us to trust our personal or company's information to a large number of third-party entities. These entities enforce several security measures to avoid unauthorized accesses but data is still stored on common database systems that are designed without data privacy concerns in mind. As a result, data is vulnerable against anyone with direct access to the database, which may be external attackers, malicious insiders, spies or even subpoenas. Building strong data privacy mechanisms on top of common database systems is possible but has a significant impact on the system's resources, computational capabilities and performance. Notably, the amount of useful computation that may be done over strongly encrypted data is close to none, which defeats the purpose of offloading computation to third-party services. In this paper, we propose to shift the need to trust in the honesty and security of service providers to simply trust that they will not collude. This is reasonable as cloud providers, being competitors, do not share data among themselves. We focus on NoSQL databases and present SafeRegions, a novel prototype of a distributed and secure NoSQL database that is built on top of HBase and that guarantees strong data privacy while still providing most of HBase's query capabilities. SafeRegions relies on secret sharing and multiparty computation techniques to provide a NoSQL database built on top of multiple, non-colluding service providers that appear as a single one to the user. Strikingly, service providers, individually, cannot disclose any of the user's data but, together, are able to offer data storage and processing capabilities. Additionally, we evaluate SafeRegions exposing performance trade-offs imposed by security mechanisms and provide useful insights for future research on performance optimization.
引用
下载
收藏
页码:31 / 36
页数:6
相关论文
共 50 条
  • [1] Protocols for Secure Multi-Party Private Function Evaluation
    Aljumah, Feras
    Soeanu, Andrei
    Liu, Wen Ming
    Debbabi, Mourad
    2015 FIRST INTERNATIONAL CONFERENCE ON ANTI-CYBERCRIME (ICACC), 2015, : 106 - 111
  • [2] Circuits and multi-party protocols
    Grolmusz, V
    COMPUTATIONAL COMPLEXITY, 1998, 7 (01) : 1 - 18
  • [3] Circuits and multi-party protocols
    V. Grolmusz
    computational complexity, 1998, 7 : 1 - 18
  • [4] Multi-party authentication for Web services: Protocols, implementation and evaluation
    Zhang, DC
    Xu, J
    SEVENTH IEEE INTERNATIONAL SYMPOSIUM ON OBJECT-ORIENTED REAL-TIME DISTRIBUTED COMPUTING, PROCEEDINGS, 2004, : 227 - 234
  • [5] Optimizing multi-party agreement protocols
    Fedotov, Ivan
    Khritankov, Anton
    Barger, Artem
    2022 4TH CONFERENCE ON BLOCKCHAIN RESEARCH & APPLICATIONS FOR INNOVATIVE NETWORKS AND SERVICES (BRAINS), 2022, : 55 - 58
  • [6] Quantum protocols for secure multi-party summation
    Ji, ZhaoXu
    Zhang, HuanGuo
    Wang, HouZhen
    Wu, FuSheng
    Jia, JianWei
    Wu, WanQing
    QUANTUM INFORMATION PROCESSING, 2019, 18 (06)
  • [7] Adaptive Security of Multi-party Protocols, Revisited
    Hirt, Martin
    Liu-Zhang, Chen-Da
    Maurer, Ueli
    THEORY OF CRYPTOGRAPHY, TCC 2021, PT I, 2021, 13042 : 686 - 716
  • [8] Multi-Party Protocols, Information Complexity and Privacy
    Kerenidis, Iordanis
    Rosen, Adi
    Urrutia, Florent
    ACM TRANSACTIONS ON COMPUTATION THEORY, 2019, 11 (02)
  • [9] Quantum protocols for secure multi-party summation
    ZhaoXu Ji
    HuanGuo Zhang
    HouZhen Wang
    FuSheng Wu
    JianWei Jia
    WanQing Wu
    Quantum Information Processing, 2019, 18
  • [10] On the Efficiency of Multi-party Contract Signing Protocols
    Draper-Gil, Gerard
    Ferrer-Gomila, Josep-Lluis
    Francisca Hinarejos, M.
    Zhou, Jianying
    INFORMATION SECURITY, ISC 2015, 2015, 9290 : 227 - 243