Protecting Encrypted Data against Inference Attacks in Outsourced Databases

Article Preview

Abstract:

Ensuring data privacy and improving query performance are two closely linked challenges for outsourced databases. Using mixed encryption methods to data attributes can reach an explicit trade-off between these two challenges. However, encryption cannot always conceal relations between attributes values. When the data tuples are accessed selectively, inferences based on comparing encrypted values could be launched and sensitive values may be disclosed. In this paper, we explore the attribute based inferences in mixed encrypted databases. We develop a method to construct private indexes on encrypted values to defend against inference while supporting efficient selective access to encrypted data. We have conducted some experiments to validate our proposed method.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

621-625

Citation:

Online since:

June 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu. Order-perserving encryption for numeric data. in: Proceedings of SIGMOD'04, (2004), 563-574.

DOI: 10.1145/1007568.1007632

Google Scholar

[2] A. Boldyreva, N. Chenette, Y. Lee and A. Oneill. Order-preserving symmetric encryption. in: Proceedings of EUROCRYPT'09, (2009), 224-241.

DOI: 10.1007/978-3-642-01001-9_13

Google Scholar

[3] E. Damiani, S. Vimercati, S. Jajodia, S. Paraboschi, and P. Samarati. Balancing Confidentiality and Efficiency in Untrusted Relational DBMSs. In: Proceedings of ACM CCS'03, (2003), 93-102.

DOI: 10.1145/948109.948124

Google Scholar

[4] H. Hacigumus, B. Iyer, C. Li, and S. Mehrotra. Executing SQL over Encrypted Data in the Database-Service-Provider Model. in: Proceedings of ACM SIGMOD'02, (2002), 216-227.

DOI: 10.1145/2213836.2370917

Google Scholar

[5] G. Miklau, D. Suciu. Controlling Access to Published Data Using Cryptography. In: Proceedings of VLDB'03, (2003), 898-909.

DOI: 10.1016/b978-012722442-8/50084-7

Google Scholar

[6] R. Popa, C. Redfield, N. Zeldovich, and H. Balakrishnan. CryptDB: Protecting Confidentiality with Encrypted Query Processing. In: Proceedings of SOSP'11, (2011), 85-100.

DOI: 10.1145/2043556.2043566

Google Scholar

[7] S. Tu, M. F. Kaashoek, S. Madden, and Zeldovich. Processing Analytical Queries over Encrypted Data. In: Proceedings of VLDB'13, (2013).

DOI: 10.14778/2535573.2488336

Google Scholar

[8] S. Vimercati. S. S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarti. Private Data Indexes for Selective Access to Outsourced Data. in: Proceedings of WPES'11. (2011), 69-80.

DOI: 10.1145/2046556.2046566

Google Scholar