Private Data Base Access Schemes Avoiding Data Distribution

نویسنده

  • Yael Gertner
چکیده

In this thesis we introduce and solve three privacy problems in Secure Database Access protocols: Database Privacy, the Data Replication Problem, and the Secure user Identity problem. Database Privacy is concerned with keeping the databases information secure from the user. The Data Replication problem (DRP) deals with a new security concern for databases that emanates from the need to replicate and distribute their contents in order to achieve security for the user. The Secure user ID problem is concerned with keeping private the user's identity, so that no information can be associated with or learned about that identity. Our results rely on an existing Private Information Retrieval scheme which achieves privacy for the user's query by relying on the multiple database model. This model allows for information theoretic results and sublinear communication complexity in the size of the database. We present two schemes which solve, in addition to what was achieved previously, Database Privacy and the Data Replication problem. We achieve two different degrees of security for DRP. The first one is private-datadistribution which means that all the databases in the scheme are k-wise independent for some constant k. The second is no-data-distribution security which means that the database's in the scheme contain data that is completely independent. The user's security in our scheme relies on the Private Information Retrieval scheme introduced in [14] which guaranties that the message the user sends to a database is uniformly distributed over all possible queries. We show two reductions: Theorem: For any k > 2 given any Private Information Retrieval k-database scheme for n data bits with communication complexity R(k, n) there exists a privatedata-distribution and database private 2k-database scheme with communication complexity O(R(k, n) log(n)) where each database holds O(n) bits. Theorem: For any k > 2 given any retrieval k-database scheme for n data bits with communication complexity R(k, n) there exists a no-data-distribution and database private 2k-database scheme with communication complexity O(R(k, n) log(n)) where each database holds O(n) bits. Secure ID In addition, we solve the Secure ID problem by presenting a protocol for a network of a user U, n databases of size m with an additional server S. A database in the network does not know whether U asked him a query or asked a query from another database. Therefore, we say that he does not know the identity of the users that are querying him. The communication complexity of that scheme is O(log(n)R(n, kl) + log(m)R(m, k2)) for constants k1 and k2. Thesis Supervisor: Shafi Goldwasser Title: RSA Professor

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Web information management with access control

We investigate the problem of sharing private information on the Web, where the information is hosted on different machines that may use different access control and distribution schemes. We introduce a distributed knowledge-base model, termed WebdamExchange, that comprises logical statements for specifying data, access control, distribution and knowledge about other peers. The statements can b...

متن کامل

Industrial Feasibility of Private Information Retrieval

A popular security problem in database management is how to guarantee to a querying party that the database owner will not learn anything about the data that is retrieved — a problem known as Private Information Retrieval (PIR). While a variety of PIR schemes are known, they are rarely considered for practical use cases yet. We investigate the feasibility of PIR in the telecommunications world ...

متن کامل

Browse searchable encryption schemes: Classification, methods and recent developments

With the advent of cloud computing, data owners tend to submit their data to cloud servers and allow users to access data when needed. However, outsourcing sensitive data will lead to privacy issues. Encrypting data before outsourcing solves privacy issues, but in this case, we will lose the ability to search the data. Searchable encryption (SE) schemes have been proposed to achieve this featur...

متن کامل

Adaptive Cache Coherence Protocol Using Migratory Shared Data

A traditional approach to connect several processors having private caches is achieved by interconnection network. To maintain consistent view of the shared memory for each processor, coherence protocols are employed. As the architecture scales, the interconnection network becomes a bottleneck due to coherence-induced traffic. One way to reduce this traffic is to study and employ data access pa...

متن کامل

An Investigation on the Issues in Cloud Data Security

Cloud computing is one of the most fascinating technologies which attract the users to outsource their data from local to remote cloud servers using Internet. A large number of cryptographic schemes are available to encrypt the sensitive information and to protect data. Even though it protects the data but it limits the functionality of the cloud storage. This paper focuses on investigation of ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008