Hiding Tree Structured Data and Queries from Untrusted Data Stores

نویسندگان

  • Ping Lin
  • K. Selçuk Candan
چکیده

n Web and mobile computing, clients usually do not have sufficient computation power or memory and they need remote servers to do the computation or store data for them. Publishing data or applications on remote servers helps improve data availability and system scalability, reducing the client burden of managing data. Application Service Providers (ASPs) and Distributed Application Hosting Services (DAHSs), which rent out storage, (Internet) presence, and computation power to clients with IT needs (but without appropriate infrastructures) are becoming popular. Especially with the emergence of enabling technologies, such as J2EE and .NET, there is currently a shift toward services hosted by third parties. Those providing data outsourcing service, with their computation power and large memory, can be called data stores or oracles. Typically, these data stores cannot be fully trusted, for we have to realize that with the data outsourced on third-party hosts, entities independent of data/service owners, (1) it is possible for the hosts to illegally utilize sensitive information about data to make a profit; (2) host operators may accept bribes from or be compelled by adversaries to grant insider control or leak sensitive information to them; (3) even if hosts are honest, despite all security methI H I D I N G T R E E S T R U C T U R E D D A T A

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Hiding Traversal of Tree Structured Data from Untrusted Data Stores

With the increasing use of web services, many new challenges concerning data security are becoming critical. Especially in mobile services, where clients are generally thin in terms of computation power and storage space, a remote server can be outsourced for the computation or can act as a data store. Unfortunately, such a data store may not always be trustworthy and clients with sensitive dat...

متن کامل

Separating indexes from data: a distributed scheme for secure database outsourcing

Database outsourcing is an idea to eliminate the burden of database management from organizations. Since data is a critical asset of organizations, preserving its privacy from outside adversary and untrusted server should be warranted. In this paper, we present a distributed scheme based on storing shares of data on different servers and separating indexes from data on a distinct server. Shamir...

متن کامل

Oblivious Search and Updates for Outsourced Tree-Structured Data on Untrusted Servers

Although tree-based index structures, such as B+-trees, R-trees, have proven their advantages to both traditional and modern database applications, they introduce numerous research challenges as database services are outsourced to untrusted servers. In the outsourced database service (ODBS) model, the crucial security research questions mainly relate to data confidentiality, data and user priva...

متن کامل

Towards Private Navigation of Tree Structured Spatial Indexes

With many location-based services, spatial data such as points of interest are indexed at a potentially untrusted host and queries are evaluated by navigating the underlying index structure used to partition the data. While encryption can prevent the host from learning the data content (i.e., what is accessed), it cannot hide the frequency that index nodes are accessed while navigating the inde...

متن کامل

Semantic Integration of Tree-Structured Data Using Dimension Graphs

Nowadays, huge volumes of Web data are organized or exported in tree-structured form. Popular examples of such structures are product catalogs of e-market stores, taxonomies of thematic categories, XML data encodings, etc. Even for a single knowledge domain, name mismatches, structural differences and structural inconsistencies raise difficulties when many data sources need to be integrated and...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Information Systems Security

دوره 14  شماره 

صفحات  -

تاریخ انتشار 2005