Partitioned Data Security on Outsourced Sensitive and Non-sensitive Data (Extended Abstract)

نویسندگان

  • Sharad Mehrotra
  • Shantanu Sharma
  • Jeffrey D. Ullman
  • Anurag Mishra
چکیده

Despite extensive research on cryptography, secure and efficient query processing over outsourced data remains an open challenge. This paper continues along the emerging trend in secure data processing that recognizes that the entire dataset may not be sensitive, and hence, non-sensitivity of data can be exploited to overcome some of the limitations of existing encryption-based approaches. Taking the cue from recent papers on hybrid clouds, this paper explores a new direction of work that attempts to exploit database techniques to secure selection queries. We propose a new secure selection query approach, entitled query binning (QB) that allows non-sensitive parts of the data to be outsourced in clear-text while guaranteeing that no information is leaked by the joint processing of non-sensitive data (in clear-text) and sensitive data (in encrypted form). Interestingly, besides improving performance, we show that QB actually strengthens the security of the underlying cryptographic technique by preventing size, frequency-count, and workload-skew attacks.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Enforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version)

One of the security issues in data outsourcing is the enforcement of the data owner’s access control policies. This includes some challenges. The first challenge is preserving confidentiality of data and policies. One of the existing solutions is encrypting data before outsourcing which brings new challenges; namely, the number of keys required to access authorized resources, efficient policy u...

متن کامل

Specification and Deployment of Integrated Security Policies for Outsourced Data

Recent advance in cloud computing has transformed the way information is managed and consumed, since this new paradigm provides cost efficient solutions that allow the transmission, storage, and intensive computing of information. Therefore, Cloud service providers are increasingly required to take responsibility for the storage as well as the efficient and reliable sharing of information, thus...

متن کامل

Preserving Multi-relational Outsourced Databases Confidentiality using Fragmentation and Encryption

Confidentiality and privacy of outsourced data has become one of the pressing challenges in Cloud computing. Outsourced data often includes sensitive personally identifiable information. When data is outsourced, sensitive information will not be under the control of its owners, but under the control of an external service provider. In this paper, we define an approach allowing the protection of...

متن کامل

GORAM – Group ORAM for Privacy and Access Control in Outsourced Personal Records

Cloud storage has rapidly become a cornerstone of many IT infrastructures, constituting aseamless solution for the backup, synchronization, and sharing of large amounts of data. Puttinguser data in the direct control of cloud service providers, however, raises security and privacyconcerns related to the integrity of outsourced data, the accidental or intentional leakage ofsensit...

متن کامل

A Reliable Routing Algorithm for Delay Sensitive Data in Body Area Networks

Wireless body Area networks (WBANs) include a number of sensor nodes placed inside or on the human body to improve patient health and quality of life. Ensuring the transfer and receipt of data in sensitive data is a very important issue. Routing algorithms should support a variety of service quality such as reliability and delay in sending and receiving data. Loss of information or excessive da...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2018