Panda: Partitioned Data Security on Outsourced Sensitive and Non-sensitive Data

05/13/2020
by   Sharad Mehrotra, et al.
0

Despite extensive research on cryptography, secure and efficient query processing over outsourced data remains an open challenge. This paper continues along with the emerging trend in secure data processing that recognizes that the entire dataset may not be sensitive, and hence, non-sensitivity of data can be exploited to overcome limitations of existing encryption-based approaches. We, first, provide a new security definition, entitled partitioned data security for guaranteeing that the joint processing of non-sensitive data (in cleartext) and sensitive data (in encrypted form) does not lead to any leakage. Then, this paper proposes a new secure approach, entitled query binning (QB) that allows secure execution of queries over non-sensitive and sensitive parts of the data. QB maps a query to a set of queries over the sensitive and non-sensitive data in a way that no leakage will occur due to the joint processing over sensitive and non-sensitive data. In particular, we propose secure algorithms for selection, range, and join queries to be executed over encrypted sensitive and cleartext non-sensitive datasets. Interestingly, in addition to improving performance, we show that QB actually strengthens the security of the underlying cryptographic technique by preventing size, frequency-count, and workload-skew attacks.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/20/2018

Partitioned Data Security on Outsourced Sensitive and Non-sensitive Data

Despite extensive research on cryptography, secure and efficient query p...
research
12/04/2018

Exploiting Data Sensitivity on Partitioned Data

Several researchers have proposed solutions for secure data outsourcing ...
research
07/18/2022

Don't Be a Tattle-Tale: Preventing Leakages through Data Dependencies on Access Control Protected Data

We study the problem of answering queries when (part of) the data may be...
research
03/20/2020

Efficient Oblivious Database Joins

A major algorithmic challenge in designing applications intended for sec...
research
02/28/2020

Dynamic Skyline Queries on Encrypted Data Using Result Materialization

Skyline computation is an increasingly popular query, with broad applica...
research
02/25/2020

Topologically sensitive metaheuristics

This paper proposes topologically sensitive metaheuristics, and describe...
research
12/03/2017

Multivariate Cryptosystems for Secure Processing of Multidimensional Signals

Multidimensional signals like 2-D and 3-D images or videos are inherentl...

Please sign up or login with your details

Forgot password? Click here to reset