CPT-S 580-06 Advanced Databases 1 Yinghui Wu EME 49 ADB (ln29)

Slides:



Advertisements
Similar presentations
Querying Encrypted Data using Fully Homomorphic Encryption Murali Mani, UMFlint Talk given at CIDR, Jan 7,
Advertisements

A Privacy Preserving Index for Range Queries
CryptDB: Protecting Confidentiality with Encrypted Query Processing
CryptDB: Confidentiality for Database Applications with Encrypted Query Processing Raluca Ada Popa, Catherine Redfield, Nickolai Zeldovich, and Hari Balakrishnan.
CryptDB: A Practical Encrypted Relational DBMS Raluca Ada Popa, Nickolai Zeldovich, and Hari Balakrishnan MIT CSAIL New England Database Summit 2011.
Fundamentals of Computer Security Geetika Sharma Fall 2008.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
 Relational Cloud: A Database-as-a-Service for the Cloud Carlo Curino, Evan Jones, Raluca Ada Popa, Nirmesh Malaviya, Eugene Wu, Sam Madden, Hari Balakrishnan,
Research interest: Secure database outsourcing Presented by Alla Lanovenko Thesis Adviser: Professor Huiping Guo 599 A 11 December 2006.
View n A single table derived from other tables which can be a base table or previously defined views n Virtual table: doesn’t exist physically n Limitation.
Authors: Thomas Ristenpart, et at.
Cloud Usability Framework
Database Access Control & Privacy: Is There A Common Ground? Surajit Chaudhuri, Raghav Kaushik and Ravi Ramamurthy Microsoft Research.
D ATABASE S ECURITY Proposed by Abdulrahman Aldekhelallah University of Scranton – CS521 Spring2015.
Database Laboratory Regular Seminar TaeHoon Kim.
Privacy Preserving Query Processing in Cloud Computing Wen Jie
Overview of Privacy Preserving Techniques.  This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas  Focus.
Switch off your Mobiles Phones or Change Profile to Silent Mode.
Mohammad Ahmadian COP-6087 University of Central Florida.
Database Laboratory TaeHoon Kim. /25 Work Progress(Range Query) 2.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 5 “Database and Cloud Security”.
Secure Cloud Database using Multiparty Computation.
Shiyuan Wang, Divyakant Agrawal, Amr El Abbadi Department of Computer Science UC Santa Barbara DBSec 2010.
SEC835 Practical aspects of security implementation Part 1.
Computer Security: Principles and Practice
Background Knowledge Attack for Generalization based Privacy- Preserving Data Mining.
Secure Cloud Database with Sense of Security. Introduction Cloud computing – IT as a service from third party service provider Security in cloud environment.
Data Confidentiality on Clouds Sharad Mehrotra University of California, Irvine.
Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data.
Frontiers in Massive Data Analysis Chapter 3.  Difficult to include data from multiple sources  Each organization develops a unique way of representing.
Secure Data Outsourcing. Outline  Motivation  Background  Research issues  Summary.
Chapter No 4 Query optimization and Data Integrity & Security.
Summary of Distributed Computing Security Yifeng Zou Georgia State University
Securing Data in Transit and Storage Sanjay Beri Co-Founder & Senior Director of Product Management Ingrian Networks.
Protection of outsourced data MARIA ANGEL MARQUEZ ANDRADE.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #22 Secure Web Information.
Privacy vs. Utility Xintao Wu University of North Carolina at Charlotte Nov 10, 2008.
Academic Year 2014 Spring Academic Year 2014 Spring.
Quantification of Integrity Michael Clarkson and Fred B. Schneider Cornell University IEEE Computer Security Foundations Symposium July 17, 2010.
Differential Privacy Xintao Wu Oct 31, Sanitization approaches Input perturbation –Add noise to data –Generalize data Summary statistics –Means,
Secure Data Outsourcing
Database Security. Introduction to Database Security Issues (1) Threats to databases Loss of integrity Loss of availability Loss of confidentiality To.
Database Security Database System Implementation CSE 507 Some slides adapted from Navathe et. Al.
Big Data Security Issues in Cloud Management. BDWG Big Data Working Group Researchers 1: Data analytics for security 2: Privacy preserving 3: Big data-scale.
Privacy Issues in Graph Data Publishing Summer intern: Qing Zhang (from NC State University) Mentors: Graham Cormode and Divesh Srivastava.
MPC Cloud Database with Sense of Security. Introduction Cloud computing – IT as a service from third party service provider Security in cloud environment.
IST 210 Security. IST 210 Introduction to DB Security Secrecy: Users should not be able to see things they are not supposed to. E.g., A student can’t.
CMSC 818J: Privacy enhancing technologies Lecture 2.
Database and Cloud Security
Practical Private Range Search Revisited
CHAPTER 30 Database Security. CHAPTER 30 Database Security.
Database System Implementation CSE 507
Data Security and Privacy Keke Chen
Application Security Lecture 27 Aditya Akella.
Searchable Encryption in Cloud
Database Security and Authorization
Hybrid Cloud Architecture for Software-as-a-Service Provider to Achieve Higher Privacy and Decrease Securiity Concerns about Cloud Computing P. Reinhold.
pVault Sharing Architecture
Fast Searchable Encryption with Tunable Locality
Using cryptography in databases and web applications
A Privacy-Preserving Index for Range Queries
Database Security (Chapter 8, Sections 4-7)
Cloud Security 李芮,蒋希坤,崔男 2018年4月.
MANAGING DATA RESOURCES
Module 2 OBJECTIVE 14: Compare various security mechanisms.
Presented by : SaiVenkatanikhil Nimmagadda
SQL Server 2016 Security Features
Multiplicative data perturbation (2)
Security in Computing, Fifth Edition
Presentation transcript:

CPT-S Advanced Databases 1 Yinghui Wu EME 49 ADB (ln29)

DBMS: privacy and security in the Cloud Data security and privacy Security and privacy in cloud Data confidentiality Research Challenges CPT-S Advanced Databases adapted from “Secure and Privacy- preserving database services in the cloud, Divy Agrawal, et.al, ICDE 2013 tutorial”

Database systems: security & privacy issues ADB (ln29)

Access Control [Bertino et al. TDSC’05] Problem Statement: authorizing data access scopes (relations, attributes, tuples) to users of DBMS Discretionary access control –Authorization administration policies, ie, granting and revoking authorization (centralized, ownership, etc) –Content-based using views and rewriting for fine-grained access control –Role-based access control: a function with a set of actions, consisting of users members Mandatory access control: –Object and subject classification (eg, top secret, secret, unclassified, etc). 4

Data Anonymization Problem: protecting Personally Identifiable Information (PII) and their sensitive attributes 5 Quasi-identifierSensitive DOBGenderZipcodeDisease 1/21/76Male53715Heart Disease 4/13/86Female53715Hepatitis 2/28/76Male53703Brochitis 1/21/76Male53703Broken Arm 4/13/86Female53706Flu 2/28/76Female53706Hang Nail Quasi-identifiers need to be generalized or suppressed Quasi-identifiers are sets of attributes that can be linked with external data to uniquely identify an individual

Equivalence class share same QI Solution: k-Anonymity [Samarati et al. TR’98] Quasi-identifiers indistinguishable among k individuals Implemented by building generalization hierarchy or partitioning multi-dimensional data space 6 Homogeneity attack Background knowledge attack

Enhanced Solution: l-Diversity [Machanavajjhala et al. ICDE’06] At least l values for sensitive attributes in each equivalence class 7 ZipcodeAgeSalaryDisease 476**2*20KGastric Ulcer 476**2*25KGastritis 476**2*30KStomach Cancer 4790*≥4050KGastritis 4790*≥40100KFlu 4790*≥4070KBronchitis 476**3*60KBronchitis 476**3*80KPneumonia 476**3*90KStomach Cancer A 3-diverse patient table Similarity attack Skewness attack

Enhanced Solution: t-Closeness [Li et al. ICDE’07] Distance between overall distribution of sensitive attribute values and distribution of sensitive attribute values in an equivalence class bounded by t 8

 A randomized function K gives ε-Differential Privacy IFF for all datasets D 1 and D 2 differing on at most one element, and all S Range (K) Strong privacy guarantees while querying a database 9 Query A PERTURBATION P(A) Query A’ PERTURBATION P(A’) Indistiguishable! Differential Privacy for Statistical Data [Dwork ICALP’06]

Secure Devices for Privacy [Anciaux et al. SIGMOD’07] Problem: protecting private data during queries involving both private (hidden) and public (visible) data Solution: carry private data in a secure USB key, ensure private data never leaves the USB key, and only public data flows to the key Query optimization for small RAM USB key 4/11/2013ICDE 2013 Tutorial10

Database security & privacy in the cloud ADB (ln29)

Cloud – A Tempting Attack Target Why the cloud? –Ubiquitous access to consolidated data. –Shared infrastructure  economies of scale –A lot of small and medium businesses Why attack? –Target one service provider, attack multiple companies –Financial gain from trading sensitive information 12

Cloud Provides Novel Attack Opportunities Co-residence attack [Ristenpart et al. CCS’09] –Adversary: non-provider-affiliated malicious parties –Map and identify location of target VM –Place attacker VM co-resident with target VM –Cross-VM side-channel attacks (due to sharing of physical resources): eg, number of visitors to a page, or keystroke attacks for password retrieval. Signature wrapping attack [ Somorovsky et al. CCSW’11 ] –Control Interface compromise by capturing a SOAP msg. –Manipulate SOAP message with arbitrary XML fragments –Use XML signature vulnerability to pass authentication –Take control of a victim’s account 13

A Barrier to Conquer Security and privacy – a barrier to cloud adoption Data (sensitive data) – a key concern need to solve data security and privacy problems in the cloud 14

Problems Amplified by the Cloud 15 Data confidentiality –Attacks Unauthorized accesses, side channel attacks –Solutions Encryption, querying encrypted data Trusted computing User Cloud Servers Data Query Answer Access privacy –Attacks Inferences on access patterns or query results –Solutions Private information retrieval Query obfuscation

Challenges: Conflicting Goals 16 Existing Services FunctionalityPerformance Confidentiality / Privacy High Low High Many Crypto Systems/Protocols Ideal State

Data confidentiality ADB (ln29)

Database as a Service [Hacigümüs et al. ICDE’02] Protects data from steeling but plaintext data can still be seen on the server Write – encrypt before storing –insert into lineitem (discount) values (encrypt(10,key)) Read – decrypt before access –select decrypt(discount,key) from lineitem where custid = 300 Encryption alternatives –Software level v.s. Hardware level (cryptographic coprocessor) encryption –Granularity: field, row, page 18

Partition and Identification Index [Hacigümüs et al. SIGMOD’02] E(tuple): encrypted-tuple, {attribute-index} Attribute-index: attribute value partition ids

Partition and Identification Index Client knows a map function, Map(val) = id of the partition containing val Random mapping Order-preserving mapping

Mapping Predicate Conditions Map(< val) : ids of the partitions that could contain values < val E.g. Map(eid < 280) = {2, 7} for random mapping Map(> val) : ids of the partitions that could contain values > val Map(A i = A j ): pairs of ids of the partitions that could have equal A i and A j values Decryption and processing on the client 21

Mapping Predicate Conditions 22 emp.did = mrg.did

Partition / Bucketization Review Pros –Efficient computation on the server Cons –Data update is hard (may need re-distribution) –Filtering super answer set could be time consuming depending on the partitions sizes –Might reveal value distribution from relative partitions changes during dynamic data updates 23

CryptDB [Popa et al. SOSP’11] Supports a wide range of SQL queries over encrypted data Server fully evaluates queries on encrypted data, and client does not perform query processing SQL-aware encryption –leverage provable practical techniques for different SQL operators over encrypted data Adjustable query-based encryption –Dynamically adjust the encryption level of data items according to user’s queries Onion of encryptions –From weaker forms of encryption that allow certain computation to stronger forms of encryption that reveal no information 24

SQL-Aware Onion Encryption 25 RND: no functionality DET: equality selection SEARCH: word selection (only for text fields) Any value JOIN: equality join RND: no functionality OPE: comparison Any value OPE-JOIN: inequality join int value HOM: sum

CryptDB System 26 For performing cryptographic operations For sending certain onion layer key

Open problems ADB (ln29)

Open Research Problems Encryption for processing range/join database queries on encrypted data Improve performance of querying encrypted data for use in practical OLTP applications –Pre-computation –Parallel calculation End to end security in the cloud –Need information flow control and auditing in addition to cryptography or trusted computing based approaches 28

Concluding Remarks Cloud security and privacy is not a completely new problem. Some issues are amplified by the cloud. Protecting data confidentiality and access privacy Maintaining practical functionality and performance while achieving security and privacy 29

References [Bertino et al. TDSC’05] E. Bertino et al. Database security-concepts, approaches, and challenges. In IEEE TDSC, 2(1), [Samarati et al. TR’98] P. Samarati et al. Protecting privacy when disclosing information: k- anonymity and its enforcement through generalization and suppression. TR [Machanavajjhala et al. ICDE’06] A. Machanavajjhala et al. l-diversity: privacy beyond k- anonymity. In ICDE [Li et al. ICDE’07] N. Li et al. t-closeness: privacy beyond k-anonymity and l-diversity. In ICDE [Dwork ICALP’06] C. Dwork. Differential privacy. In ICALP(2) [Verykios et al. SIGMOD’04] V. S. Verykios et al. State-of-the-art in privacy preserving data mining. In SIGMOD [Agrawal et al. SIGMOD’00] R. Agrawal et al. Privacy-preserving data mining. In SIGMOD [Clifton et al. KDD’02] C. Clifton et al. Tools for privacy preserving distributed data mining. In KDD [Anciaux et al. SIGMOD’07] N. Anciaux et al. GhostDB: querying visible and hidden data without leaks. In SIGMOD

References [Chaudhuri et al. CIDR’11] S. Chaudhuri et al. Database access control & privacy: is there a common ground? In CIDR [Ristenpart et al. CCS’09] T. Ristenpart et al. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In CCS [Somorovsky et al. CCSW’11] J. Somorovsky et al. All your clouds are belong to us: security analysis of cloud management interfaces. In CCSW [Hacigümüs et al. ICDE’02] H. Hacigümüs et al. Providing database as a service. In ICDE [Song et al. S&P’00] D. Song et al. Practical techniques for searches on encrypted data. In S&P [Hacigümüs et al. SIGMOD’02] H. Hacigümüs et al. Executing SQL over encrypted data in the database service provider mode. In SIGMOD [Hore et al. VLDB’04] B. Hore et al. A privacy-preserving index for range queries. In VLDB [Agrawal et al. SIGMOD’04] R. Agrawal et al. Order preserving encryption for numeric data. In SIGMOD

References [Popa et al. SOSP’11] R. A. Popa et al. Cryptdb: protecting confidentiality with encrypted query processing. In SOSP [Damiani et al. CCS’03] E. Damiani et al. Balancing confidentiality and efficiency in untrusted relational DBMSs. In CCS [Wang et al. SDM’11] S. Wang et al. A comprehensive framework for secure query processing on relational data in the cloud. In SDM [Aggarwal et al. CIDR’05] G. Aggarwal et al. Two can keep a secret: a distributed architecture for secure database services. In CIDR [Emekci et al. ICDE’06] F. Emekci et al. Privacy preserving query processing using third parties. In ICDE [Agrawal et al. SRDS’88] D. Agrawal et al. Quorum consensus algorithms for secure and reliable data. In SRDS [Bajaj et al. SIGMOD’11] S. Bajaj et al. Trusteddb: a trusted hardware based database with privacy and data confidentiality. In SIGMOD [Song et al. IEEE’12] D. Song et al. Cloud data protection for the masses. In IEEE Computer, 45(1), [Chor et al. JACM’98] B. Chor et al. Private information retrieval. In J. ACM, 45(6),

References [Kushilevitz et al. FOCS’97] E. Kushilevitz et al. Replication is not needed: single database, computationally private information retrieval. In FOCS [Sion et al. NDSS’07] R. Sion et al. On the computational practicality of private information retrieval. In NDSS [Olumofin et al. FC’11] F. G. Olumofin et al. Revisiting the computational practicality of private information retrieval. In FC [Williams et al. NDSS’08] P. Williams et al. Usable private information retrieval. In NDSS [Wang et al. DBSEC’10] S. Wang et al. Generalizing PIR for practical private retrieval of public data. In DBSec [Wang et al. DAPD’13] S. Wang et al. Towards practical private processing of database queries over public data. In DAPD [Vimercati et al. ICDCS’11] S. D. C. Vimercati et al. Efficient and private access to outsourced data. In ICDCS