Research interest: Secure database outsourcing Presented by Alla Lanovenko Thesis Adviser: Professor Huiping Guo 599 A 11 December 2006.

Slides:



Advertisements
Similar presentations
Privacy-Enhancing Models and Mechanisms for Securing Provenance and its Use October 2010 Lead PI: Ravi Sandhu (UT San Antonio) PIs: Elisa Bertino (Purdue),
Advertisements

Trusted Data Sharing over Untrusted Cloud Storage Provider Gansen Zhao, Chunming Rong, Jin Li, Feng Zhang, and Yong Tang Cloud Computing Technology and.
Querying Encrypted Data using Fully Homomorphic Encryption Murali Mani, UMFlint Talk given at CIDR, Jan 7,
Secure Data Storage in Cloud Computing Submitted by A.Senthil Kumar( ) C.Karthik( ) H.Sheik mohideen( ) S.Lakshmi rajan( )
A Privacy Preserving Index for Range Queries
Outsourcing Search Services on Private Spatial Data Man Lung Yiu, Gabriel Ghinita, Christian Jensen, and Panos Kalnis Presenter: Uma Kannan 1.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt ESPOON: Enforcing Security Policies in Outsourced Environments M. Rizwan Asghar SRI International Menlo.
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
多媒體網路安全實驗室 Towards Secure and Effective Utilization over Encrypted Cloud Data 報告人 : 葉瑞群 日期 :2012/05/09 出處 :IEEE Transactions on Knowledge and Data Engineering.
8.2 Discretionary Access Control Models Weiling Li.
MS DB Proposal Scott Canaan B. Thomas Golisano College of Computing & Information Sciences.
1 SECURE DATABASE OUTSOURCING ALLA LANOVENKO ADVISIOR: DR. HUIPING GUO CALIFORNIA STATE UNIVERSITY LOS ANGELES
Securing Data Storage Protecting Data at Rest Advanced Systems Group Dell Computer Asia Ltd.
Privacy and Integrity Preserving in Distributed Systems Presented for Ph.D. Qualifying Examination Fei Chen Michigan State University August 25 th, 2009.
Database Features Lecture 2. Desirable features in an information system Integrity Referential integrity Data independence Controlled redundancy Security.
Copyright © 2007 Ramez Elmasri and Shamkant B. Navathe Slide 1- 1.
Distributed Computer Security 8.2 Discretionary Access Control Models - Sai Phalgun Tatavarthy.
Mobile Data Sharing over Cloud Group No. 8 - Akshay Kantak - Swapnil Chavan - Harish Singh.
 MODERN DATABASE MANAGEMENT SYSTEMS OVERVIEW BY ENGINEER BILAL AHMAD
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Secure Knowledge Management: and.
Web-based Portal for Discovery, Retrieval and Visualization of Earth Science Datasets in Grid Environment Zhenping (Jane) Liu.
Summary For Chapter 8 Student: Zhibo Wang Professor: Yanqing Zhang.
TECHNIQUES FOR OPTIMIZING THE QUERY PERFORMANCE OF DISTRIBUTED XML DATABASE - NAHID NEGAR.
D ATABASE S ECURITY Proposed by Abdulrahman Aldekhelallah University of Scranton – CS521 Spring2015.
Protecting data privacy and integrity in clouds By Jyh-haw Yeh Computer Science Boise state University.
WP6: Grid Authorization Service Review meeting in Berlin, March 8 th 2004 Marcin Adamski Michał Chmielewski Sergiusz Fonrobert Jarek Nabrzyski Tomasz Nowocień.
Cong Wang1, Qian Wang1, Kui Ren1 and Wenjing Lou2
Sinaia, Romania August, TH Workshop “Software Engineering Education and Reverse Engineering” Dhuratë Hyseni, Betim Çiço South East European University.
Construction of efficient PDP scheme for Distributed Cloud Storage. By Manognya Reddy Kondam.
Collaboration and Content Customer solution case study The Yaroslavl region Government creates knowledge base of public authorities of the Yaroslavl region.
Managing key hierarchies for access control enforcement: Heuristic approaches Author: Carlo Blundo, Stelvio Cimato, Sabrina De Capitani di Vimercati, Alfredo.
Privacy Preserving Query Processing in Cloud Computing Wen Jie
Chapter 6: Integrity and Security Thomas Nikl 19 October, 2004 CS157B.
CS621 : Seminar-2008 DEEP WEB Shubhangi Agrawal ( )‏ Jayalekshmy S. Nair ( )‏
Database Architecture Introduction to Databases. The Nature of Data Un-structured Semi-structured Structured.
A Survey on Secure Cloud Data Storage ZENG, Xi CAI, Peng
Secure Cloud Database using Multiparty Computation.
Introduction: Databases and Database Users
1 Introduction to Database Systems. 2 Database and Database System / A database is a shared collection of logically related data designed to meet the.
HPCC 2015, August , New York, USA Wei Chang c Joint work with Qin Liu a, Guojun Wang b, and Jie Wu c a. Hunan University, P. R. China b. Central.
Lecture On Introduction (DBMS) By- Jesmin Akhter Assistant Professor, IIT, Jahangirnagar University.
SEC835 Practical aspects of security implementation Part 1.
Outsourcing Database Services Đ ỗ Ph ướ c Hoàng T ườ ng Lân Nguy ễ n Minh Thông Lê Tu ấ n Đ ạ t
Wai Kit Wong 1, Ben Kao 2, David W. Cheung 2, Rongbin Li 2, Siu Ming Yiu 2 1 Hang Seng Management College, Hong Kong 2 University of Hong Kong.
Identity-Based Secure Distributed Data Storage Schemes.
Data Confidentiality on Clouds Sharad Mehrotra University of California, Irvine.
Executing SQL over Encrypted Data in Database-Service-Provider Model Hakan Hacigumus University of California, Irvine Bala Iyer IBM Silicon Valley Lab.
11 World-Leading Research with Real-World Impact! Group-Centric Secure Information Sharing: A Lattice Interpretation Institute for Cyber Security Ravi.
CSCE 824 Secure and Distributed Database Management Systems FarkasCSCE 8241.
Lecture # 3 & 4 Chapter # 2 Database System Concepts and Architecture Muhammad Emran Database Systems 1.
Summary of Distributed Computing Security Yifeng Zou Georgia State University
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
1 Common Secure Index for Conjunctive Keyword-Based Retrieval over Encrypted Data Peishun Wang, Huaxiong Wang, and Josef Pieprzyk: SDM LNCS, vol.
"We are going to relate with the world-wide economy competing with jobs qualified not with low wages”. Dr. Abel Pacheco. 8 de mayo del 2002 "We are going.
Protection of outsourced data MARIA ANGEL MARQUEZ ANDRADE.
Database Security.
Management Information Systems, 4 th Edition 1 Chapter 8 Data and Knowledge Management.
Data Integrity Proofs in Cloud Storage Author: Sravan Kumar R and Ashutosh Saxena. Source: The Third International Conference on Communication Systems.
CSCE 824 Secure (and Distributed) Database Management Systems FarkasCSCE
1 Privacy Preserving Data Mining Introduction August 2 nd, 2013 Shaibal Chakrabarty.
LOGO Cloud Storage Oriented Cipher-text Search Protocol.
Secure Data Outsourcing
Lecture On Introduction (DBMS) By- Jesmin Akhter Assistant Professor, IIT, Jahangirnagar University.
IT 5433 LM1. Learning Objectives Understand key terms in database Explain file processing systems List parts of a database environment Explain types of.
1 SFS: Secure File Sharing For Dynamic Groups In Cloud Shruthi Suresh M-tech CSE RCET.
CS4222 Principles of Database System
ABYSS : An Architecture for Software Protection
pVault Sharing Architecture
Introduction to Databases Transparencies
OU BATTLECARD: Oracle WebCenter Training
Presentation transcript:

Research interest: Secure database outsourcing Presented by Alla Lanovenko Thesis Adviser: Professor Huiping Guo 599 A 11 December 2006

Introduction Outsourced database model (ODM) State of art Thesis problem References Outline

Introduction Database outsourcing Using database-as-a-service advantages: Allows organizations to save hardware and software recourses; Provides a way for organizations to share the expertise of database professionals, thereby cutting the people cost of managing a complex information infrastructure Promises higher availability and more effective disaster protection than in-house

Outsourced database model Problem: Because sensitive data become stored on a site that is not under the data owner’s direct control, so data privacy and security two big issue. - data has to be protected from the intruders. - if we do not trust the server or administrators with the data contents data encryption has to be employed to provide data privacy.

State of art Search on encrypted data: - To store only encrypted data do not work because it would unable external service provider to support selective access. Since confidentiality demands that data decryption must be possible only at the client side, techniques are needed to enable external servers to execute queries on encrypted data, otherwise all the relations involved in a query would have to be sent to the client for query execution. - Approaches towards the solution of this problem were presented in [1, 2, 13, 16, 17 ], where the authors proposed storing, together with the encrypted database, additional indexing information. Such indexes are used by the DBMS to select the data to be returned in response to a query, without need of decrypting the data themselves.

State of art ( Search on encrypted data cont.) Depends on the query to be executed different type of indexes had been proposed: - in [1, 13] proposed a hash-based method suitable for selection queries SELECT * FROM Employees; - in [3] order preserving encryption schema (OPES) is presented to support equality and range query. This approach operates only on integer value - in [10] proposed techniques for performing arithmetic operations ( +, -, *, / ) on encrypted data and do not consider comparison operations. - [4, 5] proposed execution of aggregation queries over encrypted data.

State of art ( Cont. ) Even if the DAS scenario has been studied in depth in the last few years, there are new interesting research challenges that have to be investigated. In particular, the problem of guaranteeing an efficient mechanism for implementing selective access to the remote database is still an open issue. The access control is an important entity in outsourced database security. The several proposals for designing and querying encrypted/indexing outsourced databases focus on the challenges posed by protecting data at the server side, and assume the client has complete access to the query result [2, 6, 7, 8].

Thesis problem Therefore, tuples are encrypted using a single key and the knowledge of the key grants complete access to the whole database. This type of assumption would not fit in real world. An effective approach proposed by University of Milan (Italy) [9] is to provide a different method that consists in grouping users with the same access privileges and in encrypting each tuple (or group) with the key associated with the set of users that can access it. Problem with this approach: it cannot be directly applied to dynamic scenarios where authorizations, users and objects can dynamically change because database has to be re- encrypted each time group membership changes ( eviction of a member). In this thesis I will propose group key management schema for dynamic group that would not required the owner to re-encrypt the database each time group membership changed.

References [1] E. Damiani, S. De Capitani di Vimercati, M. Finetti, S. Paraboschi, P. Samarati, and S. Jajodia. Implementation of a storage mechanism for untrusted DBMSs. In Proc. of the Second International IEEE Security in Storage Workshop, Washington DC, USA, May [2] H. Hacig¨um¨us, B. Iyer, S. Mehrotra, and C. Li. Executing SQL over encrypted data in the database-service-provider model. In Proc. of the ACM SIGMOD’2002, Madison, WI, USA, June [3] R. Agrawal, J. Kierman, R. Srikant, and Y. Xu. Order preserving encryption for numeric data. In Proc. of ACM SIGMOD 2004, Paris, France, June [4] H. Hacig¨um¨us, B. Iyer, and S. Mehrotra. Efficient execution of aggregation queries over encrypted relational databases. In Proc. of the 9th International Conference on Database Systems for Advanced Applications, Jeju Island, Korea, March 2004 [5] H. Hacig¨um¨us and S. Mehrotra. Performance-conscious key management in encrypted databases. In DBSec, pages 95–109, [6] R. Brinkman, J. Doumen, and W. Jonker. Using secret sharing for searching in encrypted data. In Proc. of the Secure Data Management Workshop, Toronto, Canada, August 2004.

[7] A. Ceselli, E. Damiani, S. De Capitani di Vimercati, S. Jajodia, S. Paraboschi, and P. Samarati. Modeling and assessing inference exposure in encrypted databases. ACM Transactions on Information and System Security (TISSEC), 8(1):119– 152, February [8] R. Sandhu. Cryptographic implementation of a tree hierarchy for access control. Information Processing Letters, 27(2):95–98, April [9] Ernesto Damiani, S. De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati, Key Management for Multi-User Encrypted Databases, Proceedings of the 2005 ACM workshop on Storage security and survivability, November [10] C. Boyens and O. Gunter. Using online services in untrusted environments - a privacy-preserving architecture. In Proc. of the 11th European Conference on Information Systems (ECIS ’03), Naples, Italy, June [11] E. Damiani, S. De Capitani di Vimercati, S. Foresti,. Jajodia, S. Paraboschi, and P. Samarati. Metadata management in outsourced encrypted databases. In Proc. of the 2nd VLDB Workshop on Secure Data Management (SDM’05), Trondheim, Norway, September [12] E. Damiani, S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati. Selective release of information in outsourced encrypted databases. Technical report, University of Milan, References

[13] E. Damiani, S. De Capitani di Vimercati, S. Jajodia, S. Paraboschi, and P. Samarati.Balancing confidentiality and efficiency in untrusted relational DBMSs. In Proc. of the 10th ACM Conference on Computer and Communications Security, Washington, DC, USA, October [14] E. Goh. Secure indexes. eprint.iacr.org/2003/216/. [15] E. Damiani, S. De Capitani di Vimercati, S. Jajodia, S. Paraboschi, and P. Samarati. Balancing confidentiality and efficiency in untrusted relational DBMSs. In Proc. of the 10th ACM Conference on Computer and Communications Security, Washington, DC, USA, October [16] H. Hacig¨um¨us, B. Iyer, and S. Mehrotra. Providing database as a service. In Proc. of 18th International Conference on Data Engineering, San Jose, CA, USA, February [17] H. Hacig¨um¨us, B. Iyer, and S. Mehrotra. Ensuring the integrity of encrypted databases in the database-as-a- service model. In DBSec, pages 61–74, References