Managing and querying encrypted data Trần Mỹ Giao Huỳnh Mai Thúy.

Slides:



Advertisements
Similar presentations
Tuning: overview Rewrite SQL (Leccotech)Leccotech Create Index Redefine Main memory structures (SGA in Oracle) Change the Block Size Materialized Views,
Advertisements

Outline  Introduction  Background  Distributed DBMS Architecture  Distributed Database Design  Semantic Data Control ➠ View Management ➠ Data Security.
Encipherment Using Modern Symmetric-Key Ciphers. 8.2 Objectives ❏ To show how modern standard ciphers, such as DES or AES, can be used to encipher long.
Modern Symmetric-Key Ciphers
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
Building web applications on top of encrypted data using Mylar Presented by Tenglu Liang Tai Liu.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
Xyleme A Dynamic Warehouse for XML Data of the Web.
Chapter 5 Cryptography Protecting principals communication in systems.
Database Systems: A Practical Approach to Design, Implementation and Management International Computer Science S. Carolyn Begg, Thomas Connolly Lecture.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Practical Techniques for Searches on Encrypted Data Author: Dawn Xiaodong Song, David Wagner, Adrian Perrig Presenter: 紀銘偉.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Lecture 23 Symmetric Encryption
Chapter 17 Methodology – Physical Database Design for Relational Databases Transparencies © Pearson Education Limited 1995, 2005.
Lecture 4 Cryptographic Tools (cont) modified from slides of Lawrie Brown.
Team Dosen UMN Physical DB Design Connolly Book Chapter 18.
Encryption Schemes Second Pass Brice Toth 21 November 2001.
CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Lecture 2: Message Authentication Anish Arora CSE5473 Introduction to Network Security.
Lecture 3: Cryptographic Tools modified from slides of Lawrie Brown.
Practical Techniques for Searches on Encrypted Data Yongdae Kim Written by Song, Wagner, Perrig.
© Neeraj Suri EU-NSF ICT March 2006 DEWSNet Dependable Embedded Wired/Wireless Networks MUET Jamshoro Computer Security: Principles and Practice Slides.
Protecting data privacy and integrity in clouds By Jyh-haw Yeh Computer Science Boise state University.
Dr. Khalid A. Kaabneh Amman Arab University
Privacy Preserving Query Processing in Cloud Computing Wen Jie
Jim McLeod MyDBA  SQL Server Performance Tuning Consultant with MyDBA  Microsoft Certified Trainer with SQLskills Australia 
Lecture 9 Methodology – Physical Database Design for Relational Databases.
Mohammad Ahmadian COP-6087 University of Central Florida.
Chapter 16 Methodology – Physical Database Design for Relational Databases.
Chapter 20 Symmetric Encryption and Message Confidentiality.
SEC835 Practical aspects of security implementation Part 1.
Cryptography, Authentication and Digital Signatures
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Secure Cloud Database with Sense of Security. Introduction Cloud computing – IT as a service from third party service provider Security in cloud environment.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
Chapter 31 Cryptography And Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Research Case in Cloud Computing IST 501 Fall 2014 Dongwon Lee, Ph.D.
Executing SQL over Encrypted Data in Database-Service-Provider Model Hakan Hacigumus University of California, Irvine Bala Iyer IBM Silicon Valley Lab.
10/10/2012ISC239 Isabelle Bichindaritz1 Physical Database Design.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
Network Security David Lazăr.
Protection of outsourced data MARIA ANGEL MARQUEZ ANDRADE.
Methodology – Physical Database Design for Relational Databases.
15-499Page :Algorithms and Applications Cryptography I – Introduction – Terminology – Some primitives – Some protocols.
Lecture 23 Symmetric Encryption
Symmetric Encryption Lesson Introduction ●Block cipher primitives ●DES ●AES ●Encrypting large message ●Message integrity.
Lecture 18 Windows – NT File System (NTFS)
Physical Database Design Purpose- translate the logical description of data into the technical specifications for storing and retrieving data Goal - create.
Session 1 Module 1: Introduction to Data Integrity
Presented By Amarjit Datta
Implementing Secure IRC App with Elgamal By Hyungki Choi ID : Date :
Keyword search on encrypted data. Keyword search problem  Linux utility: grep  Information retrieval Basic operation Advanced operations – relevance.
Database Systems, 8 th Edition SQL Performance Tuning Evaluated from client perspective –Most current relational DBMSs perform automatic query optimization.
Data Integrity & Indexes / Session 1/ 1 of 37 Session 1 Module 1: Introduction to Data Integrity Module 2: Introduction to Indexes.
CS480 Cryptography and Information Security
Searchable Encryption in Cloud
Module 11: File Structure
based on slides by Debra Cook
Database Systems Instructor Name: Lecture-3.
ADVANCED ENCRYPTION STANDARDADVANCED ENCRYPTION STANDARD
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
Presentation transcript:

Managing and querying encrypted data Trần Mỹ Giao Huỳnh Mai Thúy

Outline Introduction 1 DAS - Storing and querying encrypted data Trust, Encryption Key- Management, Integrity & Data confidentiality References 2 3 4

Introduction Two new challenges emerge: o Efficient encryption algorithms for relational data o Supporting query on the encrypted relational data. Example: secure server.

Outline Introduction 1 DAS - Storing and querying encrypted data Trust, Encryption Key- Management, Integrity & Data confidentiality References 2 3 4

What is DAS ? It is a paradigm wherein data owned by a client is hosted on a third-party server There is significant interest in secure query evaluation over encrypted databases.

DAS - Storing and querying encrypted data DAS set up and security model Querying encrypted relational data Relational encryption and storage model Keyword search on encrypted text data Search over encrypted XML data

DAS setup and security Data-owner, clients, server Data must be encrypted on the server and only decrypted on the client-side.

Querying encrypted relational data EMP(eid, ename, salary, addr, did) DEPARTMENT(did, dname, mgr) The goal in DAS is to process the query directly at the server without the need to decrypt the data.

Querying encrypted relational data Requires mechanism to support the following basic operator over encrypted data Comparison operators Arithmetic operators

2 categories Approaches based on new encyption techniques Information-hiding based Approaches

Approaches based on new encryption techniques Support either arthrimetic and/or comparison operators – PH supports basic arithmetic operations,and doesn’t allow comparison. – Order-preserving encryption: support comparison, join, selection, sorting, grouping, not support aggregation. The limitation: – Only safe under limited situations where the adversary knowledge is limited.

Information-hiding based Approaches Store additional auxiliary information along with encrypted data Secure indices are designed carefully exploiting information hiding mechanism.

Information-hiding based Approaches 3 basic techniques: – Pertubation :Add a random value to the true value (numeric attribute) – Generalization : Replace a numeric or categorical value by a more general value – Swapping : swap the values of a specific attribute of two records

Information-hiding based Approaches Support comparison, select – project - join, sorting,grouping. Cannot support aggregation at the server.

Query processing architecture for DAS

Relational encryption and storage model R(A1, A2,.., An)  Emp(etuple, eid, ename, salary, addr, did)

Relational encryption and storage model Partition functions: – Patition(emp.eid) = {[0,200], [200, 400],[400,600],[600, 800], [800, 1000]} Identification functions: E.g. : Ident(emp.eid)([0,200]) =2

Relational encryption and storage model Mapping functions – Map(emp.eid)(395) = 7 Storing encrypted data

Relational encryption and storage model Decyption functions – D(Rs) = R Mapping condition – To translate query conditions to corresponding conditions over the server-side, Map (cond) is called.

Translating Realtional Operator The Selection Operator: E.g. :C = eid < 395 & did = 140 (emp)

Query Execution Give an example:

Query Execution Give an example:

Query Execution Give an example:

Query Execution Give an example:

Keyword search on encrypted text data Answer is

Private key based search scheme on encrypted text data Secure index: reveals no imformation about its content to the adversary However, allows the adversary to tests the presence or absence of the keyword using a trapdoor A user search for documents containing word w, generates a trapdoor, which can be used by adversary to retieve documents.

Secure index’s creation Alice generates a sequence of pseudo-random values s1...sn, using a stream cipher. For each string si, Alice using pseudo-random function Fk(si) to generate a random m-bit sequence Then computes n-bit sequence ti= Ciphertext ci = wi XOR ti Secure index is a set of ci.

Secure index’s creation To prevent adversary from knowing what keyword is, pre- encrypt each word w using algorithm Ek Instead of using w below, we using xi = Ek(wi) to replace xi.

Search over encrypted XML data There has been little work in the area of encrypted XML data management. Two kinds of information the client may consider as sensitive:  Individual node with its content  Association between data values.

Search over encrypted XML data The notion of security constraints (SCs) that support both types of security requirements above. Such constraints can be specified in the form of Xpath expressions and may be classified as either node-type constraints or association-type constraints.

Search over encrypted XML data Hiding individual node with its content by encrypting their content Hiding Association between data values by encrypting any one of the nodes can enforce the SC

Search over encrypted XML data Query processing follows the typical DAS approach that we mentioned earlier Using two indexes( is call discontinuous structural interval index(DSI)) – One is the structural index to enable tree traversal – The second one is a value index for enabling attribute value based queries like range queries.

Search over encrypted XML data Use an “order-preserving encryption” scheme to transform the values from their original domain to a new domain  Use B-trees to implement range-queries This scheme is unsafe under known plaintext attack

Outline Introduction 1 DAS - Storing and querying encrypted data Trust, Encryption Key- Management, Integrity & Data confidentiality References 2 3 4

Trust, Key- management, Integrity & Data confidentiality 3 basic models of trust that are widely studied in literature:  Complete trust : the data management issues are similar to those arising in standard DBMS systems  Partial trust : ensure the confidentiality of sensitive data  Un-trusted model:ensure authenticity of data and correctness of query results

Trust, Key- management, Integrity & Data confidentiality Encrypting relational data Authentication and integrity issues Key management in DAS

Encrypting relational data Three important issues to keep in mind 1) Encryption algorithms 2) Encryption granularity 3) Efficient storage for encrypted data

1) Encryption algorithms Symmetric key  DES : the effective key length is 56 bits, the block size is 64 bits  AES : Each of these ciphers has a 128-bit block size, with key sizes of 128, 192 and 256 bits  Blowfish : 64-bit block size and a variable key length from 32 up to 448 bits

DES AES

Blowfish

1) Encryption algorithms

Public-key encryption:  Avoids the problem of secure key distribution  E.g. : RSA

2) Encryption granularity Field level  The smallest achievable granularity  Each attribute value of a tuple is encrypted separately

2) Encryption granularity Record / row level  Each row is encrypted separately  Does not differentiate between sensitive and non-sensitive data

2) Encryption granularity Attribute / column level:  Only sensitive attributes are encrypted

2) Encryption granularity Page / block level :  Whenever a page/block of sensitive data is stored, the entire block is encrypted

3) Efficient storage for encrypted data The performance issues associated with storage of encrypted data on the disk “ Partitioned Plaintext and Cipher text” (PPC) : – Cluster the non-sensitive and sensitive data  minimize the number of encryption operations

3) Efficient storage for encrypted data – Use NSM requires only modifications to the page layout.

Authentication and integrity issues Data integrity and authentication can be provided at difference levels of granularity: the level of a table, a column, a row, an individual attribute value. Three flavor of database model:  U nified client model

 Multiple clients- single owner  Multiple clients-multiple owners

Authentication and integrity issues One natural and intuitive solution for record-level integrity is to use message authentication codes (MAC) MAC is a keyed hash of record ‘s content, tend to be small and of constant length The MAC-s are attractive for the unified client model In multi owner and multi querier models, potentially many queriers for each client. In these settings, MAC-s are not useful (repudiation)

Key management in DAS The data owner first decides the key- assignment granularity:  Database level : generate a single key for the whole database  Table level : tables in database may be grouped  one key generate for each group  Row level : records in table be grouped  each group is encrypted with a separate key

Key management in DAS In DAS key generation can be carried out at the client-side or at a third-party trusted server. The key generation process is classified into two classes:  Pre computation :  Key is generated ahead of time  After that, be stored in the key registry(key-Id, key correspondence information, key mode, key material…) of the system  Re computation  The key generating information is stored

Outline Introduction 1 DAS - Storing and querying encrypted data Trust, Encryption Key- Management, Integrity & Data confidentiality References 2 3 4

Handbook of Database Security Applications and Trends

THANK YOU FOR LISTENING