Balancing confidentiality and efficiency in untrusted relational DBMSs

The scope and character of today's computing environments are progressively shifting from traditional, one-on-one client-server interaction to the new cooperative paradigm. It then becomes of primary importance to provide means of protecting the secrecy of the information, while guaranteeing its availability to legitimate clients. Operating on-line querying services securely on open networks is very difficult; therefore many enterprises outsource their data center operations to external application service providers. A promising direction towards prevention of unauthorized access to outsourced data is represented by encryption. However, data encryption is often supported for the sole purpose of protecting the data in storage and assumes trust in the server, that decrypts data for query execution.In this paper, we present a simple yet robust single-server solution for remote querying of encrypted databases on untrusted servers. Our approach is based on the use of indexing information attached to the encrypted database which can be used by the server to select the data to be returned in response to a query without the need of disclosing the database content. Our indexes balance the trade off between efficiency requirements in query execution and protection requirements due to possible inference attacks exploiting indexing information. We also investigate quantitative measures to model inference exposure and provide some related experimental results.

[1]  John B. Kam,et al.  A database encryption system with subkeys , 1981, TODS.

[2]  Hakan Hacigümüs,et al.  Providing database as a service , 2002, Proceedings 18th International Conference on Data Engineering.

[3]  Jiann-Liang Chen,et al.  Security-enhanced packet video with dynamic multicast throughput adjustment , 2001, Int. J. Netw. Manag..

[4]  Shmuel Tomi Klein,et al.  Storing text retrieval systems on CD-ROM: compression and encryption considerations , 1989, SIGIR '89.

[5]  Luc Bouganim,et al.  Chip-Secured Data Access: Confidential Data on Untrusted Servers , 2002, VLDB.

[6]  Dorothy E. Denning,et al.  Cryptography and Data Security , 1982 .

[7]  Jie Xu,et al.  Private information retrieval in the presence of malicious failures , 2002, Proceedings 26th Annual International Computer Software and Applications.

[8]  Julie Ward,et al.  Appia: Automatic Storage Area Network Fabric Design , 2002, FAST.

[9]  David J. DeWitt,et al.  A multiuser performance analysis of alternative declustering strategies , 1990, [1990] Proceedings. Sixth International Conference on Data Engineering.

[10]  Dawn Xiaodong Song,et al.  Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[11]  R. K. Shyamasundar,et al.  Introduction to algorithms , 1996 .

[12]  Jinx P. Walton Developing an enterprise information security policy , 2002, SIGUCCS '02.

[13]  Stefano Ceri,et al.  Horizontal data partitioning in database design , 1982, SIGMOD '82.

[14]  Christian Damsgaard Jensen,et al.  CryptoCache: a secure sharable file cache for roaming users , 2000, ACM SIGOPS European Workshop.

[15]  Pierangela Samarati,et al.  Protecting Respondents' Identities in Microdata Release , 2001, IEEE Trans. Knowl. Data Eng..

[16]  Hakan Hacigümüs,et al.  Executing SQL over encrypted data in the database-service-provider model , 2002, SIGMOD '02.