Horizontal Fragmentation for Data Outsourcing with Formula-Based Confidentiality Constraints

This article introduces the notion of horizontal fragmentation to the data outsourcing area. In a horizontal fragmentation, rows of tables are separated (instead of columns for vertical fragmentation). We give a formula-based definition of confidentiality constraints and an implication-based definition of horizontal fragmentation correctness. Then we apply the chase procedure to decide this correctness property and present an algorithm that computes a correct horizontal fragmentation.

[1]  Sushil Jajodia,et al.  Secure Data Management in Decentralized Systems , 2014, Secure Data Management in Decentralized Systems.

[2]  Phiniki Stouppa,et al.  A Formal Model of Data Privacy , 2006, Ershov Memorial Conference.

[3]  Hakan Hacigümüs,et al.  Executing SQL over encrypted data in the database-service-provider model , 2002, SIGMOD '02.

[4]  David Maier,et al.  Testing implications of data dependencies , 1979, SIGMOD '79.

[5]  Sushil Jajodia,et al.  Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients , 2009, DBSec.

[6]  Rajeev Motwani,et al.  Two Can Keep A Secret: A Distributed Architecture for Secure Database Services , 2005, CIDR.

[7]  Sushil Jajodia,et al.  Fragmentation and Encryption to Enforce Privacy in Data Storage , 2007, ESORICS.

[8]  Sushil Jajodia,et al.  Keep a Few: Outsourcing Data While Maintaining Confidentiality , 2009, ESORICS.

[9]  Sushil Jajodia,et al.  Secure Databases: Constraints, Inference Channels, and Monitoring Disclosures , 2000, IEEE Trans. Knowl. Data Eng..

[10]  Joachim Biskup,et al.  Secure Mediation of Join Queries by Processing Ciphertexts , 2007, 2007 IEEE 23rd International Conference on Data Engineering Workshop.

[11]  Ronald Fagin,et al.  Data exchange: semantics and query answering , 2003, Theor. Comput. Sci..

[12]  Joachim Biskup,et al.  Requirements and Protocols for Inference-Proof Interactions in Information Systems , 2009, ESORICS.

[13]  Hakan Hacigümüs,et al.  Query Optimization in Encrypted Database Systems , 2005, DASFAA.

[14]  Phokion G. Kolaitis,et al.  Repair checking in inconsistent databases: algorithms and complexity , 2009, ICDT '09.