A Multi-agent Based Method for Reconstructing Buckets in Encrypted Databases

Outsourcing databases to third parties demonstrates a trend for many enterprise users. A bucket-based storage method is proposed for this emerging scenario. However, the introduction of buckets brings out challenges in balancing query efficiency and data secrecy. By measuring the query efficiency on false hits and the data secrecy on entropy amounts, an optimization problem is formalized to find a set of buckets on a tradeoff between efficiency and secrecy. We propose a multi-agent based method to find an approximate solution to this problem. In our solving, each agent manages a bucket and always tries to decrease the number of false hits by moving out a managed element on local evaluations. These local behaviors are aggregated as a global trend to find a set of buckets with fewer false hits. We validate this method by conducting simulated experiments on range queries.

[1]  Yi Tang,et al.  A Method for Reducing False Hits in Querying Encrypted Databases , 2006, The 8th IEEE International Conference on E-Commerce Technology and The 3rd IEEE International Conference on Enterprise Computing, E-Commerce, and E-Services (CEC/EEE'06).

[2]  Chin-Chen Chang,et al.  Secret Image Sharing Using Quadratic Residues , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[3]  Xueguang Chen,et al.  The Surplus Partition in a Simultaneous Offers Bargaining Game , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[4]  Hakan Hacigümüs,et al.  Query Optimization in Encrypted Database Systems , 2005, DASFAA.

[5]  Cheng-Chang Lien,et al.  Multi-mode Target Tracking on a Crowd Scene , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[6]  Chou-Wen Wang,et al.  Pricing Credit-Linked Notes Issued by the Protection Buyer and an SPV , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[7]  Weitao Zheng,et al.  Study on the Division Tactics of Top Swimming Athletes Home and Abroad in the 400m Freestyle Swimming Race , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[8]  Sushil Jajodia,et al.  Balancing confidentiality and efficiency in untrusted relational DBMSs , 2003, CCS '03.

[9]  Lih-Shyang Chen,et al.  Applications of a Pedagogical Agent Mechanism in a Web-based Clinical Simulation System for Medical Education , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[10]  Hideki Noda,et al.  A Study on Reversible Information Hiding Using Complexity Measure for Binary Images , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[11]  Jun-Dong Chang,et al.  Fragile Database Watermarking for Malicious Tamper Detection Using Support Vector Regression , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[12]  Chin-Chen Chang,et al.  A Flexible Fragile Watermarking Scheme for Binary Images with Reversibility , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[13]  Chin-Chen Chang,et al.  High Payload Data Embedding with Hybrid Strategy , 2007 .

[14]  Yôiti Suzuki,et al.  A Portable Acoustic Caption Decoder Using IH Techniques for Enhancing Lives of the People Who Are Deaf or Hard-of-Hearing - System Configuration and Robustness for Airborne Sound - , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[15]  Katsunari Yoshioka,et al.  Information Hiding for Public Address Audio Signal using FH/FSK Spread-spectrum Scheme , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[16]  Daniel J. Strauss,et al.  Adaptive Frame Decomposition in Slow Wave Cortical Responses to Transcranial Magnetic Stimulation , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[17]  I-Horng Jeng,et al.  Intelligent Surveillance by Using 2D Heterogeneous Multimodal Sensations and Information Transcoding , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[18]  Chu-Song Chen,et al.  Cascading Rectangle and Edge Orientation Features for Fast Pedestrian Detection , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[19]  Xianzhi Tian Research on Scientific Constructions of CAI English Teaching System , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[20]  Shu-Ping Chang,et al.  A Cost-Effective Noise-Reduction Filtering Structure Based on Unsymmetrical Working Windows , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[21]  Mei-Ling Chen,et al.  A New Application Framework for Intelligent Surveillance Sensor Networks , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[22]  Shu-Chung Yi,et al.  A Chinese Abacus DAC for Video Applications , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[23]  Qing Guo,et al.  An Adaptive Routing Based on an Improved Ant Colony Optimization in Leo Satellite Networks , 2007, 2007 International Conference on Machine Learning and Cybernetics.

[24]  Yun Lei,et al.  Authentication and Quality Monitoring based on Audio Watermark for Analog AM Shortwave Broadcasting , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[25]  Toru Fujiwara,et al.  A New Scheme for Optimum Decoding of Additive Watermarks Embedded in Spatial Domain , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[26]  Akira Nishimura Presentation of Information Synchronized with the Audio Signal Reproduced by Loudspeakers using an AM-based Watermark , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[27]  A Best-pair-first Capacity-distortion Control for Data Hiding on VQ Compression Domain , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[28]  Tung-Shou Chen,et al.  Content-based Rate Controlled Data Hiding in JPEG-LS , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[29]  Chin-Hsing Chen,et al.  An Adaptive Random-valued Impulse Noise Reduction Method Based on Noise Ratio Estimation in Highly Corrupted Images , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[30]  Daniel J. Strauss,et al.  The Johor Screening Scheme: Is an Area-Wide Newborn Hearing Screening Possible in Malaysia? , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[31]  Paolo Gubian,et al.  Blind Multi-Class Steganalysis System Using Wavelet Statistics , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[32]  Ricci S. C. Ieong How to Balance Privilege and Digital Forensics Investigation , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[33]  Barbara Dunin-Keplicz,et al.  Proceedings of the 2005 IEEE/WIC/ACM International Conference on Intelligent Agent Technology , 2005 .

[34]  Chin-Chen Chang,et al.  A Steganographic Method with High Embedding Capacity by Improving Exploiting Modification Direction , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[35]  Chin-Hsing Chen,et al.  Applying the CDHS to Improve the MAP-Based Algorithm in Super Resolution Reconstruction from Sequences , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[36]  Ju Liu,et al.  Influence of Joint Action of Fluid Shear Stress and Signal Transduction Ligand Inhibitor on Osteoclasts' Differentiation and Maturation , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[37]  Ting-Chia Hsu,et al.  Cascaded Face Detector with Multiple Templates , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[38]  Shiqian Wu,et al.  Research and Application of an Improved Genetic Algorithm on the Net Platform of “Digitized Party School” , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[39]  Teng Guo-wei A Fast Multiple Reference Frame Selection Algorithm Based on H.264/AVC , 2005 .

[40]  Hao-Yun Kao,et al.  Usability Testing of AMC Hospital's Website for Home Users: Case Study for On-Site Registration Design , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[41]  Takuo Nakashima,et al.  Extraction for Characteristics of Anomaly Accessed IP Packets Based on Statistical Analysis , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[42]  Ming-Yen Lin,et al.  Mining Generalized Association Rules for Service Recommendations for Digital Home Applications , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[43]  Sheng-Wen Shih,et al.  Feature Selection for Iris Recognition with AdaBoost , 2007 .

[44]  Yueh-Min Huang,et al.  User's Authentication in Media Services by using One-Time Password Authentication Scheme , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[45]  Nor Ashidi Mat Isa,et al.  Colour Contrast Enhancement on Preselected Cervical Cell for ThinPrep® Images , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[46]  Amnach Khawne,et al.  A Study of using L1-norm with Image Watermarking on SVD Domain , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[47]  Tien-Tsai Huang,et al.  The Application of Fuzzy Evaluating Approach on Banking Operating Performance in Taiwan: An Empirical Study , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[48]  Hsuan-Ting Chang,et al.  An Improved Face Detection Method in Low-resolution Video , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[49]  Wei-Chung Hsu,et al.  An Architecture for the Interoperability of Multimedia Messaging Services between GPRS and PHS Cellular Networks , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[50]  Sangjin Lee,et al.  Password Recovery Using an Evidence Collection Tool and Countermeasures , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[51]  Ming-zhang Zuo,et al.  Using Knowledge Management Technologies to Develop Reflective Learning , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[52]  Yi Tang,et al.  Adaptive bucket formation in encrypted databases , 2005, 2005 IEEE International Conference on e-Technology, e-Commerce and e-Service.

[53]  Sheng-Tun Li,et al.  Fuzzy Rating Framework for Knowledge Management , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[54]  Daisuke Sato,et al.  An Approach to Camera Work Based Animation , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[55]  Hakan Hacigümüs,et al.  Executing SQL over encrypted data in the database-service-provider model , 2002, SIGMOD '02.

[56]  Daniel J. Strauss,et al.  Optimized Computational Instrumentation in Biomedicine: A Review , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[57]  Mong-Fong Horng,et al.  A DC-based Approach to Robust Watermarking with Hamming-Code , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[58]  Mingzhi Huang,et al.  Research on the Partner Selection of Virtual Enterprise Based on Self-adaptive Genetic Algorithm , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[59]  Chia-Mei Chen,et al.  Distributed Detection of Wormholes and Critical Links in Wireless Sensor Networks , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[60]  Pen-Yuan Liao Optimal Pricing Strategy for Queuing Systems with Capacity Constraint Problem , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[61]  Chin-Hsing Chen,et al.  A Fast Video Noise Reduction Method by Using Object-Based Temporal Filtering , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[62]  Makoto Yokoo,et al.  The distributed breakout algorithms , 2005, Artif. Intell..

[63]  Chang-Lung Tsai,et al.  Traffic Detection at Nighttime Using Entropy Measurement , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[64]  Yau-Hwang Kuo,et al.  Energy-Efficient Geographic Relay for Ad-Hoc Wireless Networks , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[65]  Toshinori Sueyoshi,et al.  Queueing Analysis for Self-similar Traffic by Simulator , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[66]  Chin-Chen Chang,et al.  Using Dynamic Programming Strategy to Find an Optimal Solution to Exploiting Modification Direction Embedding Method , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[67]  Xiao-lin Wang,et al.  Artificial Immune Recognition System as a New Classifier for Reservoir Operating Rules Extraction , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[68]  Satoru Tezuka,et al.  Use of Gap-Filling Operation to Enhance Image Quality of Binary Image Watermarking , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[69]  H. Hasan,et al.  Colour Contrast Enhancement Based on Bright and Dark Stretching for Ziehl-Neelsen Slide Images , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[70]  Wei-Shen Tai,et al.  An Intellectual Capital Performance Evaluation Based on Fuzzy Linguistic , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[71]  Shinta Nakayama,et al.  HVS-Based Robust Video Watermarking with Dual-plane Correlation , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[72]  Jun-Wei Hsieh,et al.  Edge-based Lane Change Detection and its Application to Suspicious Driving Behavior Analysis , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[73]  Xiaoming Chang,et al.  A Rule-based Chinese Question Answering System for Reading Comprehension Tests , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[74]  Chung-Hsin Liu,et al.  A Practical Color Transfer Algorithm for Image Sequences , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[75]  Chih-Chuan Chen,et al.  An Enhanced ACO Algorithm for Multi-objective Maintenance Scheduling of Oil Tanks , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[76]  Chu-Hsing Lin,et al.  Binary Document Images Authentication by Thinning Digital Patterns , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[77]  Chin-Chen Chang,et al.  Reversible Data Embedding for Vector Quantization Indices , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[78]  Yau-Hwang Kuo,et al.  Video Streaming Using Overlay Multicast Scheme with Efficient and Load-Balance Path Diversity , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).