Don't Be a Tattle-Tale: Preventing Leakages through Data Dependencies on Access Control Protected Data

07/18/2022
by   Primal Pappachan, et al.
0

We study the problem of answering queries when (part of) the data may be sensitive and should not be leaked to the querier. Simply restricting the computation to non-sensitive part of the data may leak sensitive data through inference based on data dependencies. While inference control from data dependencies during query processing has been studied in the literature, existing solution either detect and deny queries causing leakage, or use a weak security model that only protects against exact reconstruction of the sensitive data. In this paper, we adopt a stronger security model based on full deniability that prevents any information about sensitive data to be inferred from query answers. We identify conditions under which full deniability can be achieved and develop an efficient algorithm that minimally hides non-sensitive cells during query processing to achieve full deniability. We experimentally show that our approach is practical and scales to increasing proportion of sensitive data, as well as, to increasing database size

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/13/2020

Panda: Partitioned Data Security on Outsourced Sensitive and Non-sensitive Data

Despite extensive research on cryptography, secure and efficient query p...
research
06/08/2017

Securing Databases from Probabilistic Inference

Databases can leak confidential information when users combine query res...
research
12/20/2018

Partitioned Data Security on Outsourced Sensitive and Non-sensitive Data

Despite extensive research on cryptography, secure and efficient query p...
research
04/26/2021

Provenance-based Data Skipping (TechReport)

Database systems analyze queries to determine upfront which data is need...
research
06/27/2023

A fine-grained framework for database repairs

We introduce a general abstract framework for database repairing that di...
research
01/17/2023

Command Line Interface Risk Modeling

Protecting sensitive data is an essential part of security in cloud comp...
research
01/22/2020

Computing Similarity Queries for Correlated Gaussian Sources

Among many current data processing systems, the objectives are often not...

Please sign up or login with your details

Forgot password? Click here to reset