Secure and Efficient Query Processing in Outsourced Databases

06/21/2022
by   Dmytro Bogatov, et al.
0

Various cryptographic techniques are used in outsourced database systems to ensure data privacy while allowing for efficient querying. This work proposes a definition and components of a new secure and efficient outsourced database system, which answers various types of queries, with different privacy guarantees in different security models. This work starts with the survey of five order-revealing encryption schemes that can be used directly in many database indices and five range query protocols with various security / efficiency tradeoffs. The survey systematizes the state-of-the-art range query solutions in a snapshot adversary setting and offers some non-obvious observations regarding the efficiency of the constructions. In ℰpsolute, a secure range query engine, security is achieved in a setting with a much stronger adversary where she can continuously observe everything on the server, and leaking even the result size can enable a reconstruction attack. ℰpsolute proposes a definition, construction, analysis, and experimental evaluation of a system that provably hides both access pattern and communication volume while remaining efficient. The work concludes with k-anon – a secure similarity search engine in a snapshot adversary model. The work presents a construction in which the security of kNN queries is achieved similarly to OPE / ORE solutions – encrypting the input with an approximate Distance Comparison Preserving Encryption scheme so that the inputs, the points in a hyperspace, are perturbed, but the query algorithm still produces accurate results. We use TREC datasets and queries for the search, and track the rank quality metrics such as MRR and nDCG. For the attacks, we build an LSTM model that trains on the correlation between a sentence and its embedding and then predicts words from the embedding.

READ FULL TEXT
research
02/04/2018

Secure Range Queries for Multiple Users

Order-preserving encryption allows encrypting data, while still enabling...
research
04/27/2020

Obscure: Information-Theoretically Secure, Oblivious, and Verifiable Aggregation Queries on Secret-Shared Outsourced Data – Full Version

Despite exciting progress on cryptography, secure and efficient query pr...
research
10/07/2020

Hiding the Access Pattern is Not Enough: Exploiting Search Pattern Leakage in Searchable Encryption

Recent Searchable Symmetric Encryption (SSE) schemes enable secure searc...
research
03/17/2021

Secure Hypersphere Range Query on Encrypted Data

Spatial queries like range queries, nearest neighbor, circular range que...
research
06/27/2023

A Highly Accurate Query-Recovery Attack against Searchable Encryption using Non-Indexed Documents

Cloud data storage solutions offer customers cost-effective and reduced ...
research
11/03/2017

A Searchable Symmetric Encryption Scheme using BlockChain

At present, the cloud storage used in searchable symmetric encryption sc...
research
11/20/2021

CINNAMON: A Module for AUTOSAR Secure Onboard Communication

This paper introduces CINNAMON, a software module that extends and seaml...

Please sign up or login with your details

Forgot password? Click here to reset