Frequency-hiding Dependency-preserving Encryption for Outsourced Databases
ICDE’17 Boxiang Dong 1 Wendy Wang 2
1Montclair State University
Montclair, NJ
2Stevens Institute of Technology
Hoboken, NJ
Frequency-hiding Dependency-preserving Encryption for Outsourced - - PowerPoint PPT Presentation
Frequency-hiding Dependency-preserving Encryption for Outsourced Databases ICDE17 Boxiang Dong 1 Wendy Wang 2 1 Montclair State University Montclair, NJ 2 Stevens Institute of Technology Hoboken, NJ April 20, 2017
1Montclair State University
Montclair, NJ
2Stevens Institute of Technology
Hoboken, NJ
2 / 47
3 / 47
4 / 47
FA-Attack(P, E)
ID A B C r1 a1 b1 c1 r2 a1 b1 c2 r3 a1 b1 c4 r4 a1 b1 c3 r5 a2 b2 c3 r6 a2 b2 c4 ID A B C r1 ˆ a1 ˆ b1 ˆ c1 r2 ˆ a1 ˆ b1 ˆ c2 r3 ˆ a1 ˆ b1 ˆ c4 r4 ˆ a1 ˆ b1 ˆ c3 r5 ˆ a2 ˆ b2 ˆ c3 r6 ˆ a2 ˆ b2 ˆ c4 (a) Base table D (A → B (b) ˆ D1: deterministic encryption A → C, B → C)
5 / 47
ID A B C r1 ˆ a1
1
ˆ b1
1
ˆ c1
1
r2 ˆ a2
1
ˆ b2
1
ˆ c1
2
r3 ˆ a3
1
ˆ b3
1
ˆ c2
4
r4 ˆ a4
1
ˆ b4
1
ˆ c1
3
r5 ˆ a1
2
ˆ b1
2
ˆ c2
3
r6 ˆ a1
2
ˆ b2
2
ˆ c1
4
ID A B C r1 ˆ a1
1
ˆ b1
1
ˆ c1
1
r2 ˆ a2
1
ˆ b2
1
ˆ c2
2
r3 ˆ a3
1
ˆ b3
1
ˆ c3
4
r4 ˆ a4
1
ˆ b4
1
ˆ c4
3
r5 ˆ a5
2
ˆ b5
2
ˆ c5
3
r6 ˆ a6
2
ˆ b6
2
ˆ c6
4
(c) ˆ D2: probabilistic encryption (d) ˆ D3: probabilistic encryption
Original FD A → B destroyed False positive FD A → C introduced
6 / 47
$
7 / 47
8 / 47
1 Introduction 2 Related Work 3 Security Model 4 Encryption Scheme
5 Experiments 6 Conclusion
9 / 47
10 / 47
Π ()
Π (A) = Prob(ExpFA Π (A) = 1) measures the success rate of
Π (A) ≤ α, where α ∈ (0, 1] is
11 / 47
$
Π
12 / 47
Π
Π
Π
13 / 47
D Step 1. Identifying Maximal Attribute Sets
14 / 47
Step 1. Identifying Maximal Attribute Sets Step 2. Splitting-and- Scaling Encryption D
15 / 47
Step 1. Identifying Maximal Attribute Sets Step 2. Splitting-and- Scaling Encryption D
16 / 47
Step 1. Identifying Maximal Attribute Sets Step 2. Splitting-and- Scaling Encryption D
17 / 47
Step 1. Identifying Maximal Attribute Sets Step 2. Splitting-and- Scaling Encryption Step 3. Conflict Resolution ¯ D D
18 / 47
Step 1. Identifying Maximal Attribute Sets Step 2. Splitting-and- Scaling Encryption Step 3. Conflict Resolution Step 4. Eliminating False Positive FDs ¯ D ∆D ˆ D D
19 / 47
20 / 47
21 / 47
22 / 47
ID A B C r1 a2 b1 c1 r2 a1 b1 c1 r3 a1 b1 c2 r4 a3 b1 c2 r5 a4 b2 c2 r6 a5 b2 c3
23 / 47
ID A B C r1 a2 b1 c1 r2 a1 b1 c1 r3 a1 b1 c2 r4 a3 b1 c2 r5 a4 b2 c2 r6 a5 b2 c3
24 / 47
ID A B C r1 a2 b1 c1 r2 a1 b1 c1 r3 a1 b1 c2 r4 a3 b1 c2 r5 a4 b2 c2 r6 a5 b2 c3
25 / 47
ID B C r1 b1 c1 r2 b1 c1 r3 b1 c2 r4 b1 c2 r5 b2 c2 r6 b2 c3
26 / 47
α
ID B C r1 b1 c1 r2 b1 c1 r3 b1 c2 r4 b1 c2 r5 b2 c2 r6 b2 c3
2
27 / 47
α
ID B C r1 b1 c1 r2 b1 c1 r3 b1 c2 r4 b1 c2 r5 b2 c2 r6 b2 c3
split split
ˆ b1
1
ˆ c1
1
ˆ b2
1
ˆ c2
1
ˆ b3
1
ˆ c1
2
ˆ b4
1
ˆ c2
2
28 / 47
ID B C r1 b1 c1 r2 b1 c1 r3 b1 c2 r4 b1 c2 r5 b2 c2 r6 b2 c3
split split
ˆ b1
1
ˆ c1
1
ˆ b2
1
ˆ c2
1
ˆ b3
1
ˆ c1
2
ˆ b4
1
ˆ c2
2
29 / 47
ID B C r1 b1 c1 r2 b1 c1 r3 b1 c2 r4 b1 c2 r5 b2 c2 r6 b2 c3
split split
ˆ b1
1
ˆ c1
1
ˆ b2
1
ˆ c2
1
ˆ b3
1
ˆ c1
2
ˆ b4
1
ˆ c2
2
30 / 47
ID B C r1 b1 c1 r2 b1 c1 r3 b1 c2 r4 b1 c2 r5 b2 c2 r6 b2 c3 ID B C r1 ˆ b1
1
ˆ c1
1
r2 ˆ b2
1
ˆ c2
1
r3 ˆ b3
1
ˆ c1
2
r4 ˆ b4
1
ˆ c2
2
r5 ˆ b1
2
ˆ c3
2
r6 ˆ b2
2
ˆ c1
3
31 / 47
ID A B r1 ˆ a1
2
ˆ b1
1
r2 ˆ a1
1
ˆ b2
1
r3 ˆ a1
1
ˆ b2
1
r4 ˆ a1
3
ˆ b4
1
r5 ˆ a1
4
ˆ b1
2
r6 ˆ a1
5
ˆ b2
2
ID B C r1 ˆ b1
1
ˆ c1
1
r2 ˆ b2
1
ˆ c2
1
r3 ˆ b3
1
ˆ c1
2
r4 ˆ b4
1
ˆ c2
2
r5 ˆ b1
2
ˆ c3
2
r6 ˆ b2
2
ˆ c1
3
32 / 47
ID A B r1 ˆ a1
2
ˆ b1
1
r2 ˆ a1
1
ˆ b2
1
r3 ˆ a1
1
ˆ b2
1
r4 ˆ a1
3
ˆ b4
1
r5 ˆ a1
4
ˆ b1
2
r6 ˆ a1
5
ˆ b2
2
ID B C r1 ˆ b1
1
ˆ c1
1
r2 ˆ b2
1
ˆ c2
1
r3 ˆ b3
1
ˆ c1
2
r4 ˆ b4
1
ˆ c2
2
r5 ˆ b1
2
ˆ c3
2
r6 ˆ b2
2
ˆ c1
3
ID A B C r1 ˆ a1
2
ˆ b1
1
ˆ c1
1
r2 ˆ a1
1
ˆ b2
1
ˆ c1
1
r3 ˆ a1
1
ˆ b2
1 / ˆ
b3
1
ˆ c1
2
r4 ˆ a1
3
ˆ b4
1
ˆ c2
2
r5 ˆ a1
4
ˆ b1
2
ˆ c3
2
r6 ˆ a1
5
ˆ b2
2
ˆ c1
3
33 / 47
ID A B C r1 ˆ a1
2
ˆ b1
1
ˆ c1
1
r2 ˆ a1
1
ˆ b2
1
ˆ c1
1
r3 ˆ a1
1
ˆ b2
1 / ˆ
b3
1
ˆ c1
2
r4 ˆ a1
3
ˆ b4
1
ˆ c2
2
r5 ˆ a1
4
ˆ b1
2
ˆ c3
2
r6 ˆ a1
5
ˆ b2
2
ˆ c1
3
ID A B C r1 ˆ a1
2
ˆ b1
1
ˆ c1
1
r2 ˆ a1
1
ˆ b2
1
ˆ c1
1
r3 ˆ a1
1
ˆ b2
1
ˆ c4
2
r4 ˆ a1
3
ˆ b4
1
ˆ c2
2
r5 ˆ a1
4
ˆ b1
2
ˆ c3
2
r6 ˆ a1
5
ˆ b2
2
ˆ c1
3
r7 ˆ a2
1
ˆ b3
1
ˆ c1
2
34 / 47
ID A B C r1 a2 b1 c1 r2 a1 b1 c1 r3 a1 b1 c2 r4 a3 b1 c2 r5 a4 b2 c2 r6 a5 b2 c3 ID A B C r1 ˆ a1
2
ˆ b1
1
ˆ c1
1
r2 ˆ a1
1
ˆ b2
1
ˆ c1
1
r3 ˆ a1
1
ˆ b2
1
ˆ c4
2
r4 ˆ a1
3
ˆ b4
1
ˆ c2
2
r5 ˆ a1
4
ˆ b1
2
ˆ c3
2
r6 ˆ a1
5
ˆ b2
2
ˆ c1
3
r7 ˆ a2
1
ˆ b3
1
ˆ c1
2
35 / 47
ID A B C r1 a2 b1 c1 r2 a1 b1 c1 r3 a1 b1 c2 r4 a3 b1 c2 r5 a4 b2 c2 r6 a5 b2 c3
ID A B C r1 ˆ a1
2
ˆ b1
1
ˆ c1
1
r2 ˆ a1
1
ˆ b2
1
ˆ c1
1
r3 ˆ a1
1
ˆ b2
1
ˆ c4
2
r4 ˆ a1
3
ˆ b4
1
ˆ c2
2
r5 ˆ a1
4
ˆ b1
2
ˆ c3
2
r6 ˆ a1
5
ˆ b2
2
ˆ c1
3
r7 ˆ a2
1
ˆ b3
1
ˆ c1
2
r8 ˆ a3 ˆ b3 ˆ c4 r9 ˆ a4 ˆ b3 ˆ c5
36 / 47
37 / 47
F 2 (A) ≤ α.
F 2
g ,
F 2
38 / 47
39 / 47
2 4 6 8 10 1 / 5 1 / 1 1 / 1 5 1 / 2 1 / 2 5 Time (Minute) α value SSE SYN MAX FP 10 20 30 40 50 60 70 80 0.325 0.653 0.981 1.309 1.637 Time (Minute) Data Size (GB) SSE SYN MAX FP 1 10 100 1000 0.325 0.653 0.981 1.309 1.637 Time (Minute) Data Size (GB) F2 AES Paillier
(a) Various α values (b) Various data sizes (c) Comparison with baselines
40 / 47
41 / 47
42 / 47
[B+07] Philip Bohannon et al. Conditional functional dependencies for data cleaning. In IEEE International Conference on Data Engineering, pages 746–755, 2007. [B+09] Mihir Bellare et al. Format-preserving encryption. In International Workshop on Selected Areas in Cryptography, pages 295–312, 2009. [B+11] Alexandra Boldyreva et al. Order-preserving encryption revisited: Improved security analysis and alternative solutions. In Annual Cryptology Conference, pages 578–595, 2011. [BFFR05] Philip Bohannon, Wenfei Fan, Michael Flaster, and Rajeev Rastogi. A cost-based model and effective heuristic for repairing constraints by value modification. In Proceedings of the International Conference on Management of Data, pages 143–154, 2005. [G+06] Vipul Goyal et al. Attribute-based encryption for fine-grained access control of encrypted data. In Conference on Computer and Communications Security, pages 89–98, 2006. [H+02a] Hakan Hacigumus et al. Executing sql over encrypted data in the database-service-provider model. In ACM International Conference on Management of Data, pages 216–227, 2002. [H+02b] Hakan Hacigumus et al. Providing database as a service. In IEEE International Conference on Data Engineering, pages 29–38, 2002. 43 / 47
[H+13] Arvid Heise et al. Scalable discovery of unique column combinations. Proceedings of Very Large Database Endowment, pages 301–312, 2013. [I+12] Mohammad Saiful Islam et al. Access pattern disclosure on searchable encryption: Ramification, attack and mitigation. In Network and Distributed System Security Symposium, pages 12–23, 2012. [Ker15] Florian Kerschbaum. Frequency-hiding order-preserving encryption. In ACM Conference on Computer and Communications Security, pages 656–667, 2015. [N+15] Muhammad Naveed et al. Inference attacks on property-preserving encrypted databases. In ACM Conference on Computer and Communications Security, pages 644–655, 2015. [P+12] Raluca Ada Popa et al. Cryptdb: Processing queries on an encrypted database. Communications of the ACM, pages 103–111, 2012. [PR12] Omkant Pandey and Yannis Rouselakis. Property preserving symmetric encryption. In International Conference on the Theory and Applications of Cryptographic Techniques, pages 375–391, 2012. [S+00] Dawn Xiaoding Song et al. Practical techniques for searches on encrypted data. In IEEE Symposium on Security and Privacy, pages 44–55, 2000. 44 / 47
[T+11] Nilothpal Talukder et al. Detecting inconsistencies in private data with secure function evaluation. Technical report, Purdue University, 2011. 45 / 47
0.005 0.01 0.015 0.02 0.025 0.03 0.035 0.04 0.045 0.05 1 1 / 2 1 / 3 1 / 4 1 / 5 1 / 6 1 / 7 1 / 8 1 / 9 1 / 1 Overhead α value SYN SCALE GROUP FP 0.02 0.04 0.06 0.08 0.1 0.12 17 35 73 149 291 585 Overhead Data Size (MB) SYN SCALE GROUP FP
(a) Various α values (b) Various data sizes
D|−|D| |D|
47 / 47