Frequency-hiding Dependency-preserving Encryption for Outsourced - - PowerPoint PPT Presentation

frequency hiding dependency preserving encryption for
SMART_READER_LITE
LIVE PREVIEW

Frequency-hiding Dependency-preserving Encryption for Outsourced - - PowerPoint PPT Presentation

Frequency-hiding Dependency-preserving Encryption for Outsourced Databases ICDE17 Boxiang Dong 1 Wendy Wang 2 1 Montclair State University Montclair, NJ 2 Stevens Institute of Technology Hoboken, NJ April 20, 2017


slide-1
SLIDE 1

Frequency-hiding Dependency-preserving Encryption for Outsourced Databases

ICDE’17 Boxiang Dong 1 Wendy Wang 2

1Montclair State University

Montclair, NJ

2Stevens Institute of Technology

Hoboken, NJ

April 20, 2017

slide-2
SLIDE 2

Data-Management-as-a-Service (DMaS)

D Data Owner Server

  • Data owner with limited computational resources
  • Computationally powerful server (e.g. cloud)
  • Outsourcing provides a cost-effective solution for data

management.

2 / 47

slide-3
SLIDE 3

Functional Dependency (FD)

Definition A FD X → Y states that for any records r1 and r2, r1[X] = r2[X] demands that r1[Y ] = r2[Y ]. Applications

  • Data schema improvement via normalization
  • Data inconsistency repair

3 / 47

slide-4
SLIDE 4

Outsourcing Requirement

Data Owner Malicious Server

Privacy Concern

  • Protect the sensitive information from untrusted

server.

  • Encrypt the dataset before outsourcing.

Utility Concern

  • Support FD-based applications.
  • The encryption scheme should preserve FDs.

4 / 47

slide-5
SLIDE 5

Challenges

Directly applying deterministic encryption (e.g. RSA) is vulnerable against the frequency-analysis attack (FA attack) [N+15].

FA-Attack(P, E)

  • 1. compute π ← vSort(Hist(P))
  • 2. compute ϕ ← vSort(Hist(E))
  • 3. foreach e ∈ E
  • utput p if Rankϕ(e) = Rankπ(p)

ID A B C r1 a1 b1 c1 r2 a1 b1 c2 r3 a1 b1 c4 r4 a1 b1 c3 r5 a2 b2 c3 r6 a2 b2 c4 ID A B C r1 ˆ a1 ˆ b1 ˆ c1 r2 ˆ a1 ˆ b1 ˆ c2 r3 ˆ a1 ˆ b1 ˆ c4 r4 ˆ a1 ˆ b1 ˆ c3 r5 ˆ a2 ˆ b2 ˆ c3 r6 ˆ a2 ˆ b2 ˆ c4 (a) Base table D (A → B (b) ˆ D1: deterministic encryption A → C, B → C)

5 / 47

slide-6
SLIDE 6

Challenges

Applying probabilistic encryption may destroy original FDs or introduce false positive FDs.

ID A B C r1 ˆ a1

1

ˆ b1

1

ˆ c1

1

r2 ˆ a2

1

ˆ b2

1

ˆ c1

2

r3 ˆ a3

1

ˆ b3

1

ˆ c2

4

r4 ˆ a4

1

ˆ b4

1

ˆ c1

3

r5 ˆ a1

2

ˆ b1

2

ˆ c2

3

r6 ˆ a1

2

ˆ b2

2

ˆ c1

4

ID A B C r1 ˆ a1

1

ˆ b1

1

ˆ c1

1

r2 ˆ a2

1

ˆ b2

1

ˆ c2

2

r3 ˆ a3

1

ˆ b3

1

ˆ c3

4

r4 ˆ a4

1

ˆ b4

1

ˆ c4

3

r5 ˆ a5

2

ˆ b5

2

ˆ c5

3

r6 ˆ a6

2

ˆ b6

2

ˆ c6

4

(c) ˆ D2: probabilistic encryption (d) ˆ D3: probabilistic encryption

  • n A, B, C individually
  • n (A, B, C)

Original FD A → B destroyed False positive FD A → C introduced

6 / 47

slide-7
SLIDE 7

Challenges

The FD-preserving property introduces new inference attack [PR12]. (D0, FD0), (D1, FD1) FD-preserving CPA-secure cipher Db s.t. b

$

← − {0, 1} b′ =

  • if FD0 holds on ˆ

Db 1

  • therwise

ˆ Db

7 / 47

slide-8
SLIDE 8

Our Contributions

Security Definition

  • α − security against FA-attack
  • Indistinguishability against FD-preserving chosen

plaintext attack (IND-FCPA)

Encryption Scheme We design F 2, a frequency-hiding, FD-preserving encryption scheme based on probabilistic encryption.

8 / 47

slide-9
SLIDE 9

Outline

1 Introduction 2 Related Work 3 Security Model 4 Encryption Scheme

  • Step 1: Identifying Maximum Attribute Sets
  • Step 2: Splitting-and-Scaling Encryption
  • Step 3: Conflict Resolution
  • Step 4. Eliminating False Positive FDs

5 Experiments 6 Conclusion

9 / 47

slide-10
SLIDE 10

Related Work

Privacy-preserving outsourced computing

  • Data encoding [H+02a, H+02b]
  • Data encryption [S+00, P+12]
  • Property-preserving encryption [Ker15, B+11, G+06, B+09]

Inference attack

  • FA attack [N+15]
  • Query-recovery attack [I+12]

FD applications

  • Data cleaning [T+11]
  • Schema design [BFFR05, B+07]

10 / 47

slide-11
SLIDE 11

Security Model

Experiment ExpF A

Π ()

p′ ← AfreqE(e),freq(P) Return 1 if p′ = Decrypt(k, e) Return 0 otherwise

Adv FA

Π (A) = Prob(ExpFA Π (A) = 1) measures the success rate of

FA attack. Definition (α-security against FA Attack) An encryption scheme Π is α-secure against FA if for every adversary A it holds that Adv FA

Π (A) ≤ α, where α ∈ (0, 1] is

user specified.

11 / 47

slide-12
SLIDE 12

Security Model

The server may exploit the FDs to break the cipher.

b′ (D0, FD), (D1, FD), |D0| = |D1| An encryption scheme Π Db s.t. b

$

← − {0, 1} ˆ Db Experiment ExpF CP A

Π

() b = b′ 1

  • therwise

12 / 47

slide-13
SLIDE 13

Security Model

Adv FCPA

Π

(A) = Prob(ExpFCPA

Π

(A) = 1) − 1/2 measures the advantage of the FCPA-attack over a random guess. Definition (Indistinguishability against FD- preserving Chosen Plaintext Attack (IND-FCPA)) An encryption scheme Π is IND-FCPA if for any polynomial-time adversary A, it holds that the advantage is negligible in λ, i.e., Adv FCPA

Π

(A) = negl(λ), where λ is a pre-defined security parameter.

13 / 47

slide-14
SLIDE 14

F 2 Encryption Scheme - Overview

F 2, a frequency-hiding FD-preserving encryption scheme, consists of four steps.

D Step 1. Identifying Maximal Attribute Sets

14 / 47

slide-15
SLIDE 15

F 2 Encryption Scheme - Overview

F 2, a frequency-hiding FD-preserving encryption scheme, consists of four steps.

Step 1. Identifying Maximal Attribute Sets Step 2. Splitting-and- Scaling Encryption D

15 / 47

slide-16
SLIDE 16

F 2 Encryption Scheme - Overview

F 2, a frequency-hiding FD-preserving encryption scheme, consists of four steps.

Step 1. Identifying Maximal Attribute Sets Step 2. Splitting-and- Scaling Encryption D

16 / 47

slide-17
SLIDE 17

F 2 Encryption Scheme - Overview

F 2, a frequency-hiding FD-preserving encryption scheme, consists of four steps.

Step 1. Identifying Maximal Attribute Sets Step 2. Splitting-and- Scaling Encryption D

17 / 47

slide-18
SLIDE 18

F 2 Encryption Scheme - Overview

F 2, a frequency-hiding FD-preserving encryption scheme, consists of four steps.

Step 1. Identifying Maximal Attribute Sets Step 2. Splitting-and- Scaling Encryption Step 3. Conflict Resolution ¯ D D

18 / 47

slide-19
SLIDE 19

F 2 Encryption Scheme - Overview

F 2, a frequency-hiding FD-preserving encryption scheme, consists of four steps.

Step 1. Identifying Maximal Attribute Sets Step 2. Splitting-and- Scaling Encryption Step 3. Conflict Resolution Step 4. Eliminating False Positive FDs ¯ D ∆D ˆ D D

19 / 47

slide-20
SLIDE 20

Step 1 - Identifying Maximal Attribute Sets

Theorem Given a dataset D and a FD X → Y , if we apply probabilistic encryption scheme on attribute set A and get ˆ D, then ˆ D preserves X → Y if (X ∪ Y ) ⊆ A.

20 / 47

slide-21
SLIDE 21

Step 1 - Identifying Maximal Attribute Sets

Definition (Maximum Attribute Set (MAS)) Given a dataset D, an attribute set A is a MAS if: (1) there exists at least an instance of A whose number of

  • ccurrences is larger than 1; and

(2) no superset of A satisfies this requirement.

21 / 47

slide-22
SLIDE 22

Step 1 - Identifying Maximal Attribute Sets

Lemma Given a dataset D and a FD X → Y , there must exist at least a MAS M such that (X ∪ Y ) ⊆ M.

22 / 47

slide-23
SLIDE 23

Step 1 - Identifying Maximal Attribute Sets

  • To preserve FDs, we need to find the MASs from the

dataset.

  • We adapt an efficient solution named Ducc [H+13].
  • The complexity is much lower than FD discovery.

ID A B C r1 a2 b1 c1 r2 a1 b1 c1 r3 a1 b1 c2 r4 a3 b1 c2 r5 a4 b2 c2 r6 a5 b2 c3

FD : A → B

23 / 47

slide-24
SLIDE 24

Step 1 - Identifying Maximal Attribute Sets

  • To preserve FDs, we need to find the MASs from the

dataset.

  • We adapt an efficient solution named Ducc [H+13].
  • The complexity is much lower than FD discovery.

FD : A → B

ID A B C r1 a2 b1 c1 r2 a1 b1 c1 r3 a1 b1 c2 r4 a3 b1 c2 r5 a4 b2 c2 r6 a5 b2 c3

MAS = {AB, BC}

24 / 47

slide-25
SLIDE 25

Step 1 - Identifying Maximal Attribute Sets

  • To preserve FDs, we need to find the MASs from the

dataset.

  • We adapt an efficient solution named Ducc [H+13].
  • The complexity is much lower than FD discovery.

ID A B C r1 a2 b1 c1 r2 a1 b1 c1 r3 a1 b1 c2 r4 a3 b1 c2 r5 a4 b2 c2 r6 a5 b2 c3

MAS = {AB, BC} FD : A → B

25 / 47

slide-26
SLIDE 26

Step 2 - Splitting-and-Scaling Encryption

for all MAS do Construct equivalence classes (ECs) end for

ID B C r1 b1 c1 r2 b1 c1 r3 b1 c2 r4 b1 c2 r5 b2 c2 r6 b2 c3

C1 C2 C3 C4

26 / 47

slide-27
SLIDE 27

Step 2 - Splitting-and-Scaling Encryption

for all MAS do Construct equivalence classes (ECs) Organize ECs into collision-free groups of size at least 1

α

end for

ID B C r1 b1 c1 r2 b1 c1 r3 b1 c2 r4 b1 c2 r5 b2 c2 r6 b2 c3

C1 C2 C3 C4 ECG1 ECG2 α = 1

2

27 / 47

slide-28
SLIDE 28

Step 2 - Splitting-and-Scaling Encryption

for all MAS do Construct equivalence classes (ECs) Organize ECs into collision-free groups of size at least 1

α

Apply splitting and scaling to reach the same frequency end for

Splitting Split a EC into ω copies with the same frequency. Scaling Duplicate a EC to reach frequency homogenization.

ID B C r1 b1 c1 r2 b1 c1 r3 b1 c2 r4 b1 c2 r5 b2 c2 r6 b2 c3

C1 C2 C3 C4

split split

ˆ b1

1

ˆ c1

1

ˆ b2

1

ˆ c2

1

ˆ b3

1

ˆ c1

2

ˆ b4

1

ˆ c2

2

28 / 47

slide-29
SLIDE 29

Step 2 - Splitting-and-Scaling Encryption

for all MAS do Construct equivalence classes (ECs) Organize ECs into collision-free groups Apply splitting and scaling to reach the same frequency end for We design an algorithm to decide the splitting and scaling strategy to minimize the amount of duplications.

ID B C r1 b1 c1 r2 b1 c1 r3 b1 c2 r4 b1 c2 r5 b2 c2 r6 b2 c3

C1 C2 C3 C4

split split

ˆ b1

1

ˆ c1

1

ˆ b2

1

ˆ c2

1

ˆ b3

1

ˆ c1

2

ˆ b4

1

ˆ c2

2

29 / 47

slide-30
SLIDE 30

Step 2 - Splitting-and-Scaling Encryption

for all MAS do Construct equivalence classes (ECs) Organize ECs into collision-free groups Apply splitting and scaling to reach the same frequency Encrypt each EC end for For each unique plaintext value p, it is encrypted as e =< r, Fk(r) ⊕ p >, where r is a random value, and Fk is a pseudorandom function.

ID B C r1 b1 c1 r2 b1 c1 r3 b1 c2 r4 b1 c2 r5 b2 c2 r6 b2 c3

C1 C2 C3 C4

split split

ˆ b1

1

ˆ c1

1

ˆ b2

1

ˆ c2

1

ˆ b3

1

ˆ c1

2

ˆ b4

1

ˆ c2

2

30 / 47

slide-31
SLIDE 31

Step 2 - Splitting-and-Scaling Encryption

for all MAS do Construct equivalence classes (ECs) Organize ECs into collision-free groups Apply splitting and scaling to reach the same frequency Encrypt each EC end for

ID B C r1 b1 c1 r2 b1 c1 r3 b1 c2 r4 b1 c2 r5 b2 c2 r6 b2 c3 ID B C r1 ˆ b1

1

ˆ c1

1

r2 ˆ b2

1

ˆ c2

1

r3 ˆ b3

1

ˆ c1

2

r4 ˆ b4

1

ˆ c2

2

r5 ˆ b1

2

ˆ c3

2

r6 ˆ b2

2

ˆ c1

3

31 / 47

slide-32
SLIDE 32

Step 3 - Conflict Resolution

  • In Step 2, we apply encryption to each MAS

independently.

ID A B r1 ˆ a1

2

ˆ b1

1

r2 ˆ a1

1

ˆ b2

1

r3 ˆ a1

1

ˆ b2

1

r4 ˆ a1

3

ˆ b4

1

r5 ˆ a1

4

ˆ b1

2

r6 ˆ a1

5

ˆ b2

2

Enc(D[AB])

ID B C r1 ˆ b1

1

ˆ c1

1

r2 ˆ b2

1

ˆ c2

1

r3 ˆ b3

1

ˆ c1

2

r4 ˆ b4

1

ˆ c2

2

r5 ˆ b1

2

ˆ c3

2

r6 ˆ b2

2

ˆ c1

3

Enc(D[BC])

32 / 47

slide-33
SLIDE 33

Step 3 - Conflict Resolution

  • In Step 2, we apply encryption to each MAS

independently.

  • However, there may exist conflicts between different

MASs.

ID A B r1 ˆ a1

2

ˆ b1

1

r2 ˆ a1

1

ˆ b2

1

r3 ˆ a1

1

ˆ b2

1

r4 ˆ a1

3

ˆ b4

1

r5 ˆ a1

4

ˆ b1

2

r6 ˆ a1

5

ˆ b2

2

Enc(D[AB])

ID B C r1 ˆ b1

1

ˆ c1

1

r2 ˆ b2

1

ˆ c2

1

r3 ˆ b3

1

ˆ c1

2

r4 ˆ b4

1

ˆ c2

2

r5 ˆ b1

2

ˆ c3

2

r6 ˆ b2

2

ˆ c1

3

Enc(D[BC])

ID A B C r1 ˆ a1

2

ˆ b1

1

ˆ c1

1

r2 ˆ a1

1

ˆ b2

1

ˆ c1

1

r3 ˆ a1

1

ˆ b2

1 / ˆ

b3

1

ˆ c1

2

r4 ˆ a1

3

ˆ b4

1

ˆ c2

2

r5 ˆ a1

4

ˆ b1

2

ˆ c3

2

r6 ˆ a1

5

ˆ b2

2

ˆ c1

3

33 / 47

slide-34
SLIDE 34

Step 3 - Conflict Resolution

  • In Step 2, we apply encryption to each MAS

independently.

  • However, there may exist conflicts between different

MASs.

  • We design an efficient algorithm to resolve the conflicts.

ID A B C r1 ˆ a1

2

ˆ b1

1

ˆ c1

1

r2 ˆ a1

1

ˆ b2

1

ˆ c1

1

r3 ˆ a1

1

ˆ b2

1 / ˆ

b3

1

ˆ c1

2

r4 ˆ a1

3

ˆ b4

1

ˆ c2

2

r5 ˆ a1

4

ˆ b1

2

ˆ c3

2

r6 ˆ a1

5

ˆ b2

2

ˆ c1

3

ID A B C r1 ˆ a1

2

ˆ b1

1

ˆ c1

1

r2 ˆ a1

1

ˆ b2

1

ˆ c1

1

r3 ˆ a1

1

ˆ b2

1

ˆ c4

2

r4 ˆ a1

3

ˆ b4

1

ˆ c2

2

r5 ˆ a1

4

ˆ b1

2

ˆ c3

2

r6 ˆ a1

5

ˆ b2

2

ˆ c1

3

r7 ˆ a2

1

ˆ b3

1

ˆ c1

2

34 / 47

slide-35
SLIDE 35

Step 4 - Eliminating False Positive FDs

  • Step 1 - 3 may introduce false positive FDs.

ID A B C r1 a2 b1 c1 r2 a1 b1 c1 r3 a1 b1 c2 r4 a3 b1 c2 r5 a4 b2 c2 r6 a5 b2 c3 ID A B C r1 ˆ a1

2

ˆ b1

1

ˆ c1

1

r2 ˆ a1

1

ˆ b2

1

ˆ c1

1

r3 ˆ a1

1

ˆ b2

1

ˆ c4

2

r4 ˆ a1

3

ˆ b4

1

ˆ c2

2

r5 ˆ a1

4

ˆ b1

2

ˆ c3

2

r6 ˆ a1

5

ˆ b2

2

ˆ c1

3

r7 ˆ a2

1

ˆ b3

1

ˆ c1

2

FD :A → B B → A FD : A → B

35 / 47

slide-36
SLIDE 36

Step 4 - Eliminating False Positive FDs

  • Step 1 - 3 may introduce false positive (FP) FDs.
  • We search for the FP FDs by following the attribute set

lattice.

  • To break a FP FD X → Y , we insert two artificial tuples
  • r1[X] = r2[X]
  • r1[Y ] = r2[Y ]

ID A B C r1 a2 b1 c1 r2 a1 b1 c1 r3 a1 b1 c2 r4 a3 b1 c2 r5 a4 b2 c2 r6 a5 b2 c3

FD : A → B

ID A B C r1 ˆ a1

2

ˆ b1

1

ˆ c1

1

r2 ˆ a1

1

ˆ b2

1

ˆ c1

1

r3 ˆ a1

1

ˆ b2

1

ˆ c4

2

r4 ˆ a1

3

ˆ b4

1

ˆ c2

2

r5 ˆ a1

4

ˆ b1

2

ˆ c3

2

r6 ˆ a1

5

ˆ b2

2

ˆ c1

3

r7 ˆ a2

1

ˆ b3

1

ˆ c1

2

r8 ˆ a3 ˆ b3 ˆ c4 r9 ˆ a4 ˆ b3 ˆ c5

ˆ D

36 / 47

slide-37
SLIDE 37

FD-preserving Property

Theorem (FD-preserving Property) Given any dataset D, let ˆ D be the encrypted dataset using Step 1 - 4, it must be true that the FDs on D and ˆ D are exactly the same.

37 / 47

slide-38
SLIDE 38

Security Analysis - FD

Theorem (α-Security against FA Attack) F 2 provides α-security against the FA attack, i.e., Adv FA

F 2 (A) ≤ α.

Theorem (Security against FCPA Attack) The advantage of FCPA attack against F 2 is Adv FCPA

F 2

(A) = 1

g ,

where g is the minimum number of equivalence classes in a MAS that have the same value on X, Y , and X → Y is a valid FD. In practice, Adv FCPA

F 2

(A) is very small. (g = 5, 000, 000 for a dataset with 15 million tuples).

38 / 47

slide-39
SLIDE 39

Experiments

Testbed 2.5GHz CPU, 60GB RAM, Linux Datasets

  • Customer dataset from TPC-C benchmark
  • 906K tuples
  • 21 attributes
  • Orders dataset from TPC-H benchmark
  • 1.5 million tuples
  • 9 attributes

Baseline Deterministic AES Probabilistic Paillier Property-preserving FHOP [Ker15] (frequency-hiding order-preserving)

39 / 47

slide-40
SLIDE 40

Time Performance

Time Performance (Orders Dataset)

2 4 6 8 10 1 / 5 1 / 1 1 / 1 5 1 / 2 1 / 2 5 Time (Minute) α value SSE SYN MAX FP 10 20 30 40 50 60 70 80 0.325 0.653 0.981 1.309 1.637 Time (Minute) Data Size (GB) SSE SYN MAX FP 1 10 100 1000 0.325 0.653 0.981 1.309 1.637 Time (Minute) Data Size (GB) F2 AES Paillier

(a) Various α values (b) Various data sizes (c) Comparison with baselines

  • Time performance keeps stable with various α values.
  • Time performance is subquadratic to the data size.
  • F 2 is as efficient as AES, a deterministic encryption scheme.

40 / 47

slide-41
SLIDE 41

Security Against FA Attack

Security against FA Attack Approach Attack Accuracy F 2(α = 0.02) 0.01417 F 2(α = 0.05) 0.03192 F 2(α = 0.1) 0.0719 F 2(α = 0.25) 0.1056 FHOP 0.1214 Paillier 0.1002 AES 0.3395

  • Attack accuracy is the fraction of ciphertext that are

successfully recovered.

  • F 2 provides strong security even for a weak security guarantee

(α = 0.25).

41 / 47

slide-42
SLIDE 42

Conclusion

We design an efficient frequency-hiding FD-preserving encryption scheme, F 2, that:

  • Preserves the FDs without requiring the awareness of

them.

  • Guarantees α-security against FA attack.
  • Provides strong security against the FCPA attack.

In the future, we aim at supporting efficient data update.

42 / 47

slide-43
SLIDE 43

References I

[B+07] Philip Bohannon et al. Conditional functional dependencies for data cleaning. In IEEE International Conference on Data Engineering, pages 746–755, 2007. [B+09] Mihir Bellare et al. Format-preserving encryption. In International Workshop on Selected Areas in Cryptography, pages 295–312, 2009. [B+11] Alexandra Boldyreva et al. Order-preserving encryption revisited: Improved security analysis and alternative solutions. In Annual Cryptology Conference, pages 578–595, 2011. [BFFR05] Philip Bohannon, Wenfei Fan, Michael Flaster, and Rajeev Rastogi. A cost-based model and effective heuristic for repairing constraints by value modification. In Proceedings of the International Conference on Management of Data, pages 143–154, 2005. [G+06] Vipul Goyal et al. Attribute-based encryption for fine-grained access control of encrypted data. In Conference on Computer and Communications Security, pages 89–98, 2006. [H+02a] Hakan Hacigumus et al. Executing sql over encrypted data in the database-service-provider model. In ACM International Conference on Management of Data, pages 216–227, 2002. [H+02b] Hakan Hacigumus et al. Providing database as a service. In IEEE International Conference on Data Engineering, pages 29–38, 2002. 43 / 47

slide-44
SLIDE 44

References II

[H+13] Arvid Heise et al. Scalable discovery of unique column combinations. Proceedings of Very Large Database Endowment, pages 301–312, 2013. [I+12] Mohammad Saiful Islam et al. Access pattern disclosure on searchable encryption: Ramification, attack and mitigation. In Network and Distributed System Security Symposium, pages 12–23, 2012. [Ker15] Florian Kerschbaum. Frequency-hiding order-preserving encryption. In ACM Conference on Computer and Communications Security, pages 656–667, 2015. [N+15] Muhammad Naveed et al. Inference attacks on property-preserving encrypted databases. In ACM Conference on Computer and Communications Security, pages 644–655, 2015. [P+12] Raluca Ada Popa et al. Cryptdb: Processing queries on an encrypted database. Communications of the ACM, pages 103–111, 2012. [PR12] Omkant Pandey and Yannis Rouselakis. Property preserving symmetric encryption. In International Conference on the Theory and Applications of Cryptographic Techniques, pages 375–391, 2012. [S+00] Dawn Xiaoding Song et al. Practical techniques for searches on encrypted data. In IEEE Symposium on Security and Privacy, pages 44–55, 2000. 44 / 47

slide-45
SLIDE 45

References III

[T+11] Nilothpal Talukder et al. Detecting inconsistencies in private data with secure function evaluation. Technical report, Purdue University, 2011. 45 / 47

slide-46
SLIDE 46

Q & A Thank you! Questions?

dongb@montclair.edu Hui.Wang@stevens.edu

slide-47
SLIDE 47

Storage Overhead

Storage Overhead (Orders Dataset)

0.005 0.01 0.015 0.02 0.025 0.03 0.035 0.04 0.045 0.05 1 1 / 2 1 / 3 1 / 4 1 / 5 1 / 6 1 / 7 1 / 8 1 / 9 1 / 1 Overhead α value SYN SCALE GROUP FP 0.02 0.04 0.06 0.08 0.1 0.12 17 35 73 149 291 585 Overhead Data Size (MB) SYN SCALE GROUP FP

(a) Various α values (b) Various data sizes

  • overhead = | ˆ

D|−|D| |D|

measures the fraction of artificial tuples inserted.

  • Strong security requirement (small α value) demands more
  • verhead.
  • The overhead is small, especially for large datasets.

47 / 47