首页> 外文会议>ACM conference on Computer and communications security >Balancing confidentiality and efficiency in untrusted relational DBMSs
【24h】

Balancing confidentiality and efficiency in untrusted relational DBMSs

机译:平衡不信任关系DBMS的机密性和效率

获取原文

摘要

The scope and character of today's computing environments are progressively shifting from traditional, one-on-one client-server interaction to the new cooperative paradigm. It then becomes of primary importance to provide means of protecting the secrecy of the information, while guaranteeing its availability to legitimate clients. Operating on-line querying services securely on open networks is very difficu therefore many enterprises outsource their data center operations to external application service providers. A promising direction towards prevention of unauthorized access to outsourced data is represented by encryption. However, data encryption is often supported for the sole purpose of protecting the data in storage and assumes trust in the server, that decrypts data for query execution.In this paper, we present a simple yet robust single-server solution for remote querying of encrypted databases on untrusted servers. Our approach is based on the use of indexing information attached to the encrypted database which can be used by the server to select the data to be returned in response to a query without the need of disclosing the database content. Our indexes balance the trade off between efficiency requirements in query execution and protection requirements due to possible inference attacks exploiting indexing information. We also investigate quantitative measures to model inference exposure and provide some related experimental results.
机译:当今计算环境的范围和特征正在从传统的一对一客户端-服务器交互逐渐转移到新的合作范式。因此,提供保护信息保密性的方法,同时保证合法客户可以使用这些信息,就变得至关重要。在开放网络上安全地运行在线查询服务非常困难;因此,许多企业将其数据中心运营外包给外部应用程序服务提供商。加密代表了防止未经授权访问外包数据的一个有前途的方向。但是,通常仅出于保护存储中数据并支持服务器信任的目的而通常支持数据加密,从而解密数据以执行查询。在本文中,我们提出了一种简单而健壮的单服务器解决方案,用于对加密数据进行远程查询不可信服务器上的数据库。我们的方法基于使用附加到加密数据库的索引信息,服务器可以使用该索引信息来选择要返回的数据以响应查询,而无需透露数据库内容。由于可能利用索引信息进行推理攻击,我们的索引在查询执行效率要求和保护要求之间进行了权衡。我们还研究了建模推断推断的定量方法并提供了一些相关的实验结果。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号