Skip to main content

2017 | OriginalPaper | Buchkapitel

Enforcing Privacy in Cloud Databases

verfasst von : Somayeh Sobati Moghadam, Jérôme Darmont, Gérald Gavin

Erschienen in: Big Data Analytics and Knowledge Discovery

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Outsourcing databases, i.e., resorting to Database-as-a-Service (DBaaS), is nowadays a popular choice due to the elasticity, availability, scalability and pay-as-you-go features of cloud computing. However, most data are sensitive to some extent, and data privacy remains one of the top concerns to DBaaS users, for obvious legal and competitive reasons. In this paper, we survey the mechanisms that aim at making databases secure in a cloud environment, and discuss current pitfalls and related research challenges.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Aggarwal, C.C., Yu, P.S.: A general survey of privacy-preserving data mining models and algorithms. In: Aggarwal, C.C., Yu, P.S. (eds.) Privacy-Preserving Data Mining: Models and Algorithms, pp. 11–52. Springer, Boston (2008)CrossRef Aggarwal, C.C., Yu, P.S.: A general survey of privacy-preserving data mining models and algorithms. In: Aggarwal, C.C., Yu, P.S. (eds.) Privacy-Preserving Data Mining: Models and Algorithms, pp. 11–52. Springer, Boston (2008)CrossRef
2.
Zurück zum Zitat Aggarwal, G., Bawa, M., Ganesan, P., Garcia-Molina, H., Kenthapadi, K., Motwani, R., Srivastava, U., Thomas, D., Ying, X.: Two can keep a secret: a distributed architecture for secure database services. In: 2nd Biennial Conference on Innovative Data Systems Research (CIDR), Asilomar, CA, USA, pp. 186–199 (2005) Aggarwal, G., Bawa, M., Ganesan, P., Garcia-Molina, H., Kenthapadi, K., Motwani, R., Srivastava, U., Thomas, D., Ying, X.: Two can keep a secret: a distributed architecture for secure database services. In: 2nd Biennial Conference on Innovative Data Systems Research (CIDR), Asilomar, CA, USA, pp. 186–199 (2005)
3.
Zurück zum Zitat Agrawal, D., El Abbadi, A., Emekçi, F., Metwally, A.: Database management as a service: challenges and opportunities. In: 25th International Conference on Data Engineering (ICDE), Shanghai, China, pp. 1709–1716 (2009) Agrawal, D., El Abbadi, A., Emekçi, F., Metwally, A.: Database management as a service: challenges and opportunities. In: 25th International Conference on Data Engineering (ICDE), Shanghai, China, pp. 1709–1716 (2009)
4.
Zurück zum Zitat Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Order-preserving encryption for numeric data. In: ACM SIGMOD International Conference on Management of Data (SIGMOD), Paris, France, pp. 563–574 (2004) Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Order-preserving encryption for numeric data. In: ACM SIGMOD International Conference on Management of Data (SIGMOD), Paris, France, pp. 563–574 (2004)
5.
Zurück zum Zitat Agrawal, R., Srikant, R., Thomas, D.: Privacy preserving OLAP. In: ACM SIGMOD International Conference on Management of Data (SIGMOD), Baltimore, MD, USA, pp. 251–262 (2005) Agrawal, R., Srikant, R., Thomas, D.: Privacy preserving OLAP. In: ACM SIGMOD International Conference on Management of Data (SIGMOD), Baltimore, MD, USA, pp. 251–262 (2005)
8.
Zurück zum Zitat Arasu, A., Blanas, S., Eguro, K., Kaushik, R., Kossmann, D., Ramamurthy, R., Venkatesan, R.: Orthogonal security with cipherbase. In: 6th Biennial Conference on Innovative Data Systems Research (CIDR), Asilomar, CA, USA (2013) Arasu, A., Blanas, S., Eguro, K., Kaushik, R., Kossmann, D., Ramamurthy, R., Venkatesan, R.: Orthogonal security with cipherbase. In: 6th Biennial Conference on Innovative Data Systems Research (CIDR), Asilomar, CA, USA (2013)
9.
Zurück zum Zitat Arasu, A., Eguro, K., Joglekar, M., Kaushik, R., Kossmann, D., Ramamurthy, R.: Transaction processing on confidential data using Cipherbase. In: 31st IEEE International Conference on Data Engineering (ICDE), Seoul, Korea, pp. 435–446 (2015) Arasu, A., Eguro, K., Joglekar, M., Kaushik, R., Kossmann, D., Ramamurthy, R.: Transaction processing on confidential data using Cipherbase. In: 31st IEEE International Conference on Data Engineering (ICDE), Seoul, Korea, pp. 435–446 (2015)
10.
Zurück zum Zitat Arnold, T.W., Buscaglia, C.U., Chan, F., Condorelli, V., Dayka, J.C., Santiago-Fernandez, W., Hadzic, N., Hocker, M.D., Jordan, M., Morris, T.E., Werner, K.: IBM 4765 cryptographic coprocessor. IBM J. Res. Dev. 56(1), 10 (2012) Arnold, T.W., Buscaglia, C.U., Chan, F., Condorelli, V., Dayka, J.C., Santiago-Fernandez, W., Hadzic, N., Hocker, M.D., Jordan, M., Morris, T.E., Werner, K.: IBM 4765 cryptographic coprocessor. IBM J. Res. Dev. 56(1), 10 (2012)
11.
Zurück zum Zitat Attasena, V., Harbi, N., Darmont, J.: fVSS: A new secure and cost-efficient scheme for cloud data warehouses. In: 7th International Workshop on Data Warehousing and OLAP (DOLAP), Shanghai, China, pp. 81–90 (2014) Attasena, V., Harbi, N., Darmont, J.: fVSS: A new secure and cost-efficient scheme for cloud data warehouses. In: 7th International Workshop on Data Warehousing and OLAP (DOLAP), Shanghai, China, pp. 81–90 (2014)
12.
Zurück zum Zitat Bajaj, S., Sion, R.: TrustedDB: a trusted hardware based database with privacy and data confidentiality. In: ACM SIGMOD International Conference on Management of Data (SIGMOD), Athens, Greece, pp. 205–216 (2011) Bajaj, S., Sion, R.: TrustedDB: a trusted hardware based database with privacy and data confidentiality. In: ACM SIGMOD International Conference on Management of Data (SIGMOD), Athens, Greece, pp. 205–216 (2011)
13.
14.
15.
Zurück zum Zitat Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506–522. Springer, Heidelberg (2004). doi:10.1007/978-3-540-24676-3_30 CrossRef Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506–522. Springer, Heidelberg (2004). doi:10.​1007/​978-3-540-24676-3_​30 CrossRef
16.
Zurück zum Zitat Bösch, C., Hartel, P.H., Jonker, W., Peter, A.: A survey of provably secure searchable encryption. ACM Comput. Surv. 47(2), 18:1–18:51 (2014)CrossRef Bösch, C., Hartel, P.H., Jonker, W., Peter, A.: A survey of provably secure searchable encryption. ACM Comput. Surv. 47(2), 18:1–18:51 (2014)CrossRef
17.
Zurück zum Zitat Cachin, C., Micali, S., Stadler, M.: Computationally private information retrieval with polylogarithmic communication. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 402–414. Springer, Heidelberg (1999). doi:10.1007/3-540-48910-X_28 CrossRef Cachin, C., Micali, S., Stadler, M.: Computationally private information retrieval with polylogarithmic communication. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 402–414. Springer, Heidelberg (1999). doi:10.​1007/​3-540-48910-X_​28 CrossRef
18.
Zurück zum Zitat Chang, Y.-C.: Single database private information retrieval with logarithmic communication. In: Wang, H., Pieprzyk, J., Varadharajan, V. (eds.) ACISP 2004. LNCS, vol. 3108, pp. 50–61. Springer, Heidelberg (2004). doi:10.1007/978-3-540-27800-9_5 CrossRef Chang, Y.-C.: Single database private information retrieval with logarithmic communication. In: Wang, H., Pieprzyk, J., Varadharajan, V. (eds.) ACISP 2004. LNCS, vol. 3108, pp. 50–61. Springer, Heidelberg (2004). doi:10.​1007/​978-3-540-27800-9_​5 CrossRef
19.
Zurück zum Zitat Chor, B., Kushilevitz, E., Goldreich, O., Sudan, M.: Private Information Retrieval. Journal of the ACM 45(6), 965–981 (1998)MathSciNetCrossRefMATH Chor, B., Kushilevitz, E., Goldreich, O., Sudan, M.: Private Information Retrieval. Journal of the ACM 45(6), 965–981 (1998)MathSciNetCrossRefMATH
20.
Zurück zum Zitat Ciriani, V., De Capitani, S., di Vimercati, S., Foresti, S.J., Paraboschi, S., Samarati, P.: Selective data outsourcing for enforcing privacy. J. Comput. Secur. 19(3), 531–566 (2011)CrossRef Ciriani, V., De Capitani, S., di Vimercati, S., Foresti, S.J., Paraboschi, S., Samarati, P.: Selective data outsourcing for enforcing privacy. J. Comput. Secur. 19(3), 531–566 (2011)CrossRef
21.
Zurück zum Zitat Damiani, E., De Capitani di Vimercati, S., Jajodia, S., Paraboschi, S., Samarati, P.: Balancing confidentiality and efficiency in untrusted relational DBMSs. In: 10th ACM Conference on Computer and Communications Security (CCS), Washington, DC, USA, pp. 93–102 (2003) Damiani, E., De Capitani di Vimercati, S., Jajodia, S., Paraboschi, S., Samarati, P.: Balancing confidentiality and efficiency in untrusted relational DBMSs. In: 10th ACM Conference on Computer and Communications Security (CCS), Washington, DC, USA, pp. 93–102 (2003)
22.
Zurück zum Zitat Davida, G.I., Wells, D.L., Kam, J.B.: A database encryption system with subkeys. ACM Trans. Database Syst. 6(2), 312–328 (1981)MathSciNetCrossRef Davida, G.I., Wells, D.L., Kam, J.B.: A database encryption system with subkeys. ACM Trans. Database Syst. 6(2), 312–328 (1981)MathSciNetCrossRef
24.
Zurück zum Zitat Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1–12. Springer, Heidelberg (2006). doi:10.1007/11787006_1 CrossRef Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1–12. Springer, Heidelberg (2006). doi:10.​1007/​11787006_​1 CrossRef
25.
Zurück zum Zitat Dwork, C.: Differential privacy. In: van Tilborg, H.C.A., Jajodia, S. (eds.) Encyclopedia of Cryptography and Security, pp. 338–340. Springer, New York (2011) Dwork, C.: Differential privacy. In: van Tilborg, H.C.A., Jajodia, S. (eds.) Encyclopedia of Cryptography and Security, pp. 338–340. Springer, New York (2011)
26.
Zurück zum Zitat Eguro, K., Venkatesan, R.: FPGAs for trusted cloud computing. In: 22nd International Conference on Field Programmable Logic and Applications (FPL), Oslo, Norway, pp. 63–70 (2012) Eguro, K., Venkatesan, R.: FPGAs for trusted cloud computing. In: 22nd International Conference on Field Programmable Logic and Applications (FPL), Oslo, Norway, pp. 63–70 (2012)
27.
Zurück zum Zitat El Gamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31(4), 469–472 (1985)MathSciNetCrossRef El Gamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31(4), 469–472 (1985)MathSciNetCrossRef
28.
Zurück zum Zitat Elovici, Y., Waisenberg, R., Shmueli, E., Gudes, E.: A structure preserving database encryption scheme. In: Jonker, W., Petković, M. (eds.) SDM 2004. LNCS, vol. 3178, pp. 28–40. Springer, Heidelberg (2004). doi:10.1007/978-3-540-30073-1_3 CrossRef Elovici, Y., Waisenberg, R., Shmueli, E., Gudes, E.: A structure preserving database encryption scheme. In: Jonker, W., Petković, M. (eds.) SDM 2004. LNCS, vol. 3178, pp. 28–40. Springer, Heidelberg (2004). doi:10.​1007/​978-3-540-30073-1_​3 CrossRef
29.
Zurück zum Zitat Furukawa, J.: Short comparable encryption. In: Gritzalis, D., Kiayias, A., Askoxylakis, I. (eds.) CANS 2014. LNCS, vol. 8813, pp. 337–352. Springer, Cham (2014). doi:10.1007/978-3-319-12280-9_22 Furukawa, J.: Short comparable encryption. In: Gritzalis, D., Kiayias, A., Askoxylakis, I. (eds.) CANS 2014. LNCS, vol. 8813, pp. 337–352. Springer, Cham (2014). doi:10.​1007/​978-3-319-12280-9_​22
30.
Zurück zum Zitat Ge, T., Zdonik, S.B.: Answering aggregation queries in a secure system model. In: 33rd International Conference on Very Large Data Bases (VLDB), Vienna, Austria, pp. 519–530 (2007) Ge, T., Zdonik, S.B.: Answering aggregation queries in a secure system model. In: 33rd International Conference on Very Large Data Bases (VLDB), Vienna, Austria, pp. 519–530 (2007)
31.
Zurück zum Zitat Gentry, C.: A fully homomorphic encryption scheme. Ph.D. thesis, Stanford University (2009) Gentry, C.: A fully homomorphic encryption scheme. Ph.D. thesis, Stanford University (2009)
32.
33.
Zurück zum Zitat Hacigümüs, H., Iyer, B.R., Li, C., Mehrotra, S.: Executing SQL over encrypted data in the database-service-provider model. In: ACM SIGMOD International Conference on Management of Data (SIGMOD), Madison, WI, USA, pp. 216–227 (2002) Hacigümüs, H., Iyer, B.R., Li, C., Mehrotra, S.: Executing SQL over encrypted data in the database-service-provider model. In: ACM SIGMOD International Conference on Management of Data (SIGMOD), Madison, WI, USA, pp. 216–227 (2002)
34.
Zurück zum Zitat Hacıgümüş, H., Iyer, B.R., Mehrotra, S.: Efficient execution of aggregation queries over encrypted relational databases. In: Lee, Y.J., Li, J., Whang, K.-Y., Lee, D. (eds.) DASFAA 2004. LNCS, vol. 2973, pp. 125–136. Springer, Heidelberg (2004). doi:10.1007/978-3-540-24571-1_10 CrossRef Hacıgümüş, H., Iyer, B.R., Mehrotra, S.: Efficient execution of aggregation queries over encrypted relational databases. In: Lee, Y.J., Li, J., Whang, K.-Y., Lee, D. (eds.) DASFAA 2004. LNCS, vol. 2973, pp. 125–136. Springer, Heidelberg (2004). doi:10.​1007/​978-3-540-24571-1_​10 CrossRef
35.
Zurück zum Zitat Hadavi, M.A., Damiani, E., Jalili, R., Cimato, S., Ganjei, Z.: AS5: a secure searchable secret sharing scheme for privacy preserving database outsourcing. In: Pietro, R., Herranz, J., Damiani, E., State, R. (eds.) DPM/SETOP -2012. LNCS, vol. 7731, pp. 201–216. Springer, Heidelberg (2013). doi:10.1007/978-3-642-35890-6_15 CrossRef Hadavi, M.A., Damiani, E., Jalili, R., Cimato, S., Ganjei, Z.: AS5: a secure searchable secret sharing scheme for privacy preserving database outsourcing. In: Pietro, R., Herranz, J., Damiani, E., State, R. (eds.) DPM/SETOP -2012. LNCS, vol. 7731, pp. 201–216. Springer, Heidelberg (2013). doi:10.​1007/​978-3-642-35890-6_​15 CrossRef
36.
Zurück zum Zitat Hadavi, M.A., Jalili, R.: Secure data outsourcing based on threshold secret sharing; towards a more practical solution. In: 36th International Conference on Very Large Data Bases (VLDB) PhD Workshop, Singapore, pp. 54–59 (2010) Hadavi, M.A., Jalili, R.: Secure data outsourcing based on threshold secret sharing; towards a more practical solution. In: 36th International Conference on Very Large Data Bases (VLDB) PhD Workshop, Singapore, pp. 54–59 (2010)
37.
Zurück zum Zitat Hadavi, M.A., Noferesti, M., Jalili, R., Damiani, E.: Database as a service: towards a unified solution for security requirements. In: 36th Annual IEEE Computer Software and Applications Conference (COMPSAC) Workshops, Izmir, Turkey, pp. 415–420 (2012) Hadavi, M.A., Noferesti, M., Jalili, R., Damiani, E.: Database as a service: towards a unified solution for security requirements. In: 36th Annual IEEE Computer Software and Applications Conference (COMPSAC) Workshops, Izmir, Turkey, pp. 415–420 (2012)
38.
Zurück zum Zitat Hore, B., Mehrotra, S., Canim, M., Kantarcioglu, M.: Secure multidimensional range queries over outsourced data. VLDB J. 21(3), 333–358 (2012)CrossRef Hore, B., Mehrotra, S., Canim, M., Kantarcioglu, M.: Secure multidimensional range queries over outsourced data. VLDB J. 21(3), 333–358 (2012)CrossRef
39.
Zurück zum Zitat Hore, B., Mehrotra, S., Hacigümüç, H.: Managing and querying encrypted data. In: Gertz, M., Jajodia, S. (eds.) Handbook of Database Security, pp. 163–190. Springer, Boston (2008)CrossRef Hore, B., Mehrotra, S., Hacigümüç, H.: Managing and querying encrypted data. In: Gertz, M., Jajodia, S. (eds.) Handbook of Database Security, pp. 163–190. Springer, Boston (2008)CrossRef
40.
Zurück zum Zitat Hore, B., Mehrotra, S., Tsudik, G.: A privacy-preserving index for range queries. In: 30th International Conference on Very Large Data Bases (VLDB), Toronto, Canada, pp. 720–731 (2004) Hore, B., Mehrotra, S., Tsudik, G.: A privacy-preserving index for range queries. In: 30th International Conference on Very Large Data Bases (VLDB), Toronto, Canada, pp. 720–731 (2004)
41.
Zurück zum Zitat Kadhem, H., Amagasa, T., Hiroyuki Kitagawa, M.-O.: Multivalued-order preserving encryption scheme: a novel scheme for encrypting integer value to many different values. IEICE Trans. Inf. Syst. 93–D(9), 2520–2533 (2010)CrossRef Kadhem, H., Amagasa, T., Hiroyuki Kitagawa, M.-O.: Multivalued-order preserving encryption scheme: a novel scheme for encrypting integer value to many different values. IEICE Trans. Inf. Syst. 93–D(9), 2520–2533 (2010)CrossRef
42.
Zurück zum Zitat Kellaris, G., Kollios, G., Nissim, K., O’Neill, A.: Generic attacks on secure outsourced databases. In: 23rd ACM Conference on Computer and Communications Security (CCS), Vienna, Austria, pp. 1329–1340 (2016) Kellaris, G., Kollios, G., Nissim, K., O’Neill, A.: Generic attacks on secure outsourced databases. In: 23rd ACM Conference on Computer and Communications Security (CCS), Vienna, Austria, pp. 1329–1340 (2016)
43.
Zurück zum Zitat Kerschbaum, F., Grofig, P., Hang, I., Härterich, M., Kohler, M., Schaad, A., Schröpfer, A., Tighzert, W.: Adjustably encrypted in-memory column-store. In: ACM SIGSAC Conference on Computer and Communications Security (CCS), Berlin, Germany, pp. 1325–1328 (2013) Kerschbaum, F., Grofig, P., Hang, I., Härterich, M., Kohler, M., Schaad, A., Schröpfer, A., Tighzert, W.: Adjustably encrypted in-memory column-store. In: ACM SIGSAC Conference on Computer and Communications Security (CCS), Berlin, Germany, pp. 1325–1328 (2013)
45.
Zurück zum Zitat Liu, Z., Chen, X., Yang, J., Jia, C., You, I.: New order preserving encryption model for outsourced databases in cloud environments. J. Netw. Comput. Appl. 59, 198–207 (2016)CrossRef Liu, Z., Chen, X., Yang, J., Jia, C., You, I.: New order preserving encryption model for outsourced databases in cloud environments. J. Netw. Comput. Appl. 59, 198–207 (2016)CrossRef
46.
Zurück zum Zitat Lopes, C.C., Times, V.C., Matwin, S., Ciferri, R.R., Ciferri, C.D.A.: Processing OLAP queries over an encrypted data warehouse stored in the cloud. In: Bellatreche, L., Mohania, M.K. (eds.) DaWaK 2014. LNCS, vol. 8646, pp. 195–207. Springer, Cham (2014). doi:10.1007/978-3-319-10160-6_18 Lopes, C.C., Times, V.C., Matwin, S., Ciferri, R.R., Ciferri, C.D.A.: Processing OLAP queries over an encrypted data warehouse stored in the cloud. In: Bellatreche, L., Mohania, M.K. (eds.) DaWaK 2014. LNCS, vol. 8646, pp. 195–207. Springer, Cham (2014). doi:10.​1007/​978-3-319-10160-6_​18
47.
Zurück zum Zitat Lueks, W., Goldberg, I.: Sublinear scaling for multi-client private information retrieval. In: Böhme, R., Okamoto, T. (eds.) FC 2015. LNCS, vol. 8975, pp. 168–186. Springer, Heidelberg (2015). doi:10.1007/978-3-662-47854-7_10 CrossRef Lueks, W., Goldberg, I.: Sublinear scaling for multi-client private information retrieval. In: Böhme, R., Okamoto, T. (eds.) FC 2015. LNCS, vol. 8975, pp. 168–186. Springer, Heidelberg (2015). doi:10.​1007/​978-3-662-47854-7_​10 CrossRef
48.
Zurück zum Zitat Mavroforakis, C., Chenette, N., O’Neill, A., Kollios, G., Canetti, R.: Modular order-preserving encryption, Revisited. In: ACM SIGMOD International Conference on Management of Data, Melbourne, Australia, pp. 763–777 (2015) Mavroforakis, C., Chenette, N., O’Neill, A., Kollios, G., Canetti, R.: Modular order-preserving encryption, Revisited. In: ACM SIGMOD International Conference on Management of Data, Melbourne, Australia, pp. 763–777 (2015)
49.
Zurück zum Zitat Mykletun, E., Tsudik, G.: Aggregation queries in the database-as-a-service model. In: Damiani, E., Liu, P. (eds.) DBSec 2006. LNCS, vol. 4127, pp. 89–103. Springer, Heidelberg (2006). doi:10.1007/11805588_7 CrossRef Mykletun, E., Tsudik, G.: Aggregation queries in the database-as-a-service model. In: Damiani, E., Liu, P. (eds.) DBSec 2006. LNCS, vol. 4127, pp. 89–103. Springer, Heidelberg (2006). doi:10.​1007/​11805588_​7 CrossRef
50.
Zurück zum Zitat Naveed, M., Kamara, S., Wright, C.V.: Inference attacks on property-preserving encrypted databases. In: 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS), Denver, CO, USA, pp. 644–655 (2015) Naveed, M., Kamara, S., Wright, C.V.: Inference attacks on property-preserving encrypted databases. In: 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS), Denver, CO, USA, pp. 644–655 (2015)
51.
Zurück zum Zitat Oracle Corporation. Data Masking Best Practices. White paper (2013) Oracle Corporation. Data Masking Best Practices. White paper (2013)
52.
Zurück zum Zitat Özsoyoglu, G., Singer, D.A., Chung, S.S.: Anti-tamper databases: querying encrypted databases. In: 17th Annual IFIP WG 11.3 Working Conference on Data and Application Security (DBSec), Estes Park, CO, USA, pp. 133–146 (2003) Özsoyoglu, G., Singer, D.A., Chung, S.S.: Anti-tamper databases: querying encrypted databases. In: 17th Annual IFIP WG 11.3 Working Conference on Data and Application Security (DBSec), Estes Park, CO, USA, pp. 133–146 (2003)
53.
Zurück zum Zitat Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999). doi:10.1007/3-540-48910-X_16 CrossRef Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999). doi:10.​1007/​3-540-48910-X_​16 CrossRef
54.
Zurück zum Zitat Popa, R.A., Redfield, C.M.S., Zeldovich, N., Balakrishnan, H.: CryptDB: protecting confidentiality with encrypted query processing. In: 23rd ACM Symposium on Operating Systems Principles (SOSP), Cascais, Portugal, pp. 85–100 (2011) Popa, R.A., Redfield, C.M.S., Zeldovich, N., Balakrishnan, H.: CryptDB: protecting confidentiality with encrypted query processing. In: 23rd ACM Symposium on Operating Systems Principles (SOSP), Cascais, Portugal, pp. 85–100 (2011)
55.
Zurück zum Zitat Popa, R.A.: Building practical systems that compute on encrypted data. Ph.D. thesis, Massachusetts Institute of Technology (2014) Popa, R.A.: Building practical systems that compute on encrypted data. Ph.D. thesis, Massachusetts Institute of Technology (2014)
56.
Zurück zum Zitat Ricci, S., Domingo-Ferrer, J., Sánchez, D.: Privacy-preserving cloud-based statistical analyses on sensitive categorical data. In: Torra, V., Narukawa, Y., Navarro-Arribas, G., Yañez, C. (eds.) MDAI 2016. LNCS (LNAI), vol. 9880, pp. 227–238. Springer, Cham (2016). doi:10.1007/978-3-319-45656-0_19 CrossRef Ricci, S., Domingo-Ferrer, J., Sánchez, D.: Privacy-preserving cloud-based statistical analyses on sensitive categorical data. In: Torra, V., Narukawa, Y., Navarro-Arribas, G., Yañez, C. (eds.) MDAI 2016. LNCS (LNAI), vol. 9880, pp. 227–238. Springer, Cham (2016). doi:10.​1007/​978-3-319-45656-0_​19 CrossRef
57.
Zurück zum Zitat Rivest, R.L., Adleman, L., Dertouzos, M.L.: On data banks and privacy homomorphisms. Found. Secure Comput. 4(11), 169–180 (1978)MathSciNet Rivest, R.L., Adleman, L., Dertouzos, M.L.: On data banks and privacy homomorphisms. Found. Secure Comput. 4(11), 169–180 (1978)MathSciNet
58.
Zurück zum Zitat Saleh, E., Alsa’deh, A., Kayed, A., Meinel, C.: Processing over encrypted data: between theory and practice. SIGMOD Rec. 45(3), 5–16 (2016)CrossRef Saleh, E., Alsa’deh, A., Kayed, A., Meinel, C.: Processing over encrypted data: between theory and practice. SIGMOD Rec. 45(3), 5–16 (2016)CrossRef
59.
Zurück zum Zitat Samarati, P., De Capitani di Vimercati, S.: Data protection in outsourcing scenarios: issues and directions. In: 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS), Beijing, China, pp. 1–14 (2010) Samarati, P., De Capitani di Vimercati, S.: Data protection in outsourcing scenarios: issues and directions. In: 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS), Beijing, China, pp. 1–14 (2010)
61.
Zurück zum Zitat Shmueli, E., Waisenberg, R., Elovici, Y., Gudes, E.: Designing secure indexes for encrypted databases. In: Jajodia, S., Wijesekera, D. (eds.) DBSec 2005. LNCS, vol. 3654, pp. 54–68. Springer, Heidelberg (2005). doi:10.1007/11535706_5 CrossRef Shmueli, E., Waisenberg, R., Elovici, Y., Gudes, E.: Designing secure indexes for encrypted databases. In: Jajodia, S., Wijesekera, D. (eds.) DBSec 2005. LNCS, vol. 3654, pp. 54–68. Springer, Heidelberg (2005). doi:10.​1007/​11535706_​5 CrossRef
62.
Zurück zum Zitat Sion, R.: Towards secure data outsourcing. In: Gertz, M., Jajodia, S. (eds.) Handbook of Database Security - Applications and Trends, pp. 137–161. Springer, Boston (2008)CrossRef Sion, R.: Towards secure data outsourcing. In: Gertz, M., Jajodia, S. (eds.) Handbook of Database Security - Applications and Trends, pp. 137–161. Springer, Boston (2008)CrossRef
63.
Zurück zum Zitat Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: IEEE Symposium on Security and Privacy (SP), Berkeley, CA, USA, pp. 44–55 (2000) Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: IEEE Symposium on Security and Privacy (SP), Berkeley, CA, USA, pp. 44–55 (2000)
64.
Zurück zum Zitat Stefanov, E., van Dijk, M., Shi, E., Fletcher, C.W., Ren, L., Xiangyao, Y., Devadas, S.: Path ORAM: an extremely simple oblivious RAM protocol. In: ACM SIGSAC Conference on Computer and Communications Security (CCS), Berlin, Germany, pp. 299–310 (2013) Stefanov, E., van Dijk, M., Shi, E., Fletcher, C.W., Ren, L., Xiangyao, Y., Devadas, S.: Path ORAM: an extremely simple oblivious RAM protocol. In: ACM SIGSAC Conference on Computer and Communications Security (CCS), Berlin, Germany, pp. 299–310 (2013)
65.
Zurück zum Zitat Sun, W., Lou, W., Hou, Y.T., Li, H.: Privacy-preserving keyword search over encrypted data in cloud computing. In: Jajodia, S., Kant, K., Samarati, P., Singhal, A., Swarup, V., Wang, C. (eds.) Secure Cloud Computing, pp. 189–212. Springer, New York (2014). doi:10.1007/978-1-4614-9278-8_9 CrossRef Sun, W., Lou, W., Hou, Y.T., Li, H.: Privacy-preserving keyword search over encrypted data in cloud computing. In: Jajodia, S., Kant, K., Samarati, P., Singhal, A., Swarup, V., Wang, C. (eds.) Secure Cloud Computing, pp. 189–212. Springer, New York (2014). doi:10.​1007/​978-1-4614-9278-8_​9 CrossRef
66.
Zurück zum Zitat Sung, S.Y., Liu, Y., Xiong, H., Ng, P.A.: Privacy preservation for data cubes. Knowl. Inf. Syst. 9(1), 38–61 (2006)CrossRef Sung, S.Y., Liu, Y., Xiong, H., Ng, P.A.: Privacy preservation for data cubes. Knowl. Inf. Syst. 9(1), 38–61 (2006)CrossRef
67.
Zurück zum Zitat Sweeney, L.: k-Anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 10(5), 557–570 (2002)MathSciNetCrossRefMATH Sweeney, L.: k-Anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 10(5), 557–570 (2002)MathSciNetCrossRefMATH
68.
Zurück zum Zitat Thompson, B., Haber, S., Horne, W.G., Sander, T., Yao, D.: Privacy-preserving computation and verification of aggregate queries on outsourced databases. In: Goldberg, I., Atallah, M.J. (eds.) PETS 2009. LNCS, vol. 5672, pp. 185–201. Springer, Heidelberg (2009). doi:10.1007/978-3-642-03168-7_11 CrossRef Thompson, B., Haber, S., Horne, W.G., Sander, T., Yao, D.: Privacy-preserving computation and verification of aggregate queries on outsourced databases. In: Goldberg, I., Atallah, M.J. (eds.) PETS 2009. LNCS, vol. 5672, pp. 185–201. Springer, Heidelberg (2009). doi:10.​1007/​978-3-642-03168-7_​11 CrossRef
69.
70.
Zurück zum Zitat Tu, S., Kaashoek, M.F., Madden, S., Zeldovich, N.: Processing analytical queries over encrypted data. Proc. VLDB Endowment 6(5), 289–300 (2013)CrossRef Tu, S., Kaashoek, M.F., Madden, S., Zeldovich, N.: Processing analytical queries over encrypted data. Proc. VLDB Endowment 6(5), 289–300 (2013)CrossRef
71.
Zurück zum Zitat Wang, S., Agrawal, D., El Abbadi, A.: A comprehensive framework for secure query processing on relational data in the cloud. In: Jonker, W., Petković, M. (eds.) SDM 2011. LNCS, vol. 6933, pp. 52–69. Springer, Heidelberg (2011). doi:10.1007/978-3-642-23556-6_4 CrossRef Wang, S., Agrawal, D., El Abbadi, A.: A comprehensive framework for secure query processing on relational data in the cloud. In: Jonker, W., Petković, M. (eds.) SDM 2011. LNCS, vol. 6933, pp. 52–69. Springer, Heidelberg (2011). doi:10.​1007/​978-3-642-23556-6_​4 CrossRef
72.
Zurück zum Zitat Wang, W.H., Lakshmanan, L.V.S.: Efficient secure query evaluation over encrypted XML databases. In: 32nd International Conference on Very Large Data Bases, Seoul, Korea, pp. 127–138 (2006) Wang, W.H., Lakshmanan, L.V.S.: Efficient secure query evaluation over encrypted XML databases. In: 32nd International Conference on Very Large Data Bases, Seoul, Korea, pp. 127–138 (2006)
73.
Zurück zum Zitat Williams, P., Sion, R.: Access privacy and correctness on untrusted storage. ACM Trans. Inf. Syst. Secur. 16(3), 12 (2013)CrossRef Williams, P., Sion, R.: Access privacy and correctness on untrusted storage. ACM Trans. Inf. Syst. Secur. 16(3), 12 (2013)CrossRef
74.
Zurück zum Zitat Xiao, X., Bender, G., Hay, M., Gehrke, J.: iReduct: differential privacy with reduced relative errors. In: ACM SIGMOD International Conference on Management of Data (SIGMOD), Athens, Greece, pp. 229–240 (2011) Xiao, X., Bender, G., Hay, M., Gehrke, J.: iReduct: differential privacy with reduced relative errors. In: ACM SIGMOD International Conference on Management of Data (SIGMOD), Athens, Greece, pp. 229–240 (2011)
75.
Zurück zum Zitat Xiong, L., Chitti, S., Liu, L.: Preserving data privacy in outsourcing data aggregation services. ACM Trans. Internet Technol. 7(3), 17 (2007)CrossRef Xiong, L., Chitti, S., Liu, L.: Preserving data privacy in outsourcing data aggregation services. ACM Trans. Internet Technol. 7(3), 17 (2007)CrossRef
76.
Zurück zum Zitat Yang, Y., Zhang, Z., Miklau, G., Winslett, M., Xiao, X.: Differential privacy in data publication and analysis. In: ACM SIGMOD International Conference on Management of Data, Scottsdale, AZ, USA, pp. 601–606 (2012) Yang, Y., Zhang, Z., Miklau, G., Winslett, M., Xiao, X.: Differential privacy in data publication and analysis. In: ACM SIGMOD International Conference on Management of Data, Scottsdale, AZ, USA, pp. 601–606 (2012)
Metadaten
Titel
Enforcing Privacy in Cloud Databases
verfasst von
Somayeh Sobati Moghadam
Jérôme Darmont
Gérald Gavin
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-64283-3_5

Premium Partner