Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Advertisement

Data confidentiality: to which extent cryptography and secured hardware can help

Confidentialité des Bases de Données : Apports de la Cryptographie et de Composants Matériels Sécurisés

  • Published:
Annales Des Télécommunications Aims and scope Submit manuscript

Abstract

Data confidentiality has become a major concern for individuals as well as for companies and administrations. In a classical client-server setting, the access control management is performed on the server, relying on the assumption that the server is a trusted party. However, this assumption no longer holds given the increasing vulnerability of database servers facing a growing number of external and even internal attacks. This paper studies different alternatives exploiting cryptographic techniques and/or tamper-resistant hardware to fight against these attacks. The pros and cons of each alternative are analyzed in terms of security, access control granularity and preserved database features (performance, query processing, volume of data). Finally, this paper sketches a hybrid approach mixing data encryption, integrity control and secured hardware that could pave the way for future highly securedDbmsS.

Résumé

Le problème de la confidentialité des bases de données est devenu un enjeu majeur pour les citoyens, les entreprises et les administrations. Les architectures client-serveur classiques délèguent le contrôle d’accès au serveur de base de données, considérant celui-ci comme un tiers de confiance. Cependant, la vulnérabilité grandissante des serveurs, subissant des attaques internes et/ou externes de plus en plus fréquentes, remet en cause cette hypothèse de confiance. Cet article présente différentes alternatives exploitant des techniques cryptographiques et/ou des composants matériels sécurisés pour résister à ces attaques. Les bénéfices et les limites des différentes alternatives sont analysés en termes de sécurité, de finesse du contrôle d’accès et de fonctionnalités base de données (performances, évaluation de requêtes, volume de données). Enfin, cet article présente une approche hybride, à la fois basée sur du chiffrement, du contrôle d’intégrité et du matériel sécurisé, ouvrant la porte à de futursSgbd ultra-sécurisés

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Agrawal (R.),Kiernan (J.),Srikant (R.),Xu (Y.), Order-Preserving Encryption for Numeric Data,ACM International Conference on Management of Data (sigmod), 2004.

  2. Ailamaki (A. G.),Dewitt (D. J.),Hill (M. D.),Skounakis (M.), Weaving Relations for Cache Performance, International Conference on Very Large Data Bases (Vldb), 2001.

  3. Anciaux (N.), Database Systems on Chip,PhD thesis of University of Versailles, 2004.

  4. Anciaux (N.),Bobineau (C),Bouganim (L.),Pucheral (P.), pjcodbms: Validation and Experience, International Conference on Very Large Databases (Vldb), demo session, 2001.

  5. Anciaux (N.),Bouganim (L.),Pucheral (P.), Database Components on Chip,Ercim news, 2003.

  6. Anciaux (N.),Bouganim (L.),Pucheral (P.), Memory Requirements for Query Execution in Highly Constrained Devices, International Conference on Very Large Databases (Vldb), pp. 694–705, Morgan Kaufmann, 2003.

  7. Application Security Inc., Encryption of Data at Rest — Database Encryption,White Paper, 2002. http://www.appsecinc.com

  8. Baraani (A.),Pieprzyk (J.),Safavi-Naini (R.), Security In Databases: A Survey Study, 1996. citeseer.nj.nec.com/baraani-dastjerdi96security.html

  9. Bell (D. E.),Lapadula (L. J.), Secure computer systems: Unified exposition and multics interpretation, Technical ReportEsd-tr-73-306, The mitre Corporation, 1976.

  10. Bellare (M.),Rogaway (P.),Wagner (D.), TheEax Mode of Operation, Fast Software Encryption (Fse), 2004.

  11. Bertino (E.), Castano (S.), Ferrari (E.), Securing xml documents with Author-x,Ieee Internet Computing, vol. 5, no 3, pp. 21–31, 2001.

    Article  Google Scholar 

  12. Bolchini (C), Salice (F.), Schreiber (F.), Tança (L.), Logical and Physical Design Issues for Smart Card Databases,Acm Transactions on Information Systems (Tois), vol. 21, no 3, pp. 254–285, 2003.

    Article  Google Scholar 

  13. Bouganim (L.),Dang Ngoc (F.),Pucheral (P.), Client-Based Access Control Management forXml documents, International Conference on Very Large Databases (Vldb), pp. 84–95, Morgan Kaufmann, 2004.

  14. Bouganim (L.),Pucheral (P.), Chip-Secured Data Access: Confidential Data on Untrusted Servers, International Conference on Very Large Databases (Vldb), pp. 131–142, Morgan Kaufmann, 2002.

  15. Carrasco (L. C), rdbms’s for Java Cards? What a Senseless Idea!, 1999. http://www.sqlmachine.com

  16. Chor (B.),Goldreich (O.),Kushilevitz (E.),Sudan (M.), Private information retrieval, Symposium on Foundations of Computer Science (Focs’95), 1995.

  17. Computer Security Institute.Csi/fbi Computer Crime and Security Survey, 2004. http://www.gocsi.com/forms/fbi/pdf.html.

  18. Damiani (E.),Capitani Di Vimercati (S. De),Jajodia (S.),Paraboschi (S.), Samarati (P.), Balancing Confidentiality and Efficiency in Untrusted RelationalDbmss,Acm Conference on Computer and Communications Security (Ces), 2003.

  19. Damiani (E.),Capitani DIVimercati (S.De),Paraboschi (S.),Samarati (P.), Computing range queries on obfuscated data, Information Processing and Management of Uncertainty in Knowledge-Based Systems (Ipmu), 2004.

  20. Damiani (E.),Capitani DIVimercati (S.De),Paraboschi (S.),Samarati (P.), A Fine-Grained Access Control System forXml Documents,Acm tissec, 5, n. 2, 2002.

  21. Dyer (J. G.), Lindemann (M.), Perez (R.), Sailer (R.), Doorn (L.) Van, Smith (S. W.), Weingart (S.), Building the IBM 4758 Secure Coprocessor,Ieee Computer, vol. 34, no 10, pp. 57–66, 2001.

    Google Scholar 

  22. Electronic Frontier Foundation, Unintended Consequences: Five Years under theDmca ». http://www.eff.org/ip/Dmca/

  23. Eruces inc., Securing Data Storage: Protecting Data at Rest,In Dell Power Solutions magazine, Issue 4, 2001. http://ftp.dell.com/app/4q01-Eru.pdf

  24. European Directive 95/46/Ec, Protection of individuals with regard the processing of personal data,Official Journal L 281, 1985.

  25. Gabillon (A.),Bruno (E.), Regulating access toXml documents,Ifip Working Conference on Database and Application Security, 2001.

  26. Gertz (M.),Kwong (A.),Martel (C),Nuckolls (G.),Devanbu (P.),Stubblebine (S.), Databases that tell the Truth: Authentic Data Publication,Bulletin of the Technical Committee on Data Engineering, 2004.

  27. Hacigümüs (H.),Iyer (B.),Li (C),Mehrotra (S.), ExecutingSql over Encrypted Data in the Database-Service-Provider Model,Acm International Conference on Management of Data (Sigmod), 2002.

  28. Hacigümüs (H.),Iyer (B.),Li (C),Mehrotra (S.), Providing Database as a Service, International Conference on Data Engineering (Icde), 2002.

  29. Hacigümüs (H.),Iyer (B.),Mehrotra (S.), Efficient execution of aggregation queries over encrypted relational databases, International Conference on Database Systems for Advanced Applications (Dasfaa), 2004.

  30. Hacigümüs (H.),Iyer (B.),Mehrotra (S.), Query Optimization in Encrypted Database Systems, International Conference on Database Systems for Advanced Applications (Dasfaa), 2005.

  31. Harrison (M. A.), Ruzzo (W. L.), Ullman (J. D.), Protection in Operating Systems, Communication of theAcm, 19(8):461–471, 1976.

    Article  MathSciNet  MATH  Google Scholar 

  32. Ibm corp., ibm Data Encryption forIms andDb2 Databases v. 1.1, 2003. http://www-306.ibm.com/software/data/db2imstools/html/ibmdataencryp.html.

  33. International Standardization Organization, Integrated Circuit(s) Cards with Contacts — Part 7,Iso/iec 7816-7, 1999.

  34. Iyer (B.),Mehrotra (S.),Mykletun (E.),Tsudik (G.),Wu (Y.), A Framework for Efficient Storage Security in RDBMS,International Conference on Extending Database Technology, 2004.

  35. Kantarcioglu (M.),Clifton (C), Security Issues in Querying Encrypted Data,Ifip Working Conference on Database and Applications Security (Dbsec), 2005.

  36. Krause (M.),Tipton (H. F.), Handbook of Information Security Management,Auerbach Publications,Crc Press LLC. http://www.cccure.org/Documents/fflSM/ewtoc.html

  37. Maheshwari (U.),Vingralek (R.),Shapiro (W.), How to build a trusted database system on untrusted storage,Symposium on Operating Systems Design and Implementation (OSDI), 2000.

  38. Mastercard, MasterCard Open Data Storage (Mods), 2002. https://hsm2stll01.mastercard.net/public/login/ebusiness/smart_cards/one_smart_card/biz_opportunity/mods.

  39. Mattsson (U.), Transparent Encryption and Separation of Duties for Enterprise Databases — A Solution for Field Level Privacy in Databases,Protegrity Technical Paper, 2004. http://www.protegrity.com/whitepa-pers/Transparent-encryption-for-enterprise-databases.pdf

  40. Melton (J.),Simon (A. R), Understanding the newSql: A Complete Guide,Morgan Kaufmann, 1993.

  41. Menezes (A.),Oorschot (P.Van),Vanstone (S.), Handbook of Applied Cryptography,Crc Press, 1997. www.cacr.math.uwaterloo.ca/hac.

  42. Merkle (R.), A Certified Digital Signature,Advances in Cryptology (Crypto’89),Lncs,435, Springer Verlag, 1990.

  43. Nist, Secure hash standard,Fips Publication, 180–1, 1995.

  44. Oracle corp., Database Encryption in Oracle9i, 2001. otn.oracle.com/deploy/security/oracle9i.

  45. Oracle corp., Oracle Advanced Security — Administrator’s Guide, Release 2 (9.2), Part No. A96573-01, 2002

  46. Ozsoyoglu (G.),Singer (D.),Chung (S. S.), Anti-Tamper Databases: Querying Encrypted Databases,Ifip Working Conference on Database and Applications Security (Dbsec), 2003.

  47. Pucheral (P.),Bouganim (L.),Valduriez (P.),Bobineau (C), PicoDbms: Scaling down Database Techniques for the Smart card, Very Large Data Bases Journal (Vldbj), 2001.

  48. Rivest (R. L.), TheMd5 message-digest algorithm,Rfc, 1321, 1992.

  49. Sandhu (R.), Coyne (E. J.), Feinstein (H. L.), Youman (C E.), Role-based access control models,Ieee Computer, 29(2):38–47, 1996.

    Google Scholar 

  50. SmartRight Technical white paper. http://www.smartright.org/images/SMR/content/SmartRight_tech_whitepaper_jan28.pdf

  51. The Privacy Act, 5U.s.c. § 552a, 1974. http://www.usdoj.gov/04foia/privstat.htm.

  52. Trusted Computing Platform Alliance, http://www.trustedcomputing.org/.

  53. Vingralek (R.), Gnatdb: A small-footprint, secure database system, International Conference on Very Large Databases (Vldb), 2002.

  54. Vingralek (R.),Maheshwari (U.),Shapiro (W.),Tdb: A Database System for Digital Rights Management, International Conference on Extending Database Technology (Edbt), 2002.

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Anciaux, N., Bouganim, L. & Pucheral, P. Data confidentiality: to which extent cryptography and secured hardware can help. Ann. Télécommun. 61, 267–283 (2006). https://doi.org/10.1007/BF03219909

Download citation

  • Received:

  • Accepted:

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF03219909

Key words

Mots clés