Abstract
Data confidentiality has become a major concern for individuals as well as for companies and administrations. In a classical client-server setting, the access control management is performed on the server, relying on the assumption that the server is a trusted party. However, this assumption no longer holds given the increasing vulnerability of database servers facing a growing number of external and even internal attacks. This paper studies different alternatives exploiting cryptographic techniques and/or tamper-resistant hardware to fight against these attacks. The pros and cons of each alternative are analyzed in terms of security, access control granularity and preserved database features (performance, query processing, volume of data). Finally, this paper sketches a hybrid approach mixing data encryption, integrity control and secured hardware that could pave the way for future highly securedDbmsS.
Résumé
Le problème de la confidentialité des bases de données est devenu un enjeu majeur pour les citoyens, les entreprises et les administrations. Les architectures client-serveur classiques délèguent le contrôle d’accès au serveur de base de données, considérant celui-ci comme un tiers de confiance. Cependant, la vulnérabilité grandissante des serveurs, subissant des attaques internes et/ou externes de plus en plus fréquentes, remet en cause cette hypothèse de confiance. Cet article présente différentes alternatives exploitant des techniques cryptographiques et/ou des composants matériels sécurisés pour résister à ces attaques. Les bénéfices et les limites des différentes alternatives sont analysés en termes de sécurité, de finesse du contrôle d’accès et de fonctionnalités base de données (performances, évaluation de requêtes, volume de données). Enfin, cet article présente une approche hybride, à la fois basée sur du chiffrement, du contrôle d’intégrité et du matériel sécurisé, ouvrant la porte à de futursSgbd ultra-sécurisés
Similar content being viewed by others
References
Agrawal (R.),Kiernan (J.),Srikant (R.),Xu (Y.), Order-Preserving Encryption for Numeric Data,ACM International Conference on Management of Data (sigmod), 2004.
Ailamaki (A. G.),Dewitt (D. J.),Hill (M. D.),Skounakis (M.), Weaving Relations for Cache Performance, International Conference on Very Large Data Bases (Vldb), 2001.
Anciaux (N.), Database Systems on Chip,PhD thesis of University of Versailles, 2004.
Anciaux (N.),Bobineau (C),Bouganim (L.),Pucheral (P.), pjcodbms: Validation and Experience, International Conference on Very Large Databases (Vldb), demo session, 2001.
Anciaux (N.),Bouganim (L.),Pucheral (P.), Database Components on Chip,Ercim news, 2003.
Anciaux (N.),Bouganim (L.),Pucheral (P.), Memory Requirements for Query Execution in Highly Constrained Devices, International Conference on Very Large Databases (Vldb), pp. 694–705, Morgan Kaufmann, 2003.
Application Security Inc., Encryption of Data at Rest — Database Encryption,White Paper, 2002. http://www.appsecinc.com
Baraani (A.),Pieprzyk (J.),Safavi-Naini (R.), Security In Databases: A Survey Study, 1996. citeseer.nj.nec.com/baraani-dastjerdi96security.html
Bell (D. E.),Lapadula (L. J.), Secure computer systems: Unified exposition and multics interpretation, Technical ReportEsd-tr-73-306, The mitre Corporation, 1976.
Bellare (M.),Rogaway (P.),Wagner (D.), TheEax Mode of Operation, Fast Software Encryption (Fse), 2004.
Bertino (E.), Castano (S.), Ferrari (E.), Securing xml documents with Author-x,Ieee Internet Computing, vol. 5, no 3, pp. 21–31, 2001.
Bolchini (C), Salice (F.), Schreiber (F.), Tança (L.), Logical and Physical Design Issues for Smart Card Databases,Acm Transactions on Information Systems (Tois), vol. 21, no 3, pp. 254–285, 2003.
Bouganim (L.),Dang Ngoc (F.),Pucheral (P.), Client-Based Access Control Management forXml documents, International Conference on Very Large Databases (Vldb), pp. 84–95, Morgan Kaufmann, 2004.
Bouganim (L.),Pucheral (P.), Chip-Secured Data Access: Confidential Data on Untrusted Servers, International Conference on Very Large Databases (Vldb), pp. 131–142, Morgan Kaufmann, 2002.
Carrasco (L. C), rdbms’s for Java Cards? What a Senseless Idea!, 1999. http://www.sqlmachine.com
Chor (B.),Goldreich (O.),Kushilevitz (E.),Sudan (M.), Private information retrieval, Symposium on Foundations of Computer Science (Focs’95), 1995.
Computer Security Institute.Csi/fbi Computer Crime and Security Survey, 2004. http://www.gocsi.com/forms/fbi/pdf.html.
Damiani (E.),Capitani Di Vimercati (S. De),Jajodia (S.),Paraboschi (S.), Samarati (P.), Balancing Confidentiality and Efficiency in Untrusted RelationalDbmss,Acm Conference on Computer and Communications Security (Ces), 2003.
Damiani (E.),Capitani DIVimercati (S.De),Paraboschi (S.),Samarati (P.), Computing range queries on obfuscated data, Information Processing and Management of Uncertainty in Knowledge-Based Systems (Ipmu), 2004.
Damiani (E.),Capitani DIVimercati (S.De),Paraboschi (S.),Samarati (P.), A Fine-Grained Access Control System forXml Documents,Acm tissec, 5, n. 2, 2002.
Dyer (J. G.), Lindemann (M.), Perez (R.), Sailer (R.), Doorn (L.) Van, Smith (S. W.), Weingart (S.), Building the IBM 4758 Secure Coprocessor,Ieee Computer, vol. 34, no 10, pp. 57–66, 2001.
Electronic Frontier Foundation, Unintended Consequences: Five Years under theDmca ». http://www.eff.org/ip/Dmca/
Eruces inc., Securing Data Storage: Protecting Data at Rest,In Dell Power Solutions magazine, Issue 4, 2001. http://ftp.dell.com/app/4q01-Eru.pdf
European Directive 95/46/Ec, Protection of individuals with regard the processing of personal data,Official Journal L 281, 1985.
Gabillon (A.),Bruno (E.), Regulating access toXml documents,Ifip Working Conference on Database and Application Security, 2001.
Gertz (M.),Kwong (A.),Martel (C),Nuckolls (G.),Devanbu (P.),Stubblebine (S.), Databases that tell the Truth: Authentic Data Publication,Bulletin of the Technical Committee on Data Engineering, 2004.
Hacigümüs (H.),Iyer (B.),Li (C),Mehrotra (S.), ExecutingSql over Encrypted Data in the Database-Service-Provider Model,Acm International Conference on Management of Data (Sigmod), 2002.
Hacigümüs (H.),Iyer (B.),Li (C),Mehrotra (S.), Providing Database as a Service, International Conference on Data Engineering (Icde), 2002.
Hacigümüs (H.),Iyer (B.),Mehrotra (S.), Efficient execution of aggregation queries over encrypted relational databases, International Conference on Database Systems for Advanced Applications (Dasfaa), 2004.
Hacigümüs (H.),Iyer (B.),Mehrotra (S.), Query Optimization in Encrypted Database Systems, International Conference on Database Systems for Advanced Applications (Dasfaa), 2005.
Harrison (M. A.), Ruzzo (W. L.), Ullman (J. D.), Protection in Operating Systems, Communication of theAcm, 19(8):461–471, 1976.
Ibm corp., ibm Data Encryption forIms andDb2 Databases v. 1.1, 2003. http://www-306.ibm.com/software/data/db2imstools/html/ibmdataencryp.html.
International Standardization Organization, Integrated Circuit(s) Cards with Contacts — Part 7,Iso/iec 7816-7, 1999.
Iyer (B.),Mehrotra (S.),Mykletun (E.),Tsudik (G.),Wu (Y.), A Framework for Efficient Storage Security in RDBMS,International Conference on Extending Database Technology, 2004.
Kantarcioglu (M.),Clifton (C), Security Issues in Querying Encrypted Data,Ifip Working Conference on Database and Applications Security (Dbsec), 2005.
Krause (M.),Tipton (H. F.), Handbook of Information Security Management,Auerbach Publications,Crc Press LLC. http://www.cccure.org/Documents/fflSM/ewtoc.html
Maheshwari (U.),Vingralek (R.),Shapiro (W.), How to build a trusted database system on untrusted storage,Symposium on Operating Systems Design and Implementation (OSDI), 2000.
Mastercard, MasterCard Open Data Storage (Mods), 2002. https://hsm2stll01.mastercard.net/public/login/ebusiness/smart_cards/one_smart_card/biz_opportunity/mods.
Mattsson (U.), Transparent Encryption and Separation of Duties for Enterprise Databases — A Solution for Field Level Privacy in Databases,Protegrity Technical Paper, 2004. http://www.protegrity.com/whitepa-pers/Transparent-encryption-for-enterprise-databases.pdf
Melton (J.),Simon (A. R), Understanding the newSql: A Complete Guide,Morgan Kaufmann, 1993.
Menezes (A.),Oorschot (P.Van),Vanstone (S.), Handbook of Applied Cryptography,Crc Press, 1997. www.cacr.math.uwaterloo.ca/hac.
Merkle (R.), A Certified Digital Signature,Advances in Cryptology (Crypto’89),Lncs,435, Springer Verlag, 1990.
Nist, Secure hash standard,Fips Publication, 180–1, 1995.
Oracle corp., Database Encryption in Oracle9i, 2001. otn.oracle.com/deploy/security/oracle9i.
Oracle corp., Oracle Advanced Security — Administrator’s Guide, Release 2 (9.2), Part No. A96573-01, 2002
Ozsoyoglu (G.),Singer (D.),Chung (S. S.), Anti-Tamper Databases: Querying Encrypted Databases,Ifip Working Conference on Database and Applications Security (Dbsec), 2003.
Pucheral (P.),Bouganim (L.),Valduriez (P.),Bobineau (C), PicoDbms: Scaling down Database Techniques for the Smart card, Very Large Data Bases Journal (Vldbj), 2001.
Rivest (R. L.), TheMd5 message-digest algorithm,Rfc, 1321, 1992.
Sandhu (R.), Coyne (E. J.), Feinstein (H. L.), Youman (C E.), Role-based access control models,Ieee Computer, 29(2):38–47, 1996.
SmartRight Technical white paper. http://www.smartright.org/images/SMR/content/SmartRight_tech_whitepaper_jan28.pdf
The Privacy Act, 5U.s.c. § 552a, 1974. http://www.usdoj.gov/04foia/privstat.htm.
Trusted Computing Platform Alliance, http://www.trustedcomputing.org/.
Vingralek (R.), Gnatdb: A small-footprint, secure database system, International Conference on Very Large Databases (Vldb), 2002.
Vingralek (R.),Maheshwari (U.),Shapiro (W.),Tdb: A Database System for Digital Rights Management, International Conference on Extending Database Technology (Edbt), 2002.
Author information
Authors and Affiliations
Rights and permissions
About this article
Cite this article
Anciaux, N., Bouganim, L. & Pucheral, P. Data confidentiality: to which extent cryptography and secured hardware can help. Ann. Télécommun. 61, 267–283 (2006). https://doi.org/10.1007/BF03219909
Received:
Accepted:
Issue Date:
DOI: https://doi.org/10.1007/BF03219909