Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1458082.1458196acmconferencesArticle/Chapter ViewAbstractPublication PagescikmConference Proceedingsconference-collections
research-article

Dual encryption for query integrity assurance

Published: 26 October 2008 Publication History

Abstract

In database outsourcing, an enterprise contracts its database management tasks to an outside database service provider to eliminate in-house hardware, software, and expertise needs for running DBMSs. This is attractive especially for the parties with limited abilities in managing their own data. Typically, the client applications want to obtain quality assurance (e.g., data authenticity and query completeness) of the outsourced database service at a low cost. Previous work on database outsourcing has focused on issues such as communication overhead, secure data access, and data privacy. Recent work has introduced the issue of query integrity assurance, but usually, to obtain such assurance incurs a high cost. In this paper, we present a new method called dual encryption to provide low-cost query integrity assurance for outsourced database services. Dual encryption enables "cross examination" of the outsourced data, which consists of the original data stored under a certain encryption scheme, and another small percentage of the original data stored under a different encryption scheme. We generate queries against the additional piece of data and analyze their results to obtain integrity assurance. Our scheme is provable secure, that is, it is impossible to break our scheme unless some security primitives can be broken. Experiments on commercial workloads show the effectiveness of our approach.

References

[1]
Dakshi Agrawal and Charu C. Aggarwal. On the design and quantification of privacy preserving data mining algorithms. In PODS, 2001.
[2]
Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikant, and Yirong Xu. Order-preserving encryption for numeric data. In SIGMOD, 2004.
[3]
Rakesh Agrawal and Ramakrishnan Srikant. Privacy-preserving data mining. In SIGMOD, pages 439--450. ACM Press, May 2000.
[4]
Yijian Bai, Hetal Thakkar, Haixun Wang, Chang Luo, and Carlo Zaniolo. A data stream language and system designed for power and extensibility. In CIKM, 2006.
[5]
Mihir Bellare. Practice-oriented provable security. In Ivan Damgård, editor, Lectures on Data Security, volume 1561 of Lecture Notes in Computer Science, pages 1--15. Springer, 1998.
[6]
Mihir Bellare, Anand Desai, E. Jokipii, and Phillip Rogaway. A concrete security treatment of symmetric encryption. In FOCS, pages 394--403, 1997.
[7]
Mihir Bellare, Roch Guérin, and Phillip Rogaway. XOR MACs: New methods for message authentication using finite pseudorandom functions. In CRYPTO, pages 15--28, 27-31 August 1995.
[8]
Mihir Bellare, Joe Kilian, and Phillip Rogaway. The security of cipher block chaining. Lecture Notes in Computer Science, 839:341--358, 1994.
[9]
Mihir Bellare, Joe Kilian, and Phillip Rogaway. The security of the cipher block chaining message authentication code. Journal of Computer and System Sciences, 61(3):362--399, 2000.
[10]
Mihir Bellare and Phillip Rogaway. Entity authentication and key distribution. In CRYPTO, pages 232--249. Springer, 1994. Lecture Notes in Computer Science No. 773.
[11]
Mihir Bellare and Phillip Rogaway. Provably secure session key distribution: the three party case. pages 57--66, 1995.
[12]
David Chaum, Ivan Damgård, and Jeroen van de Graaf. Multiparty computations ensuring privacy of each party's input and correctness of the result. In CRYPTO, pages 87--119, 1987.
[13]
Standard Performance Evaluation Corporation. The SPECjAppServer benchmark. http://www.spec.org/jAppServer/, 2004.
[14]
Premkumar T. Devanbu, Michael Gertz, Charles U. Martel, and Stuart G. Stubblebine. Authentic third-party data publication. In Proceedings of the IFIP TC11/ WG11.3 Fourteenth Annual Working Conference on Database Security, 2001.
[15]
O. Goldreich, S. Goldwasser, and S. Micali. How to construct random functions. Journal of the ACM, 33(4):792--807, October 1986.
[16]
Hakan Hacigümüş, Balakrishna R. Iyer, Chen Li, and Sharad Mehrotra. Executing SQL over encrypted data in the database service provider model. In SIGMOD, 2002.
[17]
M. Luby and C. Rackoff. How to construct pseudorandom permutations from pseudorandom functions. SIAM Journal on Computing, 17(2):373--386, 1988.
[18]
Chang Luo, Hetal Thakkar, Haixun Wang, and Carlo Zaniolo. A native extension of SQL for mining data streams. In SIGMOD, 2005.
[19]
Dahlia Malkhi and Michael Reiter. Byzantine quorum systems. In Proc. of annual ACM symposium on Theory of computing, pages 569--578, 1997.
[20]
E. Mykletun, M. Narasimha, and G. Tsudik. Authentication and integrity in outsourced databases. In NDSS, 2004.
[21]
Radu Sion. Query execution assurance for outsourced databases. In VLDB, 2005.
[22]
Haixun Wang and Carlo Zaniolo. ATLaS: A native extension of SQL for data mining. In SDM, 2003.
[23]
Haixun Wang, Carlo Zaniolo, and Chang Luo. ATLaS: a small but complete SQL extension for data mining and data streams. In VLDB, 2003.
[24]
Min Xie, Haixun Wang, Jian Yin, and Xiaofeng Meng. Integrity auditing of outsourced data. In VLDB, pages 782--793. VLDB Endowment, 2007.
[25]
Min Xie, Haixun Wang, Jian Yin, and Xiaofeng Meng. Providing freshness guarantees for outsourced databases. In EDBT, pages 323--332. ACM, 2008.
[26]
Andrew C. Yao. Protocols for secure computation. In Proc. of IEEE Symposium on Foundations of Computer Science, pages 160--164, 1982.
[27]
J. Yin, J. Martin, A. Venkataramani, L. Alvisi, and M. Dahlin. Separating agreement from execution for byzantine fault tolerant services, 2003.

Cited By

View all
  • (2024)Query Integrity in Smart EnvironmentsSecurity and Privacy in Smart Environments10.1007/978-3-031-66708-4_2(25-48)Online publication date: 29-Oct-2024
  • (2022)Integrity verification in cloud key-value storesProceedings of the 15th ACM International Conference on Systems and Storage10.1145/3534056.3534996(140-140)Online publication date: 6-Jun-2022
  • (2019)Integrity Authentication for SQL Query Evaluation on Outsourced Databases: A SurveyIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2019.2947061(1-1)Online publication date: 2019
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
CIKM '08: Proceedings of the 17th ACM conference on Information and knowledge management
October 2008
1562 pages
ISBN:9781595939913
DOI:10.1145/1458082
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 26 October 2008

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. audit
  2. database outsourcing
  3. encryption
  4. integrity
  5. security

Qualifiers

  • Research-article

Conference

CIKM08
CIKM08: Conference on Information and Knowledge Management
October 26 - 30, 2008
California, Napa Valley, USA

Acceptance Rates

Overall Acceptance Rate 1,861 of 8,427 submissions, 22%

Upcoming Conference

CIKM '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)7
  • Downloads (Last 6 weeks)0
Reflects downloads up to 23 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Query Integrity in Smart EnvironmentsSecurity and Privacy in Smart Environments10.1007/978-3-031-66708-4_2(25-48)Online publication date: 29-Oct-2024
  • (2022)Integrity verification in cloud key-value storesProceedings of the 15th ACM International Conference on Systems and Storage10.1145/3534056.3534996(140-140)Online publication date: 6-Jun-2022
  • (2019)Integrity Authentication for SQL Query Evaluation on Outsourced Databases: A SurveyIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2019.2947061(1-1)Online publication date: 2019
  • (2019)CorrectMR: Authentication of Distributed SQL Execution on MapReduceIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2019.2935968(1-1)Online publication date: 2019
  • (2019)Integrity and Confidentiality in Cloud Outsourced DataAin Shams Engineering Journal10.1016/j.asej.2019.03.002Online publication date: Apr-2019
  • (2018)Data Integrity Verification in Column-Oriented NoSQL DatabasesData and Applications Security and Privacy XXXII10.1007/978-3-319-95729-6_11(165-181)Online publication date: 10-Jul-2018
  • (2017) Secure kNN Computation and Integrity Assurance of Data Outsourcing in the Cloud Mathematical Problems in Engineering10.1155/2017/81097302017:1Online publication date: 13-Dec-2017
  • (2017)Crowdsourced Data Integrity Verification for Key-Value Stores in the CloudProceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing10.1109/CCGRID.2017.17(498-503)Online publication date: 14-May-2017
  • (2017)Authentication of outsourced linear function query with efficient updatesCluster Computing10.1007/s10586-017-1064-4Online publication date: 27-Jul-2017
  • (2017)Supporting Users in Data Outsourcing and Protection in the CloudCloud Computing and Services Science10.1007/978-3-319-62594-2_1(3-15)Online publication date: 20-Jul-2017
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media