Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Combining fragmentation and encryption to protect privacy in data storage

Published: 30 July 2010 Publication History

Abstract

The impact of privacy requirements in the development of modern applications is increasing very quickly. Many commercial and legal regulations are driving the need to develop reliable solutions for protecting sensitive information whenever it is stored, processed, or communicated to external parties. To this purpose, encryption techniques are currently used in many scenarios where data protection is required since they provide a layer of protection against the disclosure of personal information, which safeguards companies from the costs that may arise from exposing their data to privacy breaches. However, dealing with encrypted data may make query processing more expensive.
In this article, we address these issues by proposing a solution to enforce the privacy of data collections that combines data fragmentation with encryption. We model privacy requirements as confidentiality constraints expressing the sensitivity of attributes and their associations. We then use encryption as an underlying (conveniently available) measure for making data unintelligible while exploiting fragmentation as a way to break sensitive associations among attributes. We formalize the problem of minimizing the impact of fragmentation in terms of number of fragments and their affinity and present two heuristic algorithms for solving such problems. We also discuss experimental results, comparing the solutions returned by our heuristics with respect to optimal solutions, which show that the heuristics, while guaranteeing a polynomial-time computation cost are able to retrieve solutions close to optimum.

References

[1]
Aggarwal, G., Bawa, M., Ganesan, P., Garcia-Molina, H., Kenthapadi, K., Motwani, R., Srivastava, U., Thomas, D., and Xu, Y. 2005. Two can keep a secret: A distributed architecture for secure database services. In Proceedings of the Conference on Innovative Data Systems Research. http://www.cidrdb.org/.
[2]
Biskup, J., Embley, D., and Lochner, J. 2008. Reducing inference control to access control for normalized database schemas. Inform. Process. Lett. 106, 1, 8--12.
[3]
Biskup, J. and Lochner, J. 2007. Enforcing confidentiality in relational databases by reducing inference control to access control. In Proceedings of the 10th International Conference on Information Security.
[4]
CA SB 1386. 2002. California senate bill SB 1386.
[5]
Ceselli, A., Damiani, E., De Capitani di Vimercati, S., Jajodia, S., Paraboschi, S., and Samarati, P. 2005. Modeling and assessing inference exposure in encrypted databases. ACM Trans. Inform. Syst. Secur. 8, 1, 119--152.
[6]
Chaudhuri, S. 1998. An overview of query optimization in relational systems. In Proceedings of the 17th SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems. ACM, New York.
[7]
Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., and Samarati, P. 2007a. Fragmentation and encryption to enforce privacy in data storage. In Proceedings of the 12th European Symposium on Research in Computer Security. Springer, Berlin.
[8]
Ciriani, V., De Capitani di Vimercati, S., Foresti, S., and Samarati, P. 2007b. k-Anonymity. In Secure Data Management in Decentralized Systems, T. Yu and S. Jajodia, Eds. Springer-Verlag, Berlin.
[9]
Damiani, E., De Capitani di Vimercati, S., Jajodia, S., Paraboschi, S., and Samarati, P. 2003. Balancing confidentiality and efficiency in untrusted relational DBMSs. In Proceedings of the 10th Conference on Computer and Communications Security. ACM, New York.
[10]
Dawson, S., De Capitani di Vimercati, S., Lincoln, P., and Samarati, P. 2002. Maximizing sharing of protected information. J. Comput. Syst. Sci. 64, 3, 496--541.
[11]
Garey, M. R. and Johnson, D. S. 1979. Computers and Intractability: A Guide to the Theory of NP-Completeness. W. H. Freeman, New York.
[12]
Hacigümüs, H., Iyer, B., and Mehrotra, S. 2002a. Providing database as a service. In Proceedings of the 18th International Conference on Data Engineering. IEEE, Los Alamitos, CA.
[13]
Hacigümüs, H., Iyer, B., Mehrotra, S., and Li, C. 2002b. Executing SQL over encrypted data in the database-service-provider model. In Proceedings of the SIGMOD International Conference on Management of Data. ACM, New York.
[14]
Hofmeister, T. and Lefmann, H. 1998. Approximating maximum independent sets in uniform hypergraphs. In Proceeding of the 23rd International Symposium on Mathematical Foundations of Computer Science. Springer, Berlin.
[15]
Krivelevich, M. and Sudakov, B. 2003. Approximate coloring of uniform hypergraphs. J. Algorithms 49, 1, 2--12.
[16]
Navathe, S., Ceri, S., Wiederhold, G., and Dou, J. 1984. Vertical partitioning algorithms for database design. ACM Trans. Datab. Syst. 9, 4, 680--710.
[17]
Navathe, S. and Ra, M. 1989. Vertical partitioning for database design: A graphical algorithm. In Proceedings of the SIGMOD International Conference on Management of Data. ACM, New York.
[18]
Özsu, M. T. and Valduriez, P. 1999. Principles of Distributed Database Systems 2nd Ed. Prentice-Hall, Upper Saddle River, NJ.
[19]
Personal Data Protection Code. 2003. Legislative Decree no. 196.
[20]
PICDSS. 2006. Payment Card Industry (PCI) data security standard. https://www. pcisecuritystandards.org/pdfs/pci dss v1-1.pdf.
[21]
Samarati, P. 2001. Protecting respondents' identities in microdata release. IEEE Trans. Knowl. Data Eng. 13, 6, 1010--1017.
[22]
Schneier, B. 1996. Applied Cryptography 2nd Ed. John Wiley & Sons, New York.
[23]
Trouessin, G., Fabre, J. C., and Deswarte, Y. 1991. Reliable processing of confidential information. In Proceedings of the 7th International Information Security Conference. Springer, Berlin.
[24]
Wang, H. and Lakshmanan, L. V. S. 2006. Efficient secure query evaluation over encrypted XML databases. In Proceedings of the 32nd International Conference on Very Large Data bases. ACM, New York.

Cited By

View all
  • (2024)Evolutionary Dynamic Database Partitioning Optimization for Privacy and UtilityIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.330228421:4(2296-2311)Online publication date: Jul-2024
  • (2024)Lightweight and privacy-preserving hierarchical federated learning mechanism for artificial intelligence-generated image contentJournal of Real-Time Image Processing10.1007/s11554-024-01524-721:4Online publication date: 8-Aug-2024
  • (2024)Privacy-preserving vertical federated broad learning system for artificial intelligence generated image contentJournal of Real-Time Image Processing10.1007/s11554-023-01393-621:1Online publication date: 2-Jan-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Information and System Security
ACM Transactions on Information and System Security  Volume 13, Issue 3
July 2010
253 pages
ISSN:1094-9224
EISSN:1557-7406
DOI:10.1145/1805974
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 30 July 2010
Accepted: 01 July 2009
Received: 01 June 2008
Published in TISSEC Volume 13, Issue 3

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Privacy
  2. encryption
  3. fragmentation

Qualifiers

  • Research-article
  • Research
  • Refereed

Funding Sources

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)60
  • Downloads (Last 6 weeks)4
Reflects downloads up to 28 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Evolutionary Dynamic Database Partitioning Optimization for Privacy and UtilityIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.330228421:4(2296-2311)Online publication date: Jul-2024
  • (2024)Lightweight and privacy-preserving hierarchical federated learning mechanism for artificial intelligence-generated image contentJournal of Real-Time Image Processing10.1007/s11554-024-01524-721:4Online publication date: 8-Aug-2024
  • (2024)Privacy-preserving vertical federated broad learning system for artificial intelligence generated image contentJournal of Real-Time Image Processing10.1007/s11554-023-01393-621:1Online publication date: 2-Jan-2024
  • (2024)Query Integrity in Smart EnvironmentsSecurity and Privacy in Smart Environments10.1007/978-3-031-66708-4_2(25-48)Online publication date: 29-Oct-2024
  • (2023)Privacy-preserving Data Splitting Based on Machine Learning2023 3rd International Conference on Electronic Information Engineering and Computer (EIECT)10.1109/EIECT60552.2023.10441883(532-536)Online publication date: 17-Nov-2023
  • (2023)Protecting Data and Queries in Cloud-Based ScenariosSN Computer Science10.1007/s42979-023-01862-64:5Online publication date: 10-Jun-2023
  • (2023)Multi-cloud applications: data and code fragmentation for improved securityInternational Journal of Information Security10.1007/s10207-022-00658-822:3(713-721)Online publication date: 3-Jan-2023
  • (2022)Secure data outsourcing in presence of the inference problemJournal of Parallel and Distributed Computing10.1016/j.jpdc.2021.09.006160:C(1-15)Online publication date: 1-Feb-2022
  • (2022)Digital infrastructure policies for data security and privacy in smart citiesSmart Cities Policies and Financing10.1016/B978-0-12-819130-9.00007-3(249-261)Online publication date: 2022
  • (2022)MDDE: multitasking distributed differential evolution for privacy-preserving database fragmentationThe VLDB Journal — The International Journal on Very Large Data Bases10.1007/s00778-021-00718-w31:5(957-975)Online publication date: 4-Jan-2022
  • Show More Cited By

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media