Masking Page Reference Patterns in Encryption Databases on Untrusted Storage
To support ubiquitous computing, the underlying data have to be persistent and available anywhere-anytime. The data thus have to migrate from devices that are local to individual computers, to shared storage volumes that are accessible over open network. This potentially exposes the data to heighten...
Saved in:
Main Authors: | , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2006
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/1201 https://ink.library.smu.edu.sg/context/sis_research/article/2200/viewcontent/Masking_Page_Reference_Patterns_in_Encrypted_Databases_on_Untrusted_Storage__edited_.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-2200 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-22002017-07-11T12:40:12Z Masking Page Reference Patterns in Encryption Databases on Untrusted Storage MA, Xi PANG, Hwee Hwa TAN, Kian-Lee To support ubiquitous computing, the underlying data have to be persistent and available anywhere-anytime. The data thus have to migrate from devices that are local to individual computers, to shared storage volumes that are accessible over open network. This potentially exposes the data to heightened security risks. In particular, the activity on a database exhibits regular page reference patterns that could help attackers learn logical links among physical pages and then launch additional attacks. We propose two countermeasures to mitigate the risk of attacks initiated through analyzing the shared storage server’s activity for those page patterns. The first countermeasure relocates data pages according to which page sequences they are in. The second countermeasure enhances the first by randomly prefetching pages from predicted page sequences. We have implemented the two countermeasures in MySQL, and experiment results demonstrate their effectiveness and practicality. 2006-09-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/1201 info:doi/10.1016/j.datak.2005.06.003 https://ink.library.smu.edu.sg/context/sis_research/article/2200/viewcontent/Masking_Page_Reference_Patterns_in_Encrypted_Databases_on_Untrusted_Storage__edited_.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Page reference patterns Plausible deniability Traffic analysis Pattern mining Databases and Information Systems Numerical Analysis and Scientific Computing |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Page reference patterns Plausible deniability Traffic analysis Pattern mining Databases and Information Systems Numerical Analysis and Scientific Computing |
spellingShingle |
Page reference patterns Plausible deniability Traffic analysis Pattern mining Databases and Information Systems Numerical Analysis and Scientific Computing MA, Xi PANG, Hwee Hwa TAN, Kian-Lee Masking Page Reference Patterns in Encryption Databases on Untrusted Storage |
description |
To support ubiquitous computing, the underlying data have to be persistent and available anywhere-anytime. The data thus have to migrate from devices that are local to individual computers, to shared storage volumes that are accessible over open network. This potentially exposes the data to heightened security risks. In particular, the activity on a database exhibits regular page reference patterns that could help attackers learn logical links among physical pages and then launch additional attacks. We propose two countermeasures to mitigate the risk of attacks initiated through analyzing the shared storage server’s activity for those page patterns. The first countermeasure relocates data pages according to which page sequences they are in. The second countermeasure enhances the first by randomly prefetching pages from predicted page sequences. We have implemented the two countermeasures in MySQL, and experiment results demonstrate their effectiveness and practicality. |
format |
text |
author |
MA, Xi PANG, Hwee Hwa TAN, Kian-Lee |
author_facet |
MA, Xi PANG, Hwee Hwa TAN, Kian-Lee |
author_sort |
MA, Xi |
title |
Masking Page Reference Patterns in Encryption Databases on Untrusted Storage |
title_short |
Masking Page Reference Patterns in Encryption Databases on Untrusted Storage |
title_full |
Masking Page Reference Patterns in Encryption Databases on Untrusted Storage |
title_fullStr |
Masking Page Reference Patterns in Encryption Databases on Untrusted Storage |
title_full_unstemmed |
Masking Page Reference Patterns in Encryption Databases on Untrusted Storage |
title_sort |
masking page reference patterns in encryption databases on untrusted storage |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2006 |
url |
https://ink.library.smu.edu.sg/sis_research/1201 https://ink.library.smu.edu.sg/context/sis_research/article/2200/viewcontent/Masking_Page_Reference_Patterns_in_Encrypted_Databases_on_Untrusted_Storage__edited_.pdf |
_version_ |
1770570896087449600 |