Masking Page Reference Patterns in Encryption Databases on Untrusted Storage

To support ubiquitous computing, the underlying data have to be persistent and available anywhere-anytime. The data thus have to migrate from devices that are local to individual computers, to shared storage volumes that are accessible over open network. This potentially exposes the data to heighten...

Full description

Saved in:
Bibliographic Details
Main Authors: MA, Xi, PANG, Hwee Hwa, TAN, Kian-Lee
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2006
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/1201
https://ink.library.smu.edu.sg/context/sis_research/article/2200/viewcontent/Masking_Page_Reference_Patterns_in_Encrypted_Databases_on_Untrusted_Storage__edited_.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-2200
record_format dspace
spelling sg-smu-ink.sis_research-22002017-07-11T12:40:12Z Masking Page Reference Patterns in Encryption Databases on Untrusted Storage MA, Xi PANG, Hwee Hwa TAN, Kian-Lee To support ubiquitous computing, the underlying data have to be persistent and available anywhere-anytime. The data thus have to migrate from devices that are local to individual computers, to shared storage volumes that are accessible over open network. This potentially exposes the data to heightened security risks. In particular, the activity on a database exhibits regular page reference patterns that could help attackers learn logical links among physical pages and then launch additional attacks. We propose two countermeasures to mitigate the risk of attacks initiated through analyzing the shared storage server’s activity for those page patterns. The first countermeasure relocates data pages according to which page sequences they are in. The second countermeasure enhances the first by randomly prefetching pages from predicted page sequences. We have implemented the two countermeasures in MySQL, and experiment results demonstrate their effectiveness and practicality. 2006-09-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/1201 info:doi/10.1016/j.datak.2005.06.003 https://ink.library.smu.edu.sg/context/sis_research/article/2200/viewcontent/Masking_Page_Reference_Patterns_in_Encrypted_Databases_on_Untrusted_Storage__edited_.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Page reference patterns Plausible deniability Traffic analysis Pattern mining Databases and Information Systems Numerical Analysis and Scientific Computing
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Page reference patterns
Plausible deniability
Traffic analysis
Pattern mining
Databases and Information Systems
Numerical Analysis and Scientific Computing
spellingShingle Page reference patterns
Plausible deniability
Traffic analysis
Pattern mining
Databases and Information Systems
Numerical Analysis and Scientific Computing
MA, Xi
PANG, Hwee Hwa
TAN, Kian-Lee
Masking Page Reference Patterns in Encryption Databases on Untrusted Storage
description To support ubiquitous computing, the underlying data have to be persistent and available anywhere-anytime. The data thus have to migrate from devices that are local to individual computers, to shared storage volumes that are accessible over open network. This potentially exposes the data to heightened security risks. In particular, the activity on a database exhibits regular page reference patterns that could help attackers learn logical links among physical pages and then launch additional attacks. We propose two countermeasures to mitigate the risk of attacks initiated through analyzing the shared storage server’s activity for those page patterns. The first countermeasure relocates data pages according to which page sequences they are in. The second countermeasure enhances the first by randomly prefetching pages from predicted page sequences. We have implemented the two countermeasures in MySQL, and experiment results demonstrate their effectiveness and practicality.
format text
author MA, Xi
PANG, Hwee Hwa
TAN, Kian-Lee
author_facet MA, Xi
PANG, Hwee Hwa
TAN, Kian-Lee
author_sort MA, Xi
title Masking Page Reference Patterns in Encryption Databases on Untrusted Storage
title_short Masking Page Reference Patterns in Encryption Databases on Untrusted Storage
title_full Masking Page Reference Patterns in Encryption Databases on Untrusted Storage
title_fullStr Masking Page Reference Patterns in Encryption Databases on Untrusted Storage
title_full_unstemmed Masking Page Reference Patterns in Encryption Databases on Untrusted Storage
title_sort masking page reference patterns in encryption databases on untrusted storage
publisher Institutional Knowledge at Singapore Management University
publishDate 2006
url https://ink.library.smu.edu.sg/sis_research/1201
https://ink.library.smu.edu.sg/context/sis_research/article/2200/viewcontent/Masking_Page_Reference_Patterns_in_Encrypted_Databases_on_Untrusted_Storage__edited_.pdf
_version_ 1770570896087449600