Database access pattern protection without full-shuffles
Privacy protection is one of the fundamental security requirements for database outsourcing. A major threat is information leakage from database access patterns generated by query executions. The standard private information retrieval (PIR) schemes, which are widely regarded as theoretical solutions...
محفوظ في:
المؤلفون الرئيسيون: | , , |
---|---|
التنسيق: | text |
اللغة: | English |
منشور في: |
Institutional Knowledge at Singapore Management University
2011
|
الموضوعات: | |
الوصول للمادة أونلاين: | https://ink.library.smu.edu.sg/sis_research/1362 https://ink.library.smu.edu.sg/context/sis_research/article/2361/viewcontent/Database_access_pattern_protection_without_full_shuffles.pdf |
الوسوم: |
إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
|
id |
sg-smu-ink.sis_research-2361 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-23612019-04-01T09:22:31Z Database access pattern protection without full-shuffles DING, Xuhua YANG, Yanjiang DENG, Robert H. Privacy protection is one of the fundamental security requirements for database outsourcing. A major threat is information leakage from database access patterns generated by query executions. The standard private information retrieval (PIR) schemes, which are widely regarded as theoretical solutions, entail O(n) computational overhead per query for a database with items. Recent works propose to protect access patterns by introducing a trusted component with constant storage size. The resulting privacy assurance is as strong as PIR, though with O(1) online computation cost, they still have O(n) amortized cost per query due to periodically full database shuffles. In this paper, we design a novel scheme in the same model with provable security, which only shuffles a portion of the database. The amortized server computational complexity is reduced to With a secure storage storing thousands of items, our scheme can protect the access pattern privacy of databases of billions of entries, at a lower cost than those using ORAM-based poly-logarithm algorithms. 2011-02-01T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/1362 info:doi/10.1109/TIFS.2010.2101062 https://ink.library.smu.edu.sg/context/sis_research/article/2361/viewcontent/Database_access_pattern_protection_without_full_shuffles.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Database data privacy information security. Information Security |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Database data privacy information security. Information Security |
spellingShingle |
Database data privacy information security. Information Security DING, Xuhua YANG, Yanjiang DENG, Robert H. Database access pattern protection without full-shuffles |
description |
Privacy protection is one of the fundamental security requirements for database outsourcing. A major threat is information leakage from database access patterns generated by query executions. The standard private information retrieval (PIR) schemes, which are widely regarded as theoretical solutions, entail O(n) computational overhead per query for a database with items. Recent works propose to protect access patterns by introducing a trusted component with constant storage size. The resulting privacy assurance is as strong as PIR, though with O(1) online computation cost, they still have O(n) amortized cost per query due to periodically full database shuffles. In this paper, we design a novel scheme in the same model with provable security, which only shuffles a portion of the database. The amortized server computational complexity is reduced to With a secure storage storing thousands of items, our scheme can protect the access pattern privacy of databases of billions of entries, at a lower cost than those using ORAM-based poly-logarithm algorithms. |
format |
text |
author |
DING, Xuhua YANG, Yanjiang DENG, Robert H. |
author_facet |
DING, Xuhua YANG, Yanjiang DENG, Robert H. |
author_sort |
DING, Xuhua |
title |
Database access pattern protection without full-shuffles |
title_short |
Database access pattern protection without full-shuffles |
title_full |
Database access pattern protection without full-shuffles |
title_fullStr |
Database access pattern protection without full-shuffles |
title_full_unstemmed |
Database access pattern protection without full-shuffles |
title_sort |
database access pattern protection without full-shuffles |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2011 |
url |
https://ink.library.smu.edu.sg/sis_research/1362 https://ink.library.smu.edu.sg/context/sis_research/article/2361/viewcontent/Database_access_pattern_protection_without_full_shuffles.pdf |
_version_ |
1770570993835704320 |