skip to main content
10.1145/2588555.2588572acmconferencesArticle/Chapter ViewAbstractPublication PagesmodConference Proceedingsconference-collections
research-article

Secure query processing with data interoperability in a cloud database environment

Published:18 June 2014Publication History

ABSTRACT

We address security issues in a cloud database system which employs the DBaaS model. In such a model, a data owner (DO) exports its data to a cloud database service provider (SP). To provide data security, sensitive data is encrypted by the DO before it is uploaded to the SP. Existing encryption schemes, however, are only partially homomorphic in the sense that each of them was designed to allow one specific type of computation to be done on encrypted data. These existing schemes cannot be integrated to answer real practical queries that involve operations of different kinds. We propose and analyze a secure query processing system (SDB) on relational tables and a set of elementary operators on encrypted data that allow data interoperability, which allows a wide range of SQL queries to be processed by the SP on encrypted information. We prove that our encryption scheme is secure against two types of threats and that it is practically efficient.

References

  1. R. Agrawal and J. Kiernan et al. Order-preserving encryption for numeric data. In SIGMOD, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. A. Arasu et al. Secure database-as-a-service with cipherbase. In SIGMOD, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. S. Bajaj et al. Trusteddb: a trusted hardware based database with privacy and data confidentiality. In SIGMOD, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. D. Bogdanov et al. A universal toolkit for cryptographically secure privacy-preserving data mining. In PAISI, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. A. Boldyreva et al. Order-preserving encryption revisited: Improved security analysis and alternative solutions. In CRYPTO, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. D. Boneh et al. Public key encryption with keyword search. In EUROCRYPT, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  7. E. Damiani et al. Balancing confidentiality and efficiency in untrusted relational dbmss. In CCS, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. S. Das and D. Agrawal et al. Elastras: An elastic transactional data store in the cloud. CoRR, 2010.Google ScholarGoogle Scholar
  9. S. Das, V. Narasayya, and F. Li et al. CPU sharing techniques for performance isolation in multi-tenant relational database-as-a-service. PVLDB, 2014.Google ScholarGoogle Scholar
  10. A. J. Elmore, S. Das, D. Agrawal, and A. El Abbadi. Zephyr: live migration in shared nothing databases for elastic cloud platforms. In SIGMOD, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. F. Emekçi, D. Agrawal, and A. El Abbadi. Privacy preserving query processing using third parties. In ICDE, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. C. Gentry. Fully homomorphic encryption using ideal lattices. In STOC, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. C. Gentry et al. Fully homomorphic encryption with polylog overhead. In EUROCRYPT, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game. In STOC, 1987. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. H. Hacigümüs, S. Mehrotra, and B. R. Iyer. Providing database as a service. In ICDE, 2002.Google ScholarGoogle ScholarCross RefCross Ref
  16. H. Hacigümüs et al.and B. R. Iyer, C. Li, and S. Mehrotra. Executing sql over encrypted data in the database-service-provider model. In SIGMOD, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. B. Hore, S. Mehrotra, and G. Tsudik. A privacy preserving index for range queries. In VLDB, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. M. Kantarcioglu and C. Chris. Privacy-preserving distributed mining of association rules on horizontally partitioned data. TKDE, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. A. J. Menezes, P. C. Oorschot, and S. A. Vanstone. Handbook of Applied Cryptography. CRC Press, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In EUROCRYPT, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. S. Papadopoulos et al. Secure and efficient in-network processing of exact sum queries. In ICDE, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. R. A. Popa et al. Cryptdb: processing queries on an encrypted database. CACM, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. R. L. Rivest et al.and A. Shamir and L. M. Adleman. A method for obtaining digital signatures and public-key cryptosystems. CACM, 1978. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. A. Soror et al. Automatic virtual machine configuration for database workloads. In SIGMOD, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. S. Tu and M. F. Kaashoek et al. Processing analytical queries over encrypted data. In PVLDB, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. J. Vaidya et al. Secure set intersection cardinality with application to association rule mining. JCS, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. S. Wang, D. Agrawal, and A. El Abbadi. A comprehensive framework for secure query processing on relational data in the cloud. In SDM, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. P. Wong, Z. He, and E. Lo. Parallel analytics as a service. In SIGMOD, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. W. K. Wong et al. Secure query processing with data interoperability in a cloud database environment. Technical Report TR-2014-03, Department of Computer Science, University of Hong Kong, 2014.Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. A. C. Yao. Protocols for secure computations (extended abstract). In FOCS, 1982. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Secure query processing with data interoperability in a cloud database environment

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        SIGMOD '14: Proceedings of the 2014 ACM SIGMOD International Conference on Management of Data
        June 2014
        1645 pages
        ISBN:9781450323765
        DOI:10.1145/2588555

        Copyright © 2014 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 18 June 2014

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        SIGMOD '14 Paper Acceptance Rate107of421submissions,25%Overall Acceptance Rate785of4,003submissions,20%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader