A novel secure data outsourcing scheme based on data hiding and secret sharing for relational databases

被引:2
作者
Rahmani, Peyman [1 ]
Taheri, Mohammad [1 ]
Fakhrahmad, Seyed Mostafa [1 ]
机构
[1] Shiraz Univ, Dept Comp Sci & Engn, Shiraz, Iran
关键词
confidentiality; data hiding; data outsourcing; relational database; secrecy; secret sharing; FRAGILE WATERMARKING SCHEME; HOMOMORPHIC ENCRYPTION; KEYWORD SEARCH; PRIVACY; ROBUST;
D O I
10.1049/cmu2.12581
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Data encryption-based and secret sharing-based data outsourcing schemes protect the confidentiality of sensitive attributes but not their secrecy. Ciphertexts/shares generated by a data encryption/secret sharing scheme can attract the attention of interceptors. Thus, it is desired to hide the existence of highly-sensitive attributes (as secret attributes) in the outsourced relations in addition to protecting their contents. This paper proposes a novel scheme that integrates data hiding with secret sharing for relational databases to protect both the secrecy and confidentiality of secret attributes. It embeds one or multiple secret attributes in a relation into one or multiple cover attributes in the same relation. A set of share (and possibly index) columns are constructed such that they are pretended to be associated with only the cover attributes, while those share columns and some virtual share columns can be used to recover both the secret and cover attributes. What interceptors observe in each relation include the attributes stored in plaintext and the share (and possibly index) columns associated with the cover attributes but not any extra column. Thus, they find nothing suspicious. This is the first effective data hiding scheme for relational databases that protects the secrecy of secret attributes.
引用
收藏
页码:775 / 789
页数:15
相关论文
共 46 条
[1]   Secure communication and archiving of low altitude remote sensing data using high capacity fragile data hiding [J].
Akhtarkavan, Ehsan ;
Majidi, Babak ;
Manzuri, Mohammad Taghi .
MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (08) :10325-10351
[2]   A novel searchable encryption scheme to reduce the access pattern leakage [J].
Awais, Muhammad ;
Tahir, Shahzaib ;
Khan, Fawad ;
Tahir, Hasan ;
Tahir, Ruhma ;
Latif, Rabia ;
Umair, Mir Yasir .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2022, 133 :338-350
[3]   A new secure and searchable data outsourcing leveraging a Bucket-Chain index tree [J].
Bahrami, Somaye ;
Ghasemi, Reza .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 67
[4]   Cryptanalysis of a homomorphic encryption scheme [J].
Bogos, Sonia ;
Gaspoz, John ;
Vaudenay, Serge .
CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2018, 10 (01) :27-39
[5]  
Boldyreva A, 2009, LECT NOTES COMPUT SC, V5479, P224, DOI 10.1007/978-3-642-01001-9_13
[6]   Securing medical data by role-based user policy with partially homomorphic encryption in AWS cloud [J].
Boomija, M. D. ;
Raja, S. V. Kasmir .
SOFT COMPUTING, 2023, 27 (01) :559-568
[7]  
Brakerski Z, 2011, LECT NOTES COMPUT SC, V6841, P505, DOI 10.1007/978-3-642-22792-9_29
[8]  
Dautrich JL, 2012, LECT NOTES COMPUT SC, V7371, P145, DOI 10.1007/978-3-642-31540-4_12
[9]   Dividing secrets to secure data outsourcing [J].
Emekci, Fatih ;
Methwally, Ahmed ;
Agrawal, Divyakant ;
El Abbadi, Amr .
INFORMATION SCIENCES, 2014, 263 :198-210
[10]   Fully Homomorphic Encryption Using Ideal Lattices [J].
Gentry, Craig .
STOC'09: PROCEEDINGS OF THE 2009 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2009, :169-178