Security and searchability in secret sharing-based data outsourcing

被引:18
|
作者
Hadavi, Mohammad Ali [1 ]
Jalili, Rasool [1 ]
Damiani, Ernesto [2 ,3 ]
Cimato, Stelvio [2 ]
机构
[1] Sharif Univ Technol, Dept Comp Engn, Tehran, Iran
[2] Univ Milan, Dept Comp Sci, Crema, Italy
[3] Khalifa Univ, Informat Secur Grp, Abu Dhabi, U Arab Emirates
关键词
Database outsourcing; Data confidentiality; Searchable secret sharing; Partitioning; Query processing; FRAGMENTATION; MANAGEMENT; EFFICIENT; SERVICE; PRIVACY; ACCESS;
D O I
10.1007/s10207-015-0277-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A major challenge organizations face when hosting or moving their data to the Cloud is how to support complex queries over outsourced data while preserving their confidentiality. In principle, encryption-based systems can support querying encrypted data, but their high complexity has severely limited their practical use. In this paper, we propose an efficient yet secure secret sharing-based approach for outsourcing relational data to honest-but-curious data servers. The problem with using secret sharing in a data outsourcing scenario is how to efficiently search within randomly generated shares. We present multiple partitioning methods that enable clients to efficiently search among shared secrets while preventing inference attacks on the part of data servers, even if they can observe shares and queries. Also, we prove that with some of our partitioning methods the probability of finding a correspondence between a set of shares and their original values is almost equal to that of a random guess. We discuss query processing for different types of queries including equality, range, aggregation, projection, join, and update queries. Our extensive experimentation confirms the practicality and efficiency of our approach in terms of query execution time, storage, and communication overheads.
引用
收藏
页码:513 / 529
页数:17
相关论文
共 50 条
  • [1] Security and searchability in secret sharing-based data outsourcing
    Mohammad Ali Hadavi
    Rasool Jalili
    Ernesto Damiani
    Stelvio Cimato
    International Journal of Information Security, 2015, 14 : 513 - 529
  • [2] New attacks on secret sharing-based data outsourcing: toward a resistant scheme
    Rahmani, Peyman
    Fakhrahmad, Seyed Mostafa
    Taheri, Mohammad
    JOURNAL OF SUPERCOMPUTING, 2022, 78 (14): : 15749 - 15785
  • [3] Secret Sharing-Based IoT Text Data Outsourcing: A Secure and Efficient Scheme
    Tang, Zhaohui
    IEEE ACCESS, 2021, 9 : 76908 - 76920
  • [4] New attacks on secret sharing-based data outsourcing: toward a resistant scheme
    Peyman Rahmani
    Seyed Mostafa Fakhrahmad
    Mohammad Taheri
    The Journal of Supercomputing, 2022, 78 : 15749 - 15785
  • [5] Security Limitations of Using Secret Sharing for Data Outsourcing
    Dautrich, Jonathan L.
    Ravishankar, Chinya V.
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXVI, 2012, 7371 : 145 - 160
  • [6] Secret Sharing-Based Chaotic Image Encryption
    Zhang, Tiejun
    El-Fatyany, Aya
    Li, Li
    Amin, Mohamed
    Abd El-Latif, Ahmed A.
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (07): : 217 - 224
  • [7] Memristors for Secret Sharing-Based Lightweight Authentication
    Arafin, Md Tanvir
    Qu, Gang
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2018, 26 (12) : 2671 - 2683
  • [8] Blockchain-based composite access control and secret sharing-based data distribution for security-aware deployments
    Pampattiwar, Kalyani Nikhilesh
    Chavan, Pallavi Vijay
    International Journal of Information and Computer Security, 2024, 25 (3-4) : 292 - 332
  • [9] Secret Sharing Scheme Based on Cauchy Matrix for Data Outsourcing
    Prasad, Vishnu C.
    Kumar, Arun Raj P.
    SIN'17: PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2017, : 315 - 318
  • [10] Secret Sharing-based Authenticated Key Agreement Protocol
    Dzurenda, Petr
    Ricci, Sara
    Marques, Raul Casanova
    Hajny, Jan
    Cika, Petr
    ARES 2021: 16TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, 2021,