Security and searchability in secret sharing-based data outsourcing

被引:18
|
作者
Hadavi, Mohammad Ali [1 ]
Jalili, Rasool [1 ]
Damiani, Ernesto [2 ,3 ]
Cimato, Stelvio [2 ]
机构
[1] Sharif Univ Technol, Dept Comp Engn, Tehran, Iran
[2] Univ Milan, Dept Comp Sci, Crema, Italy
[3] Khalifa Univ, Informat Secur Grp, Abu Dhabi, U Arab Emirates
关键词
Database outsourcing; Data confidentiality; Searchable secret sharing; Partitioning; Query processing; FRAGMENTATION; MANAGEMENT; EFFICIENT; SERVICE; PRIVACY; ACCESS;
D O I
10.1007/s10207-015-0277-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A major challenge organizations face when hosting or moving their data to the Cloud is how to support complex queries over outsourced data while preserving their confidentiality. In principle, encryption-based systems can support querying encrypted data, but their high complexity has severely limited their practical use. In this paper, we propose an efficient yet secure secret sharing-based approach for outsourcing relational data to honest-but-curious data servers. The problem with using secret sharing in a data outsourcing scenario is how to efficiently search within randomly generated shares. We present multiple partitioning methods that enable clients to efficiently search among shared secrets while preventing inference attacks on the part of data servers, even if they can observe shares and queries. Also, we prove that with some of our partitioning methods the probability of finding a correspondence between a set of shares and their original values is almost equal to that of a random guess. We discuss query processing for different types of queries including equality, range, aggregation, projection, join, and update queries. Our extensive experimentation confirms the practicality and efficiency of our approach in terms of query execution time, storage, and communication overheads.
引用
收藏
页码:513 / 529
页数:17
相关论文
共 50 条
  • [21] More than a Fair Share: Network Data Remanence Attacks against Secret Sharing-based Schemes
    Rashidi, Leila
    Kostecki, Daniel
    James, Alexander
    Peterson, Anthony
    Ghaderi, Majid
    Jero, Samuel
    Nita-Rotaru, Cristina
    Okhravi, Hamed
    Safavi-Naini, Reihaneh
    28TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2021), 2021,
  • [22] Resolving a common vulnerability in secret sharing scheme-based data outsourcing schemes
    Ghasemi, Reza
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (02):
  • [23] Secret sharing for cloud data security: a survey
    Varunya Attasena
    Jérôme Darmont
    Nouria Harbi
    The VLDB Journal, 2017, 26 : 657 - 681
  • [24] Secret sharing for cloud data security: a survey
    Attasena, Varunya
    Darmont, Jerome
    Harbi, Nouria
    VLDB JOURNAL, 2017, 26 (05): : 657 - 681
  • [25] An Efficient Secret Sharing-based Storage System for Cloud-based Internet of Things
    Bypour, H.
    Farhadi, M.
    Mortazavi, R.
    INTERNATIONAL JOURNAL OF ENGINEERING, 2019, 32 (08): : 1117 - 1125
  • [26] Protecting Data Privacy and Security for Cloud Computing Based on Secret Sharing
    Yang, Ching-Nung
    Lai, Jia-Bin
    2013 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2013, : 259 - 266
  • [27] Secret Sharing-based Personal Health Records Management for the Internet of Health Things
    Sarosh, Parsa
    Parah, Shabir A.
    Bhat, G. Mohiuddin
    Heidari, Ali Asghar
    Muhammad, Khan
    SUSTAINABLE CITIES AND SOCIETY, 2021, 74
  • [28] Outsourcing Hierarchical Threshold Secret Sharing Scheme Based on Reputation
    Zhang, En
    Zhu, Jun-Zhe
    Li, Gong-Li
    Chang, Jian
    Li, Yu
    SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [29] Secret sharing-based authentication and key agreement protocol for machine-type communications
    Lopes, Ana Paula G.
    Hilgert, Lucas O.
    Gondim, Paulo R. L.
    Lloret, Jaime
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2019, 15 (04)
  • [30] Space efficient secret sharing for implicit data security
    Parakh, Abhishek
    Kak, Subhash
    INFORMATION SCIENCES, 2011, 181 (02) : 335 - 341