Information Leakage in Cloud Data Warehouses

被引:5
作者
Ahmadian, Mohammad [1 ]
Marinescu, Dan C. [1 ]
机构
[1] Univ Cent Florida, Dept Comp Sci, Orlando, FL 32816 USA
来源
IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING | 2020年 / 5卷 / 02期
关键词
Encryption; Cloud computing; Data warehouses; Sensitivity analysis; NoSQL databases; Database as a service; information leakage; capacity of a leakage channel; sensitivity analysis; approximate query processing; biased sampling; cross-correlation estimation; SECURITY; SEARCH;
D O I
10.1109/TSUSC.2018.2838520
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Information leakage is the inadvertent disclosure of sensitive information through correlation of records from several databases/collections of a cloud data warehouse. Malicious insiders pose a serious threat to cloud data security and this justifies the focus on information leakage due to rogue employees or to outsiders using the credentials of legitimate employees. The discussion in this paper is restricted to NoSQL databases with a flexible schema. Data encryption can reduce information leakage, but it is impractical to encrypt large databases and/or all fields of database documents. Encryption limits the operations that can be carried on the data in a database. It is thus, critical to distinguish sensitive documents in a data warehouse and concentrate on efforts to protect them. The capacity of a leakage channel introduced in this work quantifies the intuitively obvious means to trigger alarms when an insider attacker uses excessive computer resources to correlate information in multiple databases. The Sensitivity Analysis based on Data Sampling (SADS) introduced in this paper balances the trade-offs between higher efficiency in identifying the risks posed by information leakage and the accuracy of the results obtained by sampling very large collections of documents. The paper reports on experiments assessing the effectiveness of SADS and the use of selective disinformation to limit information leakage. Cloud services identifying sensitive records and reducing the risk of information leakage are also discussed.
引用
收藏
页码:192 / 203
页数:12
相关论文
共 40 条
[1]  
Acharya S, 1999, SIGMOD RECORD, VOL 28, NO 2 - JUNE 1999, P275, DOI 10.1145/304181.304207
[2]   Knowing When You're Wrong: Building Fast and Reliable Approximate Query Processing Systems [J].
Agarwal, Sameer ;
Milner, Henry ;
Kleiner, Ariel ;
Talwalkar, Ameet ;
Jordan, Michael ;
Madden, Samuel ;
Mozafari, Barzan ;
Stoica, Ion .
SIGMOD'14: PROCEEDINGS OF THE 2014 ACM SIGMOD INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA, 2014, :481-492
[3]   Security of Applications Involving Multiple Organizations - Order Preserving Encryption in Hybrid Cloud Environments [J].
Ahmadian, Mohammad ;
Paya, Ashkan ;
Marinescu, Dan C. .
PROCEEDINGS OF 2014 IEEE INTERNATIONAL PARALLEL & DISTRIBUTED PROCESSING SYMPOSIUM WORKSHOPS (IPDPSW), 2014, :895-904
[4]   SecureNoSQL: An approach for secure search of encrypted NoSQL databases in the public cloud [J].
Ahmadian, Mohammad ;
Plochan, Frank ;
Roessler, Zak ;
Marinescu, Dan C. .
INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2017, 37 (02) :63-74
[5]   Statistical mechanics of complex networks [J].
Albert, R ;
Barabási, AL .
REVIEWS OF MODERN PHYSICS, 2002, 74 (01) :47-97
[6]  
[Anonymous], 2003, P 2003 ACM SIGMOD IN, DOI DOI 10.1145/872757.872822
[7]  
[Anonymous], 2016, TREACH 12 CLOUD COMP
[8]  
[Anonymous], 2013, Cloud Computing - Theory and Practice
[9]  
[Anonymous], 2010, TOP THREATS CLOUD CO
[10]  
[Anonymous], 2009, SEC GUID CRIT AR FOC