Building Disclosure Risk Aware Query Optimizers for Relational Databases

被引:5
作者
Canim, Mustafa [1 ]
Kantarcioglu, Murat [1 ]
Hore, Bijit [2 ]
Mehrotra, Sharad [2 ]
机构
[1] Univ Texas Dallas, Dept Comp Sci, Richardson, TX 75083 USA
[2] Univ Calif Irvine, Dept Comp Sci, Irvine, CA 92717 USA
来源
PROCEEDINGS OF THE VLDB ENDOWMENT | 2010年 / 3卷 / 01期
基金
美国国家科学基金会;
关键词
D O I
10.14778/1920841.1920849
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many DBMS products in the market provide built in encryption support to deal with the security concerns of the organizations. This solution is quite effective in prevent- ing data leakage from compromised/stolen storage devices. However, recent studies show that a significant part of the leaked records have been done so by using specialized malwares that can access the main memory of systems. These malwares can easily capture the sensitive information that are decrypted in the memory including the cryptographic keys used to decrypt them. This can further compromise the security of data residing on disk that are encrypted with the same keys. In this paper we quantify the disclosure risk of encrypted data in a relational DBMS for main memory-based attacks and propose modifications to the standard query processing mechanism to minimize such risks. Specif- ically, we propose query optimization techniques and disclo- sure models to design a data-sensitivity aware query opti- mizer. We implemented a prototype DBMS by modifying both the storage engine and optimizer of MySQL-InnoDB server. The experimental results show that the disclosure risk of such attacks can be reduced dramatically while in- curring a small performance overhead in most cases.
引用
收藏
页码:13 / 24
页数:12
相关论文
共 16 条
  • [1] Anciaux N., 2007, P 2007 ACM SIGMOD IN, P677
  • [2] Canim M, 2009, LECT NOTES COMPUT SC, V5776, P1, DOI 10.1007/978-3-642-04219-5_1
  • [3] Chow Jim, 2005, USENIX SECURITY S, P22
  • [4] Gaudin S., SECURITY BREACHES CO
  • [5] Haber S., 1991, J CRYPTOLOGY, V3, P99
  • [6] Lest We Remember: Cold-Boot Attacks on Encryption Keys
    Halderman, J. Alex
    Schoen, Seth D.
    Heninger, Nadia
    Clarkson, William
    Paul, William
    Calandrino, Joseph A.
    Feldman, Ariel J.
    Appelbaum, Jacob
    Felten, Edward W.
    [J]. COMMUNICATIONS OF THE ACM, 2009, 52 (05) : 91 - 98
  • [7] Iyer B., 2004, INT C EXT DAT TECHN
  • [8] Ngatchou P, 2005, P 13 INT C INT SYST, P84, DOI DOI 10.1109/ISAP.2005.1599245
  • [9] Forensic Analysis of Database Tampering
    Pavlou, Kyriacos E.
    Snodgrass, Richard T.
    [J]. ACM TRANSACTIONS ON DATABASE SYSTEMS, 2008, 33 (04):
  • [10] Ramakrishnan R., 2003, DATA BASE MANAGEMENT