Partitioned data security on outsourced sensitive and non-sensitive data

Sharad Mehrotra, Shantanu Sharma, Jeffrey Ullman, Anurag Mishra

Research output: Chapter in Book/Report/Conference proceedingConference contribution

11 Scopus citations

Abstract

Despite extensive research on cryptography, secure and efficient query processing over outsourced data remains an open challenge. This paper continues along the emerging trend in secure data processing that recognizes that the entire dataset may not be sensitive, and hence, non-sensitivity of data can be exploited to overcome limitations of existing encryption-based approaches. We propose a new secure approach, entitled query binning (QB) that allows non-sensitive parts of the data to be outsourced in clear-text while guaranteeing that no information is leaked by the joint processing of non-sensitive data (in clear-text) and sensitive data (in encrypted form). QB maps a query to a set of queries over the sensitive and non-sensitive data in a way that no leakage will occur due to the joint processing over sensitive and non-sensitive data. Interestingly, in addition to improve performance, we show that QB actually strengthens the security of the underlying cryptographic technique by preventing size, frequency-count, and workload-skew attacks.

Original languageEnglish (US)
Title of host publicationProceedings - 2019 IEEE 35th International Conference on Data Engineering, ICDE 2019
PublisherIEEE Computer Society
Pages650-661
Number of pages12
ISBN (Electronic)9781538674741
DOIs
StatePublished - Apr 2019
Externally publishedYes
Event35th IEEE International Conference on Data Engineering, ICDE 2019 - Macau, China
Duration: Apr 8 2019Apr 11 2019

Publication series

NameProceedings - International Conference on Data Engineering
Volume2019-April
ISSN (Print)1084-4627

Conference

Conference35th IEEE International Conference on Data Engineering, ICDE 2019
Country/TerritoryChina
CityMacau
Period4/8/194/11/19

All Science Journal Classification (ASJC) codes

  • Software
  • Signal Processing
  • Information Systems

Keywords

  • Cryptographic techniques
  • Data partitioning
  • Inference attacks
  • Partitioned data security
  • Scalability

Fingerprint

Dive into the research topics of 'Partitioned data security on outsourced sensitive and non-sensitive data'. Together they form a unique fingerprint.

Cite this