Frequency-hiding dependency-preserving encryption for outsourced databases

Boxiang Dong, Wendy Wang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

The cloud paradigm enables users to outsource their data to computationally powerful third-party service providers for data management. Many data management tasks rely on the data dependency in the outsourced data. This raises an important issue of how the data owner can protect the sensitive information in the outsourced data while preserving the data dependency. In this paper, we consider functional dependency (FD), an important type of data dependency. Although simple deterministic encryption schemes can preserve FDs, they may be vulnerable against the frequency analysis attack. We design a frequency hiding, FD-preserving probabilistic encryption scheme, named F2, that enables the service provider to discover the FDs from the encrypted dataset. We consider two attacks, namely the frequency analysis (FA) attack and the FD-preserving chosen plaintext attack (FCPA), and show that the F2 encryption scheme can defend against both attacks with formal provable guarantee. Our empirical study demonstrates the efficiency and effectiveness of F2, as well as its security against both FA and FCPA attacks.

Original languageEnglish
Title of host publicationProceedings - 2017 IEEE 33rd International Conference on Data Engineering, ICDE 2017
PublisherIEEE Computer Society
Pages721-732
Number of pages12
ISBN (Electronic)9781509065431
DOIs
StatePublished - 16 May 2017
Event33rd IEEE International Conference on Data Engineering, ICDE 2017 - San Diego, United States
Duration: 19 Apr 201722 Apr 2017

Publication series

NameProceedings - International Conference on Data Engineering
ISSN (Print)1084-4627

Other

Other33rd IEEE International Conference on Data Engineering, ICDE 2017
CountryUnited States
CitySan Diego
Period19/04/1722/04/17

Fingerprint

Cryptography
Information management

Cite this

Dong, B., & Wang, W. (2017). Frequency-hiding dependency-preserving encryption for outsourced databases. In Proceedings - 2017 IEEE 33rd International Conference on Data Engineering, ICDE 2017 (pp. 721-732). [7930020] (Proceedings - International Conference on Data Engineering). IEEE Computer Society. https://doi.org/10.1109/ICDE.2017.124
Dong, Boxiang ; Wang, Wendy. / Frequency-hiding dependency-preserving encryption for outsourced databases. Proceedings - 2017 IEEE 33rd International Conference on Data Engineering, ICDE 2017. IEEE Computer Society, 2017. pp. 721-732 (Proceedings - International Conference on Data Engineering).
@inproceedings{59684ee03849479489e54f87e2d1d692,
title = "Frequency-hiding dependency-preserving encryption for outsourced databases",
abstract = "The cloud paradigm enables users to outsource their data to computationally powerful third-party service providers for data management. Many data management tasks rely on the data dependency in the outsourced data. This raises an important issue of how the data owner can protect the sensitive information in the outsourced data while preserving the data dependency. In this paper, we consider functional dependency (FD), an important type of data dependency. Although simple deterministic encryption schemes can preserve FDs, they may be vulnerable against the frequency analysis attack. We design a frequency hiding, FD-preserving probabilistic encryption scheme, named F2, that enables the service provider to discover the FDs from the encrypted dataset. We consider two attacks, namely the frequency analysis (FA) attack and the FD-preserving chosen plaintext attack (FCPA), and show that the F2 encryption scheme can defend against both attacks with formal provable guarantee. Our empirical study demonstrates the efficiency and effectiveness of F2, as well as its security against both FA and FCPA attacks.",
author = "Boxiang Dong and Wendy Wang",
year = "2017",
month = "5",
day = "16",
doi = "10.1109/ICDE.2017.124",
language = "English",
series = "Proceedings - International Conference on Data Engineering",
publisher = "IEEE Computer Society",
pages = "721--732",
booktitle = "Proceedings - 2017 IEEE 33rd International Conference on Data Engineering, ICDE 2017",

}

Dong, B & Wang, W 2017, Frequency-hiding dependency-preserving encryption for outsourced databases. in Proceedings - 2017 IEEE 33rd International Conference on Data Engineering, ICDE 2017., 7930020, Proceedings - International Conference on Data Engineering, IEEE Computer Society, pp. 721-732, 33rd IEEE International Conference on Data Engineering, ICDE 2017, San Diego, United States, 19/04/17. https://doi.org/10.1109/ICDE.2017.124

Frequency-hiding dependency-preserving encryption for outsourced databases. / Dong, Boxiang; Wang, Wendy.

Proceedings - 2017 IEEE 33rd International Conference on Data Engineering, ICDE 2017. IEEE Computer Society, 2017. p. 721-732 7930020 (Proceedings - International Conference on Data Engineering).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Frequency-hiding dependency-preserving encryption for outsourced databases

AU - Dong, Boxiang

AU - Wang, Wendy

PY - 2017/5/16

Y1 - 2017/5/16

N2 - The cloud paradigm enables users to outsource their data to computationally powerful third-party service providers for data management. Many data management tasks rely on the data dependency in the outsourced data. This raises an important issue of how the data owner can protect the sensitive information in the outsourced data while preserving the data dependency. In this paper, we consider functional dependency (FD), an important type of data dependency. Although simple deterministic encryption schemes can preserve FDs, they may be vulnerable against the frequency analysis attack. We design a frequency hiding, FD-preserving probabilistic encryption scheme, named F2, that enables the service provider to discover the FDs from the encrypted dataset. We consider two attacks, namely the frequency analysis (FA) attack and the FD-preserving chosen plaintext attack (FCPA), and show that the F2 encryption scheme can defend against both attacks with formal provable guarantee. Our empirical study demonstrates the efficiency and effectiveness of F2, as well as its security against both FA and FCPA attacks.

AB - The cloud paradigm enables users to outsource their data to computationally powerful third-party service providers for data management. Many data management tasks rely on the data dependency in the outsourced data. This raises an important issue of how the data owner can protect the sensitive information in the outsourced data while preserving the data dependency. In this paper, we consider functional dependency (FD), an important type of data dependency. Although simple deterministic encryption schemes can preserve FDs, they may be vulnerable against the frequency analysis attack. We design a frequency hiding, FD-preserving probabilistic encryption scheme, named F2, that enables the service provider to discover the FDs from the encrypted dataset. We consider two attacks, namely the frequency analysis (FA) attack and the FD-preserving chosen plaintext attack (FCPA), and show that the F2 encryption scheme can defend against both attacks with formal provable guarantee. Our empirical study demonstrates the efficiency and effectiveness of F2, as well as its security against both FA and FCPA attacks.

UR - http://www.scopus.com/inward/record.url?scp=85021242246&partnerID=8YFLogxK

U2 - 10.1109/ICDE.2017.124

DO - 10.1109/ICDE.2017.124

M3 - Conference contribution

AN - SCOPUS:85021242246

T3 - Proceedings - International Conference on Data Engineering

SP - 721

EP - 732

BT - Proceedings - 2017 IEEE 33rd International Conference on Data Engineering, ICDE 2017

PB - IEEE Computer Society

ER -

Dong B, Wang W. Frequency-hiding dependency-preserving encryption for outsourced databases. In Proceedings - 2017 IEEE 33rd International Conference on Data Engineering, ICDE 2017. IEEE Computer Society. 2017. p. 721-732. 7930020. (Proceedings - International Conference on Data Engineering). https://doi.org/10.1109/ICDE.2017.124