Protecting data privacy and integrity in clouds By Jyh-haw Yeh Computer Science Boise state University.

Slides:



Advertisements
Similar presentations
Databases. A database program can be used to:  sort a file into a different order  Maintain contact with clients  search through the records for a.
Advertisements

Chapter 23 Database Security and Authorization Copyright © 2004 Pearson Education, Inc.
Efficient Information Retrieval for Ranked Queries in Cost-Effective Cloud Environments Presenter: Qin Liu a,b Joint work with Chiu C. Tan b, Jie Wu b,
Copyright © 2004 Ramez Elmasri and Shamkant Navathe Elmasri/Navathe, Fundamentals of Database Systems, Fourth Edition Chapter 15-1 Query Processing and.
Chapter 15 Algorithms for Query Processing and Optimization Copyright © 2004 Pearson Education, Inc.
©Silberschatz, Korth and Sudarshan4.1Database System Concepts Lecture-1 Database system,CSE-313, P.B. Dr. M. A. Kashem Associate. Professor. CSE, DUET,
PRIVACY AND SECURITY ISSUES IN DATA MINING P.h.D. Candidate: Anna Monreale Supervisors Prof. Dino Pedreschi Dott.ssa Fosca Giannotti University of Pisa.
Database Management System
©Silberschatz, Korth and Sudarshan1.1Database System Concepts Chapter 1: Introduction Purpose of Database Systems View of Data Data Models Data Definition.
Topic Denormalisation S McKeever Advanced Databases 1.
A PASS Scheme in Clouding Computing - Protecting Data Privacy by Authentication and Secret Sharing Jyh-haw Yeh Dept. of Computer Science Boise State University.
CS263 Lecture 19 Query Optimisation.  Motivation for Query Optimisation  Phases of Query Processing  Query Trees  RA Transformation Rules  Heuristic.
Introduction to Structured Query Language (SQL)
CS 104 Introduction to Computer Science and Graphics Problems Introduction to Database (2) Basic SQL 12/05/2008 Yang Song.
Jyh-haw Yeh Dept. of Computer Science Boise State University
XML –Query Languages, Extracting from Relational Databases ADVANCED DATABASES Khawaja Mohiuddin Assistant Professor Department of Computer Sciences Bahria.
Introduction to Structured Query Language (SQL)
©Silberschatz, Korth and Sudarshan3.1Database System Concepts - 6 th Edition SQL Schema Changes and table updates instructor teaches.
Chapter 4 Relational Databases and Enterprise Systems
Introduction to Data bases concepts
Privacy Preserving Query Processing in Cloud Computing Wen Jie
Database Systems: Design, Implementation, and Management Eighth Edition Chapter 10 Database Performance Tuning and Query Optimization.
Al-Imam University Girls Education Center Collage of Computer Science 1 ST Semester, 1432/1433H Chapter 8 Part 4 SQL-99 Schema Definition, Constraints,
Switch off your Mobiles Phones or Change Profile to Silent Mode.
SEC835 Practical aspects of security implementation Part 1.
Lecture6:Data Manipulation in SQL, Simple SQL queries Prepared by L. Nouf Almujally Ref. Chapter5 Lecture6 1.
Secure Cloud Database with Sense of Security. Introduction Cloud computing – IT as a service from third party service provider Security in cloud environment.
Managing and querying encrypted data Trần Mỹ Giao Huỳnh Mai Thúy.
Query Processing and Optimization
Research Case in Cloud Computing IST 501 Fall 2014 Dongwon Lee, Ph.D.
Executing SQL over Encrypted Data in Database-Service-Provider Model Hakan Hacigumus University of California, Irvine Bala Iyer IBM Silicon Valley Lab.
5-1 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved.
FEN Introduction to the database field:  Applications, concepts and terminology Seminar: Introduction to relational databases.
Database Management System (DBMS) an Introduction DeSiaMore 1.
6 1 Lecture 8: Introduction to Structured Query Language (SQL) J. S. Chou, P.E., Ph.D.
Protection of outsourced data MARIA ANGEL MARQUEZ ANDRADE.
Abstract With the advent of cloud computing, data owners are motivated to outsource their complex data management systems from local sites to the commercial.
Database Systems Design, Implementation, and Management Coronel | Morris 11e ©2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or.
Chapter 9 Database Systems © 2007 Pearson Addison-Wesley. All rights reserved.
Slide 8- 1 THE HAVING-CLAUSE Provides a condition on the summary information Sometimes we want to retrieve the values of these functions for only those.
Structured Query Language
Queries SELECT [DISTINCT] FROM ( { }| ),... [WHERE ] [GROUP BY [HAVING ]] [ORDER BY [ ],...]
Indexes and Views Unit 7.
CS573 Data Privacy and Security Secure data outsourcing – Combining encryption and fragmentation.
Databases Letts Chapter 11. A database program can be used to:  sort a file into a different order;  search through the records for a matching string.
Database Systems Lecture 1. In this Lecture Course Information Databases and Database Systems Some History The Relational Model.
Database Systems Database Systems: Design, Implementation, and Management, Rob and Coronel.
Academic Year 2014 Spring Academic Year 2014 Spring.
9-1 © Prentice Hall, 2007 Topic 9: Physical Database Design Object-Oriented Systems Analysis and Design Joey F. George, Dinesh Batra, Joseph S. Valacich,
B. Information Technology (Hons.) CMPB245: Database Design Physical Design.
IS6146 Databases for Management Information Systems Lecture 1: Introduction to IS6146 Rob Gleasure robgleasure.com.
Modeling Security-Relevant Data Semantics Xue Ying Chen Department of Computer Science.
Secure Data Outsourcing
ASET 1 Amity School of Engineering & Technology B. Tech. (CSE/IT), III Semester Database Management Systems Jitendra Rajpurohit.
11-1 © Prentice Hall, 2004 Chapter 11: Physical Database Design Object-Oriented Systems Analysis and Design Joey F. George, Dinesh Batra, Joseph S. Valacich,
Simple Queries DBS301 – Week 1. Objectives Basic SELECT statement Computed columns Aliases Concatenation operator Use of DISTINCT to eliminate duplicates.
Chapter 1: Introduction. 1.2 Database Management System (DBMS) DBMS contains information about a particular enterprise Collection of interrelated data.
Databases Salihu Ibrahim Dasuki (PhD) CSC102 INTRODUCTION TO COMPUTER SCIENCE.
BBM 371 – Data Management Lecture 3: Basic Concepts of DBMS Prepared by: Ebru Akçapınar Sezer, Gönenç Ercan.
©Silberschatz, Korth and Sudarshan 1.1 Database System Concepts قواعد البيانات Data Base قواعد البيانات CCS 402 Mr. Nedal hayajneh E- mail
Data Resource Management Data Concepts Database Management Types of Databases Chapter 5 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies,
Understanding Data Storage
Indexing Structures for Files and Physical Database Design
Chapter 1: Introduction
ATS Application Programming: Java Programming
Hybrid Cloud Architecture for Software-as-a-Service Provider to Achieve Higher Privacy and Decrease Securiity Concerns about Cloud Computing P. Reinhold.
COMP 430 Intro. to Database Systems
Data Base System Lecture 2: Introduction to Database
Presentation transcript:

Protecting data privacy and integrity in clouds By Jyh-haw Yeh Computer Science Boise state University

Cloud Computing Cloud computing paradigm provides a new concept of IT management.  Business purchases IT services from Clouds  Cost saving  Unlimited computing power  Charged by usage  More secure?  Better resource utilization, thus green computing

Cloud Computing Cloud computing also has some known problems  Trust issues  Data privacy and integrity  Non-transparency of data locations  Liability issue

Outsourcing Databases Database-as-a-service is an emerging service starts to appear in cloud industry.  Clients has the flexibility to design an application as a database that is suitable for their business.  Outsource the database to clouds.  Clouds is able to execute queries over the database upon client’s requests.  Clouds (may not be trusted) have the total control of data.  Data privacy/integrity is a big concern.

Encrypted Databases An extreme approach to protect data privacy:  Encrypt the whole database and then outsource the encrypted database to clouds.  This approach works if a practical fully homomorphic encryption (FHE) algorithm exists.  FHE: arithmetic, rational comparisons can be applied directly to ciphers.  No practical and efficient FHE exists.

RSHDB RSHDB (relational semantic hiding databases) is a proposed database system that is able to hide semantics from DBAs.  Suitable for business to outsource their business applications as a RSHDB instance to Clouds.  Enable the DBAs or DBMS in clouds to operate on the RSHDB databases without knowing private business information.

RSHDB: Idea of Hiding Semantics Idea of semantic hiding in RSHDB:  An XYZ company has a PAYROLL database, in which a record in a table EMPLOYEE shows that John Smith SALARY is 63,000.  An ? company has a ? database, in which a record in a table ? shows that ? ? is 63,000.

RSHDB: Basic Operations Basic database operations:  Arithmetic: add or multiply numeric data.  Equality test: test the equality of two data items.  Rational comparison: decide A> B or A < B.  Substring matching: decide whether a string A is a substring in another string B Other database operations: sorting, searching, aggregate functions, set operations are extension/combination of basic operations.

RSHDB: Data Types Data types:  NC-type: Numeric with Comparison only.  NCA-type: Numeric with both Comparison and Arithmetic.  SC-type: String with Comparison only.  SCS-type: String with both Comparison and Substring matching.

RSHDB: Design Goal Partially encrypts the database so that the cloud is able to execute queries over encrypted data. Encrypt enough information (but not all) to hide semantics from data operators. Minimize the impacts for the DBMS, the SQL, the hosting clouds, and the clients.

RSHDB: Encryption Strategy Use a secure deterministic encryption for all semantic telling information: database, table, attribute names. String type data is also semantic telling: always encrypted.  SC-type: order-preserved encryption (less secure)  SCS-type: char-by-char (less secure) order-preserved encryption. word-by-word order-preserved encryption.

RSHDB: Encryption Strategy Numeric data itself reveal less semantics.  NC-type: order-preserved encryption. Example: bdate data  NCA-type: no practical homomorphic encryption available for this type of data. Leave the data in clear Homomorphic encoding (not too much help for security) Example: salary data

Impacts The DBMS: Need to be semantic hiding aware The SQL: New data types for DDL The hosting clouds:  More storage space for encrypted data.  Install semantic hiding aware DBMS The clients: Install an query API:  Perform encryption  Convert SQL query to semantic hiding query  Perform decryption  Return the result to the clients

Example Database EMPLOYEE NAMESSNDEPT_NOJOB _TYPEBDATESALARY John Smith Manager ,000 Frank Wong Staff ,000 Joey English Engineer ,000 Joe Johnson Engineer ,500 DEPARTMENT DEPT_NAMEDEPT_NOLOCATION Headquarter1Houston Research2Boise Finance3Houston

Example Database T A1A2A3A4A5A6 X11X1225,300X142,418,241,99283,000 X21X2275,900X242,441,639,29848,000 X31X3250,600X342,437,900,46772,000 X41X4250,600X442,433,063,36970,500 R B1B2B3 Y1125,300Y13 Y2150,600Y23 Y3175,900Y33

Semantic Hiding Query (SHQ) The sensitive information or data is encrypted in SHQ. To make a query to a RSHDB, the SQL query must be a SHQ. Example  Retrieve the name and salary of each employee in ‘Research’ department whose salary is more than $50,000, sort the report in ascending order of names.

SHQ Example select EMPLOYEE.NAME, EMPLOYEE.SALARY from EMPLOYEE, DEPARTMENT where EMPLOYEE.DEPT_NO = DEPARTMENT.DEPT_NO AND DEPT_NAME = ‘Research’ AND EMPLOYEE.SALARY > asc EMPLOYEE.NAME; selectT.A1, T.A6 fromT, R whereT.A3 = R.B2 AND R.B1 = Y21 AND T.A6 > asc T.A1;

SHQ Result T.A1T.A6 X4170,500 X3172,000 Query API decrypts the result and return to the clients EMPLOYEE.NAMEEMPLOYEE.SALARY Joe Johnson70,500 Joey English72,000

Research Issues Storage requirement. Is order-preserved encryption secure enough?  More secure encryption + order-preserved hashing? Guessing the semantics from the range and format of NCA-type data in clear.  Adding noises? RSHDB’s DBMS has a weaker domain constraint enforcement.  All encrypted data are in type of bit-string

Research Issues Char-by-char versus word-by-word encryption for SCS-type data.  Flexibility, security and space. Who should develop the query API? Performance downgrade:  Implementation and simulation  Real world databases and queries

Future Work Designing algorithms for data integrity protection for outsourced database.  Completeness  Non-forgery  Freshness Adding data integrity protection to RSHDB is challenging.