CS573 Data Privacy and Security Secure data outsourcing – Combining encryption and fragmentation.

Slides:



Advertisements
Similar presentations
Jeremiah Blocki CMU Ryan Williams IBM Almaden ICALP 2010.
Advertisements

Outline  Introduction  Background  Distributed DBMS Architecture  Distributed Database Design  Semantic Data Control ➠ View Management ➠ Data Security.
Ragib Hasan Johns Hopkins University en Spring 2011 Lecture 8 04/04/2011 Security and Privacy in Cloud Computing.
1 Privacy Prof. Ravi Sandhu Executive Director and Endowed Chair March 8, © Ravi Sandhu World-Leading Research.
CONFIDENTIAL University of Toronto Multimedia Lab Karl Martin | Prof. Kostas.
1 Privacy in Microdata Release Prof. Ravi Sandhu Executive Director and Endowed Chair March 22, © Ravi Sandhu.
PRIVACY AND SECURITY ISSUES IN DATA MINING P.h.D. Candidate: Anna Monreale Supervisors Prof. Dino Pedreschi Dott.ssa Fosca Giannotti University of Pisa.
Distributed Databases: Review May 2003Yangjun Chen1 Distributed Databases System Architecture Distributed Database Design Semantic Data Control Distributed.
Minimum Spanning Tree Partitioning Algorithm for Microaggregation
1 Distributed Databases Review CS347 June 6, 2001.
Summary. Chapter 9 – Triggers Integrity constraints Enforcing IC with different techniques –Keys –Foreign keys –Attribute-based constraints –Schema-based.
Privacy Preserving Data Mining: An Overview and Examination of Euclidean Distance Preserving Data Transformation Chris Giannella cgiannel AT acm DOT org.
1 Distributed Databases CS347 Lecture 13 May 23, 2001.
1 Towards an end-to-end architecture for handling sensitive data Hector Garcia-Molina Rajeev Motwani and students.
Ling Liu Professor School of Computer Science Georgia Institute of Technology Cloud Computing Research in my group.
Protecting data privacy and integrity in clouds By Jyh-haw Yeh Computer Science Boise state University.
Privacy Preserving Query Processing in Cloud Computing Wen Jie
1 Telematics/Networkengineering Confidential Transmission of Lossless Visual Data: Experimental Modelling and Optimization.
Ragib Hasan University of Alabama at Birmingham CS 491/691/791 Fall 2011 Lecture 16 10/11/2011 Security and Privacy in Cloud Computing.
K E Y : SW Service Use Big Data Information Flow SW Tools and Algorithms Transfer Application Provider Visualization Access Analytics Curation Collection.
Chapter 6 – Database Security  Integrity for databases: record integrity, data correctness, update integrity  Security for databases: access control,
Secure Cloud Database using Multiparty Computation.
CS505: Final Exam Review Jinze Liu. Major Topics Before Mid-Term – Security and Access Control – Indexing After Mid-Term – Transaction Management Locking,
PMIT-6102 Advanced Database Systems By- Jesmin Akhter Assistant Professor, IIT, Jahangirnagar University.
Protecting Sensitive Labels in Social Network Data Anonymization.
1 Two Can Keep a Secret: A Distributed Architecture for Secure Database Services Gagan Aggarwal, Mayank Bawa, Prasanna Ganesan, Hector Garcia-Molina, Krishnaram.
Tools for Privacy Preserving Distributed Data Mining
Database Systems: Design, Implementation, and Management Ninth Edition Chapter 12 Distributed Database Management Systems.
Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data.
Secure Sensor Data/Information Management and Mining Bhavani Thuraisingham The University of Texas at Dallas October 2005.
© 2005 Prentice Hall10-1 Stumpf and Teague Object-Oriented Systems Analysis and Design with UML.
Privacy Preserving Delegated Access Control in Public Clouds.
Data Access and Security in Multiple Heterogeneous Databases Afroz Deepti.
Major Disciplines in Computer Science Ken Nguyen Department of Information Technology Clayton State University.
Protection of outsourced data MARIA ANGEL MARQUEZ ANDRADE.
PMIT-6101 Advanced Database Systems By- Jesmin Akhter Assistant Professor, IIT, Jahangirnagar University.
Enhancing Security and Privacy in Online Social Networks Sonia Jahid University of Illinois at Urbana-Champaign PhD Forum.
K E Y : SW Service Use Big Data Information Flow SW Tools and Algorithms Transfer Transformation Provider Visualization Access Analytics Curation Collection.
Indexes and Views Unit 7.
Daniel O. Rice Loyola College in Maryland (with Robert Garfinkel and Ram Gopal University of Connecticut) The Protection of Numerical Information in Databases.
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
Security in Outsourced Association Rule Mining. Agenda  Introduction  Approximate randomized technique  Encryption  Summary and future work.
Distributed Database Management Systems. Reading Textbook: Ch. 1, Ch. 3 Textbook: Ch. 1, Ch. 3 For next class: Ch. 4 For next class: Ch. 4 FarkasCSCE.
1 Distributed Databases architecture, fragmentation, allocation Lecture 1.
Secure Data Outsourcing
K E Y : DATA SW Service Use Big Data Information Flow SW Tools and Algorithms Transfer Hardware (Storage, Networking, etc.) Big Data Framework Scalable.
Distributed Database Design Bayu Adhi Tama, MTI Fasilkom-Unsri Adapted from Connolly, et al., Database Systems 4 th Edition, Pearson Education Limited,
Hemera KickOff October 5th, 2010 Working Group B5 Efficient management of very large volumes of information for data- intensive applications Gabriel Antoniu,
6.033 Quiz3 Review Spring How can we achieve security? Authenticate agent’s identity Verify the integrity of the request Check the agent’s authorization.
CS742 – Distributed & Parallel DBMSPage 2. 1M. Tamer Özsu Outline Introduction & architectural issues  Data distribution  Fragmentation  Data Allocation.
PRESENTED BY Raju. What is information security?  Information security is the process of protecting information. It protects its availability, privacy.
Secure and Practical Outsourcing of Linear Programming in Cloud Computing.
University of Texas at El Paso
Executive Director and Endowed Chair
Privacy Preserving Subgraph Matching on Large Graphs in Cloud
Privacy-preserving Release of Statistics: Differential Privacy
Survey on Security and Energy Efficiency in the Cloud Computing Environment Wei Wu.
CHAPTER 5: PHYSICAL DATABASE DESIGN AND PERFORMANCE
Executive Director and Endowed Chair
By (Group 17) Mahesha Yelluru Rao Surabhee Sinha Deep Vakharia
A Privacy-Preserving Index for Range Queries
Security in Network Communications
Outline Introduction Background Distributed DBMS Architecture
Vertical Fragmentation
Distributed Database Management Systems
Warm Up Solve for x:
Distributed Database Management Systems
A Privacy – Preserving Index
Outline Introduction Background Distributed DBMS Architecture
Outline Introduction Background Distributed DBMS Architecture
Presentation transcript:

CS573 Data Privacy and Security Secure data outsourcing – Combining encryption and fragmentation

Combining Fragmentation and Encryption for outsourcing Breaking sensitive associations between attributes

Confidentiality Constraints Example: constraint {DoB, Zip, Illness} – Okay to release {DoB, Zip}, {Zip}, …

Constraint Example

Basic ideas Singleton constraints – encryption Association constraints – encryption of any one attribute – Fragmentation of the attributes

Example

Fragmentation Classical distributed database design problem (vertical fragmentation) Total number of possible fragmentations given N attributes? What would be an optimal fragmentation?

Optimal fragmentation Correctly enforce constraints Maximal visibility Minimal fragmentation – Maximal attribute affinity Problem is NP hard

Algorithm without confidentiality constraints Without confidentiality constraints - Hierarchical clustering With confidentiality constraints? – {s}, {n,d}, {n,z}, {n, i}, {n, p}, {d, z, i}, {d, z, p}

References Combining fragmentation and encryption to protect privacy in data storage, TISSEC, 2010 Fragmentation design for efficient query execution over sensitive distributed databases, ICDCS, 2009