Presentation is loading. Please wait.

Presentation is loading. Please wait.

Protecting data privacy and integrity in clouds By Jyh-haw Yeh Computer Science Boise state University.

Similar presentations


Presentation on theme: "Protecting data privacy and integrity in clouds By Jyh-haw Yeh Computer Science Boise state University."— Presentation transcript:

1 Protecting data privacy and integrity in clouds By Jyh-haw Yeh Computer Science Boise state University

2 Cloud Computing Cloud computing paradigm provides a new concept of IT management.  Business purchases IT services from Clouds  Cost saving  Unlimited computing power  Charged by usage  More secure?  Better resource utilization, thus green computing

3 Cloud Computing Cloud computing also has some known problems  Trust issues  Data privacy and integrity  Non-transparency of data locations  Liability issue

4 Outsourcing Databases Database-as-a-service is an emerging service starts to appear in cloud industry.  Clients has the flexibility to design an application as a database that is suitable for their business.  Outsource the database to clouds.  Clouds is able to execute queries over the database upon client’s requests.  Clouds (may not be trusted) have the total control of data.  Data privacy/integrity is a big concern.

5 Encrypted Databases An extreme approach to protect data privacy:  Encrypt the whole database and then outsource the encrypted database to clouds.  This approach works if a practical fully homomorphic encryption (FHE) algorithm exists.  FHE: arithmetic, rational comparisons can be applied directly to ciphers.  No practical and efficient FHE exists.

6 RSHDB RSHDB (relational semantic hiding databases) is a proposed database system that is able to hide semantics from DBAs.  Suitable for business to outsource their business applications as a RSHDB instance to Clouds.  Enable the DBAs or DBMS in clouds to operate on the RSHDB databases without knowing private business information.

7 RSHDB: Idea of Hiding Semantics Idea of semantic hiding in RSHDB:  An XYZ company has a PAYROLL database, in which a record in a table EMPLOYEE shows that John Smith SALARY is 63,000.  An ? company has a ? database, in which a record in a table ? shows that ? ? is 63,000.

8 RSHDB: Basic Operations Basic database operations:  Arithmetic: add or multiply numeric data.  Equality test: test the equality of two data items.  Rational comparison: decide A> B or A < B.  Substring matching: decide whether a string A is a substring in another string B Other database operations: sorting, searching, aggregate functions, set operations are extension/combination of basic operations.

9 RSHDB: Data Types Data types:  NC-type: Numeric with Comparison only.  NCA-type: Numeric with both Comparison and Arithmetic.  SC-type: String with Comparison only.  SCS-type: String with both Comparison and Substring matching.

10 RSHDB: Design Goal Partially encrypts the database so that the cloud is able to execute queries over encrypted data. Encrypt enough information (but not all) to hide semantics from data operators. Minimize the impacts for the DBMS, the SQL, the hosting clouds, and the clients.

11 RSHDB: Encryption Strategy Use a secure deterministic encryption for all semantic telling information: database, table, attribute names. String type data is also semantic telling: always encrypted.  SC-type: order-preserved encryption (less secure)  SCS-type: char-by-char (less secure) order-preserved encryption. word-by-word order-preserved encryption.

12 RSHDB: Encryption Strategy Numeric data itself reveal less semantics.  NC-type: order-preserved encryption. Example: bdate data  NCA-type: no practical homomorphic encryption available for this type of data. Leave the data in clear Homomorphic encoding (not too much help for security) Example: salary data

13 Impacts The DBMS: Need to be semantic hiding aware The SQL: New data types for DDL The hosting clouds:  More storage space for encrypted data.  Install semantic hiding aware DBMS The clients: Install an query API:  Perform encryption  Convert SQL query to semantic hiding query  Perform decryption  Return the result to the clients

14 Example Database EMPLOYEE NAMESSNDEPT_NOJOB _TYPEBDATESALARY John Smith1234567891Manager1966-05-0483,000 Frank Wong3334455553Staff1985-07-2648,000 Joey English4534534532Engineer1978-10-0372,000 Joe Johnson9998877772Engineer1982-03-2970,500 DEPARTMENT DEPT_NAMEDEPT_NOLOCATION Headquarter1Houston Research2Boise Finance3Houston

15 Example Database T A1A2A3A4A5A6 X11X1225,300X142,418,241,99283,000 X21X2275,900X242,441,639,29848,000 X31X3250,600X342,437,900,46772,000 X41X4250,600X442,433,063,36970,500 R B1B2B3 Y1125,300Y13 Y2150,600Y23 Y3175,900Y33

16 Semantic Hiding Query (SHQ) The sensitive information or data is encrypted in SHQ. To make a query to a RSHDB, the SQL query must be a SHQ. Example  Retrieve the name and salary of each employee in ‘Research’ department whose salary is more than $50,000, sort the report in ascending order of names.

17 SHQ Example select EMPLOYEE.NAME, EMPLOYEE.SALARY from EMPLOYEE, DEPARTMENT where EMPLOYEE.DEPT_NO = DEPARTMENT.DEPT_NO AND DEPT_NAME = ‘Research’ AND EMPLOYEE.SALARY > 50000 asc EMPLOYEE.NAME; --------------------------------------------------------------------------- selectT.A1, T.A6 fromT, R whereT.A3 = R.B2 AND R.B1 = Y21 AND T.A6 > 50000 asc T.A1;

18 SHQ Result T.A1T.A6 X4170,500 X3172,000 Query API decrypts the result and return to the clients EMPLOYEE.NAMEEMPLOYEE.SALARY Joe Johnson70,500 Joey English72,000

19 Research Issues Storage requirement. Is order-preserved encryption secure enough?  More secure encryption + order-preserved hashing? Guessing the semantics from the range and format of NCA-type data in clear.  Adding noises? RSHDB’s DBMS has a weaker domain constraint enforcement.  All encrypted data are in type of bit-string

20 Research Issues Char-by-char versus word-by-word encryption for SCS-type data.  Flexibility, security and space. Who should develop the query API? Performance downgrade:  Implementation and simulation  Real world databases and queries

21 Future Work Designing algorithms for data integrity protection for outsourced database.  Completeness  Non-forgery  Freshness Adding data integrity protection to RSHDB is challenging.


Download ppt "Protecting data privacy and integrity in clouds By Jyh-haw Yeh Computer Science Boise state University."

Similar presentations


Ads by Google