Presentation is loading. Please wait.

Presentation is loading. Please wait.

CS573 Data Privacy and Security Secure data outsourcing – Combining encryption and fragmentation.

Similar presentations


Presentation on theme: "CS573 Data Privacy and Security Secure data outsourcing – Combining encryption and fragmentation."— Presentation transcript:

1 CS573 Data Privacy and Security Secure data outsourcing – Combining encryption and fragmentation

2 Combining Fragmentation and Encryption for outsourcing Breaking sensitive associations between attributes

3 Confidentiality Constraints Example: constraint {DoB, Zip, Illness} – Okay to release {DoB, Zip}, {Zip}, …

4 Constraint Example

5 Basic ideas Singleton constraints – encryption Association constraints – encryption of any one attribute – Fragmentation of the attributes

6 Example

7

8

9 Fragmentation Classical distributed database design problem (vertical fragmentation) Total number of possible fragmentations given N attributes? What would be an optimal fragmentation?

10 Optimal fragmentation Correctly enforce constraints Maximal visibility Minimal fragmentation – Maximal attribute affinity Problem is NP hard

11 Algorithm without confidentiality constraints Without confidentiality constraints - Hierarchical clustering With confidentiality constraints? – {s}, {n,d}, {n,z}, {n, i}, {n, p}, {d, z, i}, {d, z, p}

12 References Combining fragmentation and encryption to protect privacy in data storage, TISSEC, 2010 Fragmentation design for efficient query execution over sensitive distributed databases, ICDCS, 2009


Download ppt "CS573 Data Privacy and Security Secure data outsourcing – Combining encryption and fragmentation."

Similar presentations


Ads by Google