File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: Security on cloud computing, query computation and data mining on encrypted database

TitleSecurity on cloud computing, query computation and data mining on encrypted database
Authors
Issue Date2011
Citation
Ieee Technology Time Machine Symposium On Technologies Beyond 2020, Ttm 2011, 2011 How to Cite?
AbstractEmerging computing paradigms such as database service outsourcing and utility computing (a.k.a. cloud computing) offer attractive financial and technological advantages. These are drawing interests of enterprises in migrating their computing operations, including DBMS's, to service providers. Nevertheless, many vocal consultants, including Gartner, have issued warnings on the security threats in the cloud computing model. Private information, which includes both customer data and business information, should not be revealed to unauthorized parties. In this work, we address a very important problem of security in services outsourcing: the elements of an encryption scheme and the execution protocol for encrypted query processing. More specifically, we study how sensitive data and queries should be transformed in an encrypted database environment and how a service provider processes encrypted queries on an encrypted database without the plain data revealed. We call our model of secure query processing SCONEDB (for Secure Computation ON an Encrypted DataBase). The conventional way to deal with security threats is to apply encryption on the plain data and to allow only authorized parties to perform decryption. Unauthorized parties, including the service provider, should not be able to recover the plain data even if they can access the encrypted database. Some previous works have studied this encryption problem in the outsourced database (ODB) model. However, these studies are restricted to simple SQL operations, e.g., exact match of attribute value in point query; comparisons between numeric values in range query. In practice, users often interact with a database via applications in which queries are not easily expressible in SQL. Moreover, most of the previous methods were specially engineered to work against one specific attack model. However, the problem should be studied with respect to various security requirements, considering different attacker capabilities. In this work we focus on k-nearest neighbor (kNN) queries and show how various encryption schemes are designed to support secure kNN query processing under different attacker capabilities. © 2011 IEEE.
Persistent Identifierhttp://hdl.handle.net/10722/152012

 

DC FieldValueLanguage
dc.contributor.authorCheung, DWen_US
dc.date.accessioned2012-06-26T06:32:25Z-
dc.date.available2012-06-26T06:32:25Z-
dc.date.issued2011en_US
dc.identifier.citationIeee Technology Time Machine Symposium On Technologies Beyond 2020, Ttm 2011, 2011en_US
dc.identifier.urihttp://hdl.handle.net/10722/152012-
dc.description.abstractEmerging computing paradigms such as database service outsourcing and utility computing (a.k.a. cloud computing) offer attractive financial and technological advantages. These are drawing interests of enterprises in migrating their computing operations, including DBMS's, to service providers. Nevertheless, many vocal consultants, including Gartner, have issued warnings on the security threats in the cloud computing model. Private information, which includes both customer data and business information, should not be revealed to unauthorized parties. In this work, we address a very important problem of security in services outsourcing: the elements of an encryption scheme and the execution protocol for encrypted query processing. More specifically, we study how sensitive data and queries should be transformed in an encrypted database environment and how a service provider processes encrypted queries on an encrypted database without the plain data revealed. We call our model of secure query processing SCONEDB (for Secure Computation ON an Encrypted DataBase). The conventional way to deal with security threats is to apply encryption on the plain data and to allow only authorized parties to perform decryption. Unauthorized parties, including the service provider, should not be able to recover the plain data even if they can access the encrypted database. Some previous works have studied this encryption problem in the outsourced database (ODB) model. However, these studies are restricted to simple SQL operations, e.g., exact match of attribute value in point query; comparisons between numeric values in range query. In practice, users often interact with a database via applications in which queries are not easily expressible in SQL. Moreover, most of the previous methods were specially engineered to work against one specific attack model. However, the problem should be studied with respect to various security requirements, considering different attacker capabilities. In this work we focus on k-nearest neighbor (kNN) queries and show how various encryption schemes are designed to support secure kNN query processing under different attacker capabilities. © 2011 IEEE.en_US
dc.languageengen_US
dc.relation.ispartofIEEE Technology Time Machine Symposium on Technologies Beyond 2020, TTM 2011en_US
dc.titleSecurity on cloud computing, query computation and data mining on encrypted databaseen_US
dc.typeConference_Paperen_US
dc.identifier.emailCheung, DW:dcheung@cs.hku.hken_US
dc.identifier.authorityCheung, DW=rp00101en_US
dc.description.naturelink_to_subscribed_fulltexten_US
dc.identifier.doi10.1109/TTM.2011.6005158en_US
dc.identifier.scopuseid_2-s2.0-80053250103en_US
dc.identifier.scopusauthoridCheung, DW=34567902600en_US

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats