File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1109/TTM.2011.6005158
- Scopus: eid_2-s2.0-80053250103
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Conference Paper: Security on cloud computing, query computation and data mining on encrypted database
Title | Security on cloud computing, query computation and data mining on encrypted database |
---|---|
Authors | |
Issue Date | 2011 |
Citation | Ieee Technology Time Machine Symposium On Technologies Beyond 2020, Ttm 2011, 2011 How to Cite? |
Abstract | Emerging computing paradigms such as database service outsourcing and utility computing (a.k.a. cloud computing) offer attractive financial and technological advantages. These are drawing interests of enterprises in migrating their computing operations, including DBMS's, to service providers. Nevertheless, many vocal consultants, including Gartner, have issued warnings on the security threats in the cloud computing model. Private information, which includes both customer data and business information, should not be revealed to unauthorized parties. In this work, we address a very important problem of security in services outsourcing: the elements of an encryption scheme and the execution protocol for encrypted query processing. More specifically, we study how sensitive data and queries should be transformed in an encrypted database environment and how a service provider processes encrypted queries on an encrypted database without the plain data revealed. We call our model of secure query processing SCONEDB (for Secure Computation ON an Encrypted DataBase). The conventional way to deal with security threats is to apply encryption on the plain data and to allow only authorized parties to perform decryption. Unauthorized parties, including the service provider, should not be able to recover the plain data even if they can access the encrypted database. Some previous works have studied this encryption problem in the outsourced database (ODB) model. However, these studies are restricted to simple SQL operations, e.g., exact match of attribute value in point query; comparisons between numeric values in range query. In practice, users often interact with a database via applications in which queries are not easily expressible in SQL. Moreover, most of the previous methods were specially engineered to work against one specific attack model. However, the problem should be studied with respect to various security requirements, considering different attacker capabilities. In this work we focus on k-nearest neighbor (kNN) queries and show how various encryption schemes are designed to support secure kNN query processing under different attacker capabilities. © 2011 IEEE. |
Persistent Identifier | http://hdl.handle.net/10722/152012 |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Cheung, DW | en_US |
dc.date.accessioned | 2012-06-26T06:32:25Z | - |
dc.date.available | 2012-06-26T06:32:25Z | - |
dc.date.issued | 2011 | en_US |
dc.identifier.citation | Ieee Technology Time Machine Symposium On Technologies Beyond 2020, Ttm 2011, 2011 | en_US |
dc.identifier.uri | http://hdl.handle.net/10722/152012 | - |
dc.description.abstract | Emerging computing paradigms such as database service outsourcing and utility computing (a.k.a. cloud computing) offer attractive financial and technological advantages. These are drawing interests of enterprises in migrating their computing operations, including DBMS's, to service providers. Nevertheless, many vocal consultants, including Gartner, have issued warnings on the security threats in the cloud computing model. Private information, which includes both customer data and business information, should not be revealed to unauthorized parties. In this work, we address a very important problem of security in services outsourcing: the elements of an encryption scheme and the execution protocol for encrypted query processing. More specifically, we study how sensitive data and queries should be transformed in an encrypted database environment and how a service provider processes encrypted queries on an encrypted database without the plain data revealed. We call our model of secure query processing SCONEDB (for Secure Computation ON an Encrypted DataBase). The conventional way to deal with security threats is to apply encryption on the plain data and to allow only authorized parties to perform decryption. Unauthorized parties, including the service provider, should not be able to recover the plain data even if they can access the encrypted database. Some previous works have studied this encryption problem in the outsourced database (ODB) model. However, these studies are restricted to simple SQL operations, e.g., exact match of attribute value in point query; comparisons between numeric values in range query. In practice, users often interact with a database via applications in which queries are not easily expressible in SQL. Moreover, most of the previous methods were specially engineered to work against one specific attack model. However, the problem should be studied with respect to various security requirements, considering different attacker capabilities. In this work we focus on k-nearest neighbor (kNN) queries and show how various encryption schemes are designed to support secure kNN query processing under different attacker capabilities. © 2011 IEEE. | en_US |
dc.language | eng | en_US |
dc.relation.ispartof | IEEE Technology Time Machine Symposium on Technologies Beyond 2020, TTM 2011 | en_US |
dc.title | Security on cloud computing, query computation and data mining on encrypted database | en_US |
dc.type | Conference_Paper | en_US |
dc.identifier.email | Cheung, DW:dcheung@cs.hku.hk | en_US |
dc.identifier.authority | Cheung, DW=rp00101 | en_US |
dc.description.nature | link_to_subscribed_fulltext | en_US |
dc.identifier.doi | 10.1109/TTM.2011.6005158 | en_US |
dc.identifier.scopus | eid_2-s2.0-80053250103 | en_US |
dc.identifier.scopusauthorid | Cheung, DW=34567902600 | en_US |