Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits

3Citations
Citations of this article
50Readers
Mendeley users who have this article in their library.
Get full text

Abstract

To reduce costs, organizations may outsource data storage and data processing to third-party clouds. This raises confidentiality concerns, since the outsourced data may have sensitive information. Although semantically secure encryption of the data prior to outsourcing alleviates these concerns, it also renders the outsourced data useless for any relational processing. Motivated by this problem, we present two database encryption schemes that reveal just enough information about structured data to support a wide-range of relational queries. Our main contribution is a definition and proof of security for the two schemes. This definition captures confidentiality offered by the schemes using a novel notion of equivalence of databases from the adversary's perspective. As a specific application, we adapt an existing algorithm for finding violations of a rich class of privacy policies to run on logs encrypted under our schemes and observe low to moderate overheads.

Cite

CITATION STYLE

APA

Chowdhury, O., Garg, D., Jia, L., & Datta, A. (2015). Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits. In Proceedings of the ACM Conference on Computer and Communications Security (Vol. 2021-January, pp. 1130–1143). Association for Computing Machinery. https://doi.org/10.1145/2810103.2813638

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free