ϵpsolute: Efficiently Querying Databases while Providing Differential Privacy

15Citations
Citations of this article
18Readers
Mendeley users who have this article in their library.
Get full text

Abstract

As organizations struggle with processing vast amounts of information, outsourcing sensitive data to third parties becomes a necessity. To protect the data, various cryptographic techniques are used in outsourced database systems to ensure data privacy, while allowing efficient querying. A rich collection of attacks on such systems has emerged. Even with strong cryptography, just communication volume or access pattern is enough for an adversary to succeed. In this work we present a model for differentially private outsourced database system and a concrete construction, ϵpsolute, that provably conceals the aforementioned leakages, while remaining efficient and scalable. In our solution, differential privacy is preserved at the record level even against an untrusted server that controls data and queries. ϵpsolute combines Oblivious RAM and differentially private sanitizers to create a generic and efficient construction. We go further and present a set of improvements to bring the solution to efficiency and practicality necessary for real-world adoption. We describe the way to parallelize the operations, minimize the amount of noise, and reduce the number of network requests, while preserving the privacy guarantees. We have run an extensive set of experiments, dozens of servers processing up to 10 million records, and compiled a detailed result analysis proving the efficiency and scalability of our solution. While providing strong security and privacy guarantees we are less than an order of magnitude slower than range query execution of a non-secure plain-text optimized RDBMS like MySQL and PostgreSQL.

Cite

CITATION STYLE

APA

Bogatov, D., Kellaris, G., Kollios, G., Nissim, K., & O’Neill, A. (2021). ϵpsolute: Efficiently Querying Databases while Providing Differential Privacy. In Proceedings of the ACM Conference on Computer and Communications Security (pp. 2262–2276). Association for Computing Machinery. https://doi.org/10.1145/3460120.3484786

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free