2019 IEEE 35th International Conference on Data Engineering (ICDE) 2019
DOI: 10.1109/icde.2019.00064
|View full text |Cite
|
Sign up to set email alerts
|

Partitioned Data Security on Outsourced Sensitive and Non-Sensitive Data

Abstract: Despite extensive research on cryptography, secure and efficient query processing over outsourced data remains an open challenge. This paper continues along the emerging trend in secure data processing that recognizes that the entire dataset may not be sensitive, and hence, non-sensitivity of data can be exploited to overcome limitations of existing encryption-based approaches. We propose a new secure approach, entitled query binning (QB) that allows non-sensitive parts of the data to be outsourced in clear-te… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2
2

Relationship

4
4

Authors

Journals

citations
Cited by 9 publications
(8 citation statements)
references
References 60 publications
0
8
0
Order By: Relevance
“…For example, Mouratidis and Yiu [29] proposed a hardware-aided PIR-based solution to PPSP that relies on a tamper-resistant secure co-processor installed at the server-side. However, such schemes require decrypting the data in a secure area at the cloud and perform the computation on decrypted data; thus, they do not protect data access patterns from the server [30].…”
Section: Private Information Retrieval (Pir) Methodsmentioning
confidence: 99%
“…For example, Mouratidis and Yiu [29] proposed a hardware-aided PIR-based solution to PPSP that relies on a tamper-resistant secure co-processor installed at the server-side. However, such schemes require decrypting the data in a secure area at the cloud and perform the computation on decrypted data; thus, they do not protect data access patterns from the server [30].…”
Section: Private Information Retrieval (Pir) Methodsmentioning
confidence: 99%
“…A preliminary version of this article was accepted and presented in IEEE ICDE [53]. The conference version includes the following additional concept, which is not provided in this version, due to space restriction: an analytical model to show when QB works better compared to a pure cryptographic technique (Section V A of Reference [53]).…”
Section: Conference Versionmentioning
confidence: 99%
“…A preliminary version of this article was accepted and presented in IEEE ICDE [53]. The conference version includes the following additional concept, which is not provided in this version, due to space restriction: an analytical model to show when QB works better compared to a pure cryptographic technique (Section V A of Reference [53]). semantic data modeling [38], (ii) user-defined relationships between sensitive and non-sensitive data [67], (iii) constraintsbased mechanisms, (iv) sensitive patterns hiding using sanitization matrix [44], and (v) common knowledge-based association rules [45].…”
Section: Conference Versionmentioning
confidence: 99%
See 1 more Smart Citation
“…Now, the DB owner arranges 16 values in a 4 × 4 matrix, as follows: , 13,1,12,9) on the sensitive data using the cryptographic mechanism integrated into QB. While the adversary learns that the query corresponds to one of the four values in NSB 1 , since query values in SB 3 are encrypted, the adversary does not learn 1 These assumptions are made primarily for ease of the exposition and relaxed in [16].…”
Section: Query Binningmentioning
confidence: 99%