SlideShare a Scribd company logo
1 of 28
Data Outsourcing
Security of Database
Purpose
A Practical and Privacy-Preserving Outsourced Database
Outline
• Outsourcing
• Long White Cloud (LWC)
• Previous approaches
• Future works
Where to have outsourcing!?
Secure Data
A Naive Approach
• Use standard encryption techniques
• No operations could be performed
SSE Scheme
Searchable Symmetric Encryption
• Introduced by Song in 2000
• Fully Homomorphic Encryption (FHE)
• Oblivious RAM (ORAM)
• Secure Multi-Party Computation (SMC)
• Problem ?!
Problems
1. Information Leakage
Correlation between the queries and the matched data
Solution :
ORAM and PIR:
 To minimize information leakage
 Very costly
 Not scale well
 When dealing with dynamic data
Problems
2. Lack of Support for a Full-Fledged Multi-User Access
a) All users share the same key (Single User (SU) schemes)
b) have a read-only key shared among all the users
and one special key for inserting/updating data
(Semi Fledged Multiple User (SFMU) schemes)
Misplacing a key or revoking access
Generation of a new key and re-encryption
Solution
A Full-Fledged Multi-User (FFMU) scheme:
• Any authorized user is able to read and write
• Users are able to join and leave the organization at
any time without affecting rest of the users.
LWC !
Long White Cloud
• Sub-linear Dynamic SSE
• Supports high throughput of queries
• Minimizes information leakage
• Designed for large organizations
Main Idea:
Using a hybrid private/public cloud approach
• Private part of the infrastructure
to store the encrypted data
 Speeding up the query processing
to minimize information leakage
on their local premises
• The rest to a public cloud provider
Long White Cloud
Long White Cloud
• DataBase User (DBU)
• DataBase Administrator (DBA)
• Operations Proxy Server (OPS)
• Private Cloud
• Cloud Server (CS)
• Public Cloud
• Key Management Authority (KMA)
• responsible for issuing encryption keys
How to initialize the system?!
Step 1: Set up the OPS
Step 2: Prepare the DB on CS
Step 3: Bringing the KMA online
• Encrypting and Sending
queries to OPS
What are the steps?
• Fetching data from CS by
OPS
• Doing calculation in OPS
• Encrypting data and sending
responses to DBU
2
1
3
4
1
2
4
3
Details
• (𝐾 𝐷𝐵𝑈, 𝐾 𝑈)
• DBU has Both, OPS has the first
• First encrypted by 𝐾 𝑈 then 𝐾 𝐷𝐵𝑈
• First Encryption : Deterministic and
Symmetric to be searchable ( Just
keywords)
• Second Encryption: Semantically secure
Example of Encryptions
The first Encryption:
“select * from Staff WHERE
"𝐾 𝑈 (name) ="𝐾 𝑈 (Alice)
AND "𝐾 𝑈 (age) = "𝐾 𝑈 (25)”
The second Encryption:
All the data
Details
Cloud Server
Blocks, Slots ( Records), Cells
B+ Tree:
An encrypted keyword, and a pointer points to
a list of (bi; sj) indicating the record store
location on the CS.
Oblivious Access
Problem:
• All users have 𝐾 𝑈
• Revoked users can access CS!
Solution:
• Using a pseudo-random permutation
• Keeping seed in OPS
Security Analysis
γ − k blocks are picked randomly
K : needed blocks
γ: random blocks
Fills a number of empty slots with random
bit strings for each block
Security Analysis
• Search Pattern Privacy (SPP)
• Distinguishing if two (or more)
queries are the same or not
• Achieved by random blocks
• Access Pattern Privacy (APP)
• Unable to learn if two (or more)
real result sets overlap or not
• Achieved in 2 levels:
• Having Blocks
• Random Blocks
Security Analysis
• Size Pattern Privacy (SzPP):
• Unable to learn the size of returned (real)
records.
• Achieved in 2 levels:
• Fetching data in blocks NOT slots
• Having γ
• Operation Pattern Privacy (OPP):
• Unable to tell if the executed query is a
select, update, delete, or insert.
• Achieved by γ
• Deleting by changing the flag
Threats
1. External attack on OPS
2. Due to deterministic encryption
APP, SPP and OPP is in danger
Experimental Evaluation
• Intel i5-4670 3:40 GHz processor
• 8 GB of RAM
• Linux Ubuntu 15.04
• Programmed in C
• Compiled using GCC version 4.9.2
• No parallel operations or hyper-threading
• OPS: picked up 2·k blocks
• (k: needed blocks to execute the query)
Experimental Evaluation
End-to-end search time in LWC Query throughput comparisons for database schemes.
Experimental Evaluation
Time taken for executing an insert query in LWC. Time taken for executing a delete query in LWC
Future Works
Untrusted Cloud Servers
• Shujie Cui, Ming Zhang, Muhammad Rizwan Asghar and Giovanni Russello (The University of
Auckland, New Zealand). Long White Cloud (LWC): A Practical and Privacy-Preserving
Outsourced Database
Reference
• http://www.onlinetech.com/
• D. Cash, P. Grubbs, J. Perry, and T. Ritsenpart. Leakage-abuse attacks against
searchable encryption.

More Related Content

What's hot

MongoDB World 2018: What's Next? The Path to Sharded Transactions
MongoDB World 2018: What's Next? The Path to Sharded TransactionsMongoDB World 2018: What's Next? The Path to Sharded Transactions
MongoDB World 2018: What's Next? The Path to Sharded TransactionsMongoDB
 
CNIT 141: 1. Encryption
CNIT 141: 1. EncryptionCNIT 141: 1. Encryption
CNIT 141: 1. EncryptionSam Bowne
 
Evaluation of mininet WiFi integration via ns-3
Evaluation of mininet WiFi integration via ns-3Evaluation of mininet WiFi integration via ns-3
Evaluation of mininet WiFi integration via ns-3Farzaneh Pakzad
 
BSides LV 2016 - Beyond the tip of the iceberg - fuzzing binary protocols for...
BSides LV 2016 - Beyond the tip of the iceberg - fuzzing binary protocols for...BSides LV 2016 - Beyond the tip of the iceberg - fuzzing binary protocols for...
BSides LV 2016 - Beyond the tip of the iceberg - fuzzing binary protocols for...Alexandre Moneger
 
CNIT 141 5. Stream Ciphers
CNIT 141 5. Stream CiphersCNIT 141 5. Stream Ciphers
CNIT 141 5. Stream CiphersSam Bowne
 
Introduction to Exploitation
Introduction to ExploitationIntroduction to Exploitation
Introduction to Exploitationprimeteacher32
 
Pentesting custom TLS stacks
Pentesting custom TLS stacksPentesting custom TLS stacks
Pentesting custom TLS stacksAlexandre Moneger
 
SCOR: Constraint Programming-based Northbound Interface for SDN
SCOR: Constraint Programming-based Northbound Interface for SDNSCOR: Constraint Programming-based Northbound Interface for SDN
SCOR: Constraint Programming-based Northbound Interface for SDNFarzaneh Pakzad
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYKathirvel Ayyaswamy
 
Link Capacity Estimation in SDN-based End-hosts
Link Capacity Estimation in SDN-based End-hostsLink Capacity Estimation in SDN-based End-hosts
Link Capacity Estimation in SDN-based End-hostsFarzaneh Pakzad
 
Efficient algorithms for neighbor discovery in wireless networks
Efficient algorithms for neighbor discovery in wireless networksEfficient algorithms for neighbor discovery in wireless networks
Efficient algorithms for neighbor discovery in wireless networksJPINFOTECH JAYAPRAKASH
 
Building Topology in NS3
Building Topology in NS3Building Topology in NS3
Building Topology in NS3Rahul Hada
 
Network Time Synchronization
Network Time SynchronizationNetwork Time Synchronization
Network Time SynchronizationBen Rothke
 
Hybrid Network - WIndows Network Commands - Wireless Interference
Hybrid Network - WIndows Network Commands - Wireless InterferenceHybrid Network - WIndows Network Commands - Wireless Interference
Hybrid Network - WIndows Network Commands - Wireless InterferenceDamith Warnakulasuriya
 
Implementing a Distributed Hash Table with Scala and Akka
Implementing a Distributed Hash Table with Scala and AkkaImplementing a Distributed Hash Table with Scala and Akka
Implementing a Distributed Hash Table with Scala and AkkaTristan Penman
 

What's hot (20)

MongoDB World 2018: What's Next? The Path to Sharded Transactions
MongoDB World 2018: What's Next? The Path to Sharded TransactionsMongoDB World 2018: What's Next? The Path to Sharded Transactions
MongoDB World 2018: What's Next? The Path to Sharded Transactions
 
Wireshark
WiresharkWireshark
Wireshark
 
CNIT 141: 1. Encryption
CNIT 141: 1. EncryptionCNIT 141: 1. Encryption
CNIT 141: 1. Encryption
 
Evaluation of mininet WiFi integration via ns-3
Evaluation of mininet WiFi integration via ns-3Evaluation of mininet WiFi integration via ns-3
Evaluation of mininet WiFi integration via ns-3
 
Wireshark
WiresharkWireshark
Wireshark
 
BSides LV 2016 - Beyond the tip of the iceberg - fuzzing binary protocols for...
BSides LV 2016 - Beyond the tip of the iceberg - fuzzing binary protocols for...BSides LV 2016 - Beyond the tip of the iceberg - fuzzing binary protocols for...
BSides LV 2016 - Beyond the tip of the iceberg - fuzzing binary protocols for...
 
Network Forensics: Packet Analysis Using Wireshark
Network Forensics: Packet Analysis Using WiresharkNetwork Forensics: Packet Analysis Using Wireshark
Network Forensics: Packet Analysis Using Wireshark
 
Wireshark
WiresharkWireshark
Wireshark
 
CNIT 141 5. Stream Ciphers
CNIT 141 5. Stream CiphersCNIT 141 5. Stream Ciphers
CNIT 141 5. Stream Ciphers
 
Introduction to Exploitation
Introduction to ExploitationIntroduction to Exploitation
Introduction to Exploitation
 
Pentesting custom TLS stacks
Pentesting custom TLS stacksPentesting custom TLS stacks
Pentesting custom TLS stacks
 
Wireshark Tutorial
Wireshark TutorialWireshark Tutorial
Wireshark Tutorial
 
SCOR: Constraint Programming-based Northbound Interface for SDN
SCOR: Constraint Programming-based Northbound Interface for SDNSCOR: Constraint Programming-based Northbound Interface for SDN
SCOR: Constraint Programming-based Northbound Interface for SDN
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 
Link Capacity Estimation in SDN-based End-hosts
Link Capacity Estimation in SDN-based End-hostsLink Capacity Estimation in SDN-based End-hosts
Link Capacity Estimation in SDN-based End-hosts
 
Efficient algorithms for neighbor discovery in wireless networks
Efficient algorithms for neighbor discovery in wireless networksEfficient algorithms for neighbor discovery in wireless networks
Efficient algorithms for neighbor discovery in wireless networks
 
Building Topology in NS3
Building Topology in NS3Building Topology in NS3
Building Topology in NS3
 
Network Time Synchronization
Network Time SynchronizationNetwork Time Synchronization
Network Time Synchronization
 
Hybrid Network - WIndows Network Commands - Wireless Interference
Hybrid Network - WIndows Network Commands - Wireless InterferenceHybrid Network - WIndows Network Commands - Wireless Interference
Hybrid Network - WIndows Network Commands - Wireless Interference
 
Implementing a Distributed Hash Table with Scala and Akka
Implementing a Distributed Hash Table with Scala and AkkaImplementing a Distributed Hash Table with Scala and Akka
Implementing a Distributed Hash Table with Scala and Akka
 

Similar to Outsourced database

Isse 2014 homomorphic encryption and porticor post event
Isse 2014 homomorphic encryption and porticor   post eventIsse 2014 homomorphic encryption and porticor   post event
Isse 2014 homomorphic encryption and porticor post eventICT Economic Impact
 
MesosCon EU 2017 - Criteo - Operating Mesos-based Infrastructures
MesosCon EU 2017 - Criteo - Operating Mesos-based InfrastructuresMesosCon EU 2017 - Criteo - Operating Mesos-based Infrastructures
MesosCon EU 2017 - Criteo - Operating Mesos-based Infrastructurespierrecdn -
 
Internet2 DNSSEC Pilot
Internet2 DNSSEC PilotInternet2 DNSSEC Pilot
Internet2 DNSSEC PilotShumon Huque
 
20-security.ppt
20-security.ppt20-security.ppt
20-security.pptajajkhan16
 
Sql_DG_presentation.pptx
Sql_DG_presentation.pptxSql_DG_presentation.pptx
Sql_DG_presentation.pptxArunRangrej1
 
Secure and Privacy-Preserving Big-Data Processing
Secure and Privacy-Preserving Big-Data ProcessingSecure and Privacy-Preserving Big-Data Processing
Secure and Privacy-Preserving Big-Data ProcessingShantanu Sharma
 
7. Key-Value Databases: In Depth
7. Key-Value Databases: In Depth7. Key-Value Databases: In Depth
7. Key-Value Databases: In DepthFabio Fumarola
 
Data Security for Project Managers
Data Security for Project ManagersData Security for Project Managers
Data Security for Project ManagersJoseph Wojowski
 
Heartache and Heartbleed - 31c3
Heartache and Heartbleed - 31c3Heartache and Heartbleed - 31c3
Heartache and Heartbleed - 31c3Nick Sullivan
 
Sullivan heartbleed-defcon22 2014
Sullivan heartbleed-defcon22 2014Sullivan heartbleed-defcon22 2014
Sullivan heartbleed-defcon22 2014Cloudflare
 
Taking Splunk to the Next Level - Architecture Breakout Session
Taking Splunk to the Next Level - Architecture Breakout SessionTaking Splunk to the Next Level - Architecture Breakout Session
Taking Splunk to the Next Level - Architecture Breakout SessionSplunk
 
Attack All the Layers - What's Working in Penetration Testing
Attack All the Layers - What's Working in Penetration TestingAttack All the Layers - What's Working in Penetration Testing
Attack All the Layers - What's Working in Penetration TestingNetSPI
 
Attack All The Layers - What's Working in Penetration Testing
Attack All The Layers - What's Working in Penetration TestingAttack All The Layers - What's Working in Penetration Testing
Attack All The Layers - What's Working in Penetration TestingNetSPI
 
Attack All the Layers: What's Working during Pentests (OWASP NYC)
Attack All the Layers: What's Working during Pentests (OWASP NYC)Attack All the Layers: What's Working during Pentests (OWASP NYC)
Attack All the Layers: What's Working during Pentests (OWASP NYC)Scott Sutherland
 
NYJavaSIG - Big Data Microservices w/ Speedment
NYJavaSIG - Big Data Microservices w/ SpeedmentNYJavaSIG - Big Data Microservices w/ Speedment
NYJavaSIG - Big Data Microservices w/ SpeedmentSpeedment, Inc.
 
key aggregate cryptosystem for scalable data sharing in cloud
key aggregate cryptosystem for scalable data sharing in cloudkey aggregate cryptosystem for scalable data sharing in cloud
key aggregate cryptosystem for scalable data sharing in cloudSravan Narra
 
Real-Time Inverted Search NYC ASLUG Oct 2014
Real-Time Inverted Search NYC ASLUG Oct 2014Real-Time Inverted Search NYC ASLUG Oct 2014
Real-Time Inverted Search NYC ASLUG Oct 2014Bryan Bende
 
Share winter 2016 encryption
Share winter 2016 encryptionShare winter 2016 encryption
Share winter 2016 encryptionbigendiansmalls
 
2018 FRecure CISSP Mentor Program- Session 4
2018 FRecure CISSP Mentor Program- Session 42018 FRecure CISSP Mentor Program- Session 4
2018 FRecure CISSP Mentor Program- Session 4FRSecure
 

Similar to Outsourced database (20)

Isse 2014 homomorphic encryption and porticor post event
Isse 2014 homomorphic encryption and porticor   post eventIsse 2014 homomorphic encryption and porticor   post event
Isse 2014 homomorphic encryption and porticor post event
 
Slidecast - Workshop
Slidecast - WorkshopSlidecast - Workshop
Slidecast - Workshop
 
MesosCon EU 2017 - Criteo - Operating Mesos-based Infrastructures
MesosCon EU 2017 - Criteo - Operating Mesos-based InfrastructuresMesosCon EU 2017 - Criteo - Operating Mesos-based Infrastructures
MesosCon EU 2017 - Criteo - Operating Mesos-based Infrastructures
 
Internet2 DNSSEC Pilot
Internet2 DNSSEC PilotInternet2 DNSSEC Pilot
Internet2 DNSSEC Pilot
 
20-security.ppt
20-security.ppt20-security.ppt
20-security.ppt
 
Sql_DG_presentation.pptx
Sql_DG_presentation.pptxSql_DG_presentation.pptx
Sql_DG_presentation.pptx
 
Secure and Privacy-Preserving Big-Data Processing
Secure and Privacy-Preserving Big-Data ProcessingSecure and Privacy-Preserving Big-Data Processing
Secure and Privacy-Preserving Big-Data Processing
 
7. Key-Value Databases: In Depth
7. Key-Value Databases: In Depth7. Key-Value Databases: In Depth
7. Key-Value Databases: In Depth
 
Data Security for Project Managers
Data Security for Project ManagersData Security for Project Managers
Data Security for Project Managers
 
Heartache and Heartbleed - 31c3
Heartache and Heartbleed - 31c3Heartache and Heartbleed - 31c3
Heartache and Heartbleed - 31c3
 
Sullivan heartbleed-defcon22 2014
Sullivan heartbleed-defcon22 2014Sullivan heartbleed-defcon22 2014
Sullivan heartbleed-defcon22 2014
 
Taking Splunk to the Next Level - Architecture Breakout Session
Taking Splunk to the Next Level - Architecture Breakout SessionTaking Splunk to the Next Level - Architecture Breakout Session
Taking Splunk to the Next Level - Architecture Breakout Session
 
Attack All the Layers - What's Working in Penetration Testing
Attack All the Layers - What's Working in Penetration TestingAttack All the Layers - What's Working in Penetration Testing
Attack All the Layers - What's Working in Penetration Testing
 
Attack All The Layers - What's Working in Penetration Testing
Attack All The Layers - What's Working in Penetration TestingAttack All The Layers - What's Working in Penetration Testing
Attack All The Layers - What's Working in Penetration Testing
 
Attack All the Layers: What's Working during Pentests (OWASP NYC)
Attack All the Layers: What's Working during Pentests (OWASP NYC)Attack All the Layers: What's Working during Pentests (OWASP NYC)
Attack All the Layers: What's Working during Pentests (OWASP NYC)
 
NYJavaSIG - Big Data Microservices w/ Speedment
NYJavaSIG - Big Data Microservices w/ SpeedmentNYJavaSIG - Big Data Microservices w/ Speedment
NYJavaSIG - Big Data Microservices w/ Speedment
 
key aggregate cryptosystem for scalable data sharing in cloud
key aggregate cryptosystem for scalable data sharing in cloudkey aggregate cryptosystem for scalable data sharing in cloud
key aggregate cryptosystem for scalable data sharing in cloud
 
Real-Time Inverted Search NYC ASLUG Oct 2014
Real-Time Inverted Search NYC ASLUG Oct 2014Real-Time Inverted Search NYC ASLUG Oct 2014
Real-Time Inverted Search NYC ASLUG Oct 2014
 
Share winter 2016 encryption
Share winter 2016 encryptionShare winter 2016 encryption
Share winter 2016 encryption
 
2018 FRecure CISSP Mentor Program- Session 4
2018 FRecure CISSP Mentor Program- Session 42018 FRecure CISSP Mentor Program- Session 4
2018 FRecure CISSP Mentor Program- Session 4
 

Recently uploaded

9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 

Recently uploaded (20)

9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 

Outsourced database

  • 2. Purpose A Practical and Privacy-Preserving Outsourced Database
  • 3. Outline • Outsourcing • Long White Cloud (LWC) • Previous approaches • Future works
  • 4. Where to have outsourcing!?
  • 5. Secure Data A Naive Approach • Use standard encryption techniques • No operations could be performed
  • 6. SSE Scheme Searchable Symmetric Encryption • Introduced by Song in 2000 • Fully Homomorphic Encryption (FHE) • Oblivious RAM (ORAM) • Secure Multi-Party Computation (SMC) • Problem ?!
  • 7. Problems 1. Information Leakage Correlation between the queries and the matched data Solution : ORAM and PIR:  To minimize information leakage  Very costly  Not scale well  When dealing with dynamic data
  • 8. Problems 2. Lack of Support for a Full-Fledged Multi-User Access a) All users share the same key (Single User (SU) schemes) b) have a read-only key shared among all the users and one special key for inserting/updating data (Semi Fledged Multiple User (SFMU) schemes) Misplacing a key or revoking access Generation of a new key and re-encryption
  • 9. Solution A Full-Fledged Multi-User (FFMU) scheme: • Any authorized user is able to read and write • Users are able to join and leave the organization at any time without affecting rest of the users. LWC !
  • 10. Long White Cloud • Sub-linear Dynamic SSE • Supports high throughput of queries • Minimizes information leakage • Designed for large organizations Main Idea: Using a hybrid private/public cloud approach • Private part of the infrastructure to store the encrypted data  Speeding up the query processing to minimize information leakage on their local premises • The rest to a public cloud provider
  • 12. Long White Cloud • DataBase User (DBU) • DataBase Administrator (DBA) • Operations Proxy Server (OPS) • Private Cloud • Cloud Server (CS) • Public Cloud • Key Management Authority (KMA) • responsible for issuing encryption keys
  • 13. How to initialize the system?! Step 1: Set up the OPS Step 2: Prepare the DB on CS Step 3: Bringing the KMA online
  • 14. • Encrypting and Sending queries to OPS What are the steps? • Fetching data from CS by OPS • Doing calculation in OPS • Encrypting data and sending responses to DBU 2 1 3 4 1 2 4 3
  • 15. Details • (𝐾 𝐷𝐵𝑈, 𝐾 𝑈) • DBU has Both, OPS has the first • First encrypted by 𝐾 𝑈 then 𝐾 𝐷𝐵𝑈 • First Encryption : Deterministic and Symmetric to be searchable ( Just keywords) • Second Encryption: Semantically secure
  • 16. Example of Encryptions The first Encryption: “select * from Staff WHERE "𝐾 𝑈 (name) ="𝐾 𝑈 (Alice) AND "𝐾 𝑈 (age) = "𝐾 𝑈 (25)” The second Encryption: All the data
  • 18. Cloud Server Blocks, Slots ( Records), Cells B+ Tree: An encrypted keyword, and a pointer points to a list of (bi; sj) indicating the record store location on the CS.
  • 19. Oblivious Access Problem: • All users have 𝐾 𝑈 • Revoked users can access CS! Solution: • Using a pseudo-random permutation • Keeping seed in OPS
  • 20. Security Analysis γ − k blocks are picked randomly K : needed blocks γ: random blocks Fills a number of empty slots with random bit strings for each block
  • 21. Security Analysis • Search Pattern Privacy (SPP) • Distinguishing if two (or more) queries are the same or not • Achieved by random blocks • Access Pattern Privacy (APP) • Unable to learn if two (or more) real result sets overlap or not • Achieved in 2 levels: • Having Blocks • Random Blocks
  • 22. Security Analysis • Size Pattern Privacy (SzPP): • Unable to learn the size of returned (real) records. • Achieved in 2 levels: • Fetching data in blocks NOT slots • Having γ • Operation Pattern Privacy (OPP): • Unable to tell if the executed query is a select, update, delete, or insert. • Achieved by γ • Deleting by changing the flag
  • 23. Threats 1. External attack on OPS 2. Due to deterministic encryption APP, SPP and OPP is in danger
  • 24. Experimental Evaluation • Intel i5-4670 3:40 GHz processor • 8 GB of RAM • Linux Ubuntu 15.04 • Programmed in C • Compiled using GCC version 4.9.2 • No parallel operations or hyper-threading • OPS: picked up 2·k blocks • (k: needed blocks to execute the query)
  • 25. Experimental Evaluation End-to-end search time in LWC Query throughput comparisons for database schemes.
  • 26. Experimental Evaluation Time taken for executing an insert query in LWC. Time taken for executing a delete query in LWC
  • 28. • Shujie Cui, Ming Zhang, Muhammad Rizwan Asghar and Giovanni Russello (The University of Auckland, New Zealand). Long White Cloud (LWC): A Practical and Privacy-Preserving Outsourced Database Reference • http://www.onlinetech.com/ • D. Cash, P. Grubbs, J. Perry, and T. Ritsenpart. Leakage-abuse attacks against searchable encryption.

Editor's Notes

  1. Notes to presenter: What is your purpose for sharing this reflection? Is it at the end of a unit or project? Are you sharing this reflection, at the attainment of a learning goal you set for yourself? Is it at the end of a course? State your purpose for the reflection or even the purpose of the learning experience or learning goal. Be clear and be specific in stating your purpose.
  2. Notes to presenter: Description of what you learned in your own words on one side. Include information about the topic Details about the topic will also be helpful here. Tell the story of your learning experience. Just like a story there should always be a beginning, middle and an end. On the other side, you can add a graphic that provides evidence of what you learned. Feel free to use more than one slide to reflect upon your process. It also helps to add some video of your process.
  3. Notes to presenter: What did you think at first? What obstacles did you encounter along the way? How did you overcome those obstacles? What images can you add to support your process? This SmartArt allows you add images and text to help outline your process. If a picture is worth a thousand words, then pictures and words should help you communicate this reflection on learning perfectly! You can always click on Insert>SmartArt to change this graphic or select the graphic and click on the Design contextual menu to change the colors. Feel free to use more than one slide to reflect upon your process. It also helps to add some video of your process.
  4. Notes to presenter: What steps will you be taking as a result of this learning experience? Did you learn from any failed experiences? How will you do things differently? What advice will you give to others so they can learn from your experiences? How can you share what you learned with a real-world audience? Some examples of next steps might be: After delivering my first persuasive presentation, I am thinking about joining the debate team. After making my first film, I’m considering entering it in our school film festival or local film festival. After connecting with this career expert, I’d like to do some research on that career field because it sounds interesting to me. This SmartArt allows you add images and text to help outline your process. If a picture is worth a thousand words, then pictures and words should help you communicate this reflection on learning perfectly! You can always click on Insert>SmartArt to change this graphic or select the graphic and click on the Design contextual menu to change the colors. Feel free to use more than one slide to share your next steps. It also helps to add some video content to explain your message.
  5. Notes to presenter: What was important about this learning experience? How is it relevant to your course, yourself, or your society or community? Why is this significant? This SmartArt allows you add images and text to help outline your process. If a picture is worth a thousand words, then pictures and words should help you communicate this reflection on learning perfectly! You can always click on Insert>SmartArt to change this graphic or select the graphic and click on the Design contextual menu to change the colors.