SlideShare una empresa de Scribd logo
1 de 28
Data Outsourcing
Security of DBs course given at Tarbiat Modares University
Lecturer:
Faraz Safarpour
Instructor:
Dr. Sadegh Dorri
Fall Semester 2018-2019
12/31/2018
Purpose
A Practical and Privacy-Preserving Outsourced Database
Outline
• Outsourcing
• Long White Cloud (LWC)
• Previous approaches
• Future works
Where to have outsourcing!?
Secure Data
A Naive Approach
• Use standard encryption techniques
• No operations could be performed
SSE Scheme
Searchable Symmetric Encryption
• Introduced by Song in 2000
• Fully Homomorphic Encryption (FHE)
• Oblivious RAM (ORAM)
• Secure Multi-Party Computation (SMC)
• Problem ?!
Problems
1. Information Leakage
Correlation between the queries and the matched data
Solution :
ORAM and PIR:
 To minimize information leakage
 Very costly
 Not scale well
 When dealing with dynamic data
Problems
2. Lack of Support for a Full-Fledged Multi-User Access
a) All users share the same key (Single User (SU) schemes)
b) have a read-only key shared among all the users
and one special key for inserting/updating data
(Semi Fledged Multiple User (SFMU) schemes)
Misplacing a key or revoking access
Generation of a new key and re-encryption
Solution
A Full-Fledged Multi-User (FFMU) scheme:
• Any authorized user is able to read and write
• Users are able to join and leave the organization at
any time without affecting rest of the users.
LWC !
Long White Cloud
• Sub-linear Dynamic SSE
• Supports high throughput of queries
• Minimizes information leakage
• Designed for large organizations
Main Idea:
Using a hybrid private/public cloud approach
• Private part of the infrastructure
to store the encrypted data
 Speeding up the query processing
to minimize information leakage
on their local premises
• The rest to a public cloud provider
Long White Cloud
Long White Cloud
• DataBase User (DBU)
• DataBase Administrator (DBA)
• Operations Proxy Server (OPS)
• Private Cloud
• Cloud Server (CS)
• Public Cloud
• Key Management Authority (KMA)
• responsible for issuing encryption keys
How to initialize the system?!
Step 1: Set up the OPS
Step 2: Prepare the DB on CS
Step 3: Bringing the KMA online
• Encrypting and Sending
queries to OPS
What are the steps?
• Fetching data from CS by
OPS
• Doing calculation in OPS
• Encrypting data and sending
responses to DBU
2
1
3
4
1
2
4
3
Details
• (𝐾 𝐷𝐵𝑈, 𝐾 𝑈)
• DBU has Both, OPS has the first
• First encrypted by 𝐾 𝑈 then 𝐾 𝐷𝐵𝑈
• First Encryption : Deterministic and
Symmetric to be searchable ( Just
keywords)
• Second Encryption: Semantically secure
Example of Encryptions
The first Encryption:
“select * from Staff WHERE
"𝐾 𝑈 (name) ="𝐾 𝑈 (Alice)
AND "𝐾 𝑈 (age) = "𝐾 𝑈 (25)”
The second Encryption:
All the data
Details
Cloud Server
Blocks, Slots ( Records), Cells
B+ Tree:
An encrypted keyword, and a pointer points to
a list of (bi; sj) indicating the record store
location on the CS.
Oblivious Access
Problem:
• All users have 𝐾 𝑈
• Revoked users can access CS!
Solution:
• Using a pseudo-random permutation
• Keeping seed in OPS
Security Analysis
γ − k blocks are picked randomly
K : needed blocks
γ: random blocks
Fills a number of empty slots with random
bit strings for each block
Security Analysis
• Search Pattern Privacy (SPP)
• Distinguishing if two (or more)
queries are the same or not
• Achieved by random blocks
• Access Pattern Privacy (APP)
• Unable to learn if two (or more)
real result sets overlap or not
• Achieved in 2 levels:
• Having Blocks
• Random Blocks
Security Analysis
• Size Pattern Privacy (SzPP):
• Unable to learn the size of returned (real)
records.
• Achieved in 2 levels:
• Fetching data in blocks NOT slots
• Having γ
• Operation Pattern Privacy (OPP):
• Unable to tell if the executed query is a
select, update, delete, or insert.
• Achieved by γ
• Deleting by changing the flag
Threats
1. External attack on OPS
2. Due to deterministic encryption
APP, SPP and OPP is in danger
Experimental Evaluation
• Intel i5-4670 3:40 GHz processor
• 8 GB of RAM
• Linux Ubuntu 15.04
• Programmed in C
• Compiled using GCC version 4.9.2
• No parallel operations or hyper-threading
• OPS: picked up 2·k blocks
• (k: needed blocks to execute the query)
Experimental Evaluation
End-to-end search time in LWC Query throughput comparisons for database schemes.
Experimental Evaluation
Time taken for executing an insert query in LWC. Time taken for executing a delete query in LWC
Future Works
Untrusted Cloud Servers
• Shujie Cui, Ming Zhang, Muhammad Rizwan Asghar and Giovanni Russello (The University of
Auckland, New Zealand). Long White Cloud (LWC): A Practical and Privacy-Preserving
Outsourced Database
Reference
• http://www.onlinetech.com/
• D. Cash, P. Grubbs, J. Perry, and T. Ritsenpart. Leakage-abuse attacks against
searchable encryption.

Más contenido relacionado

La actualidad más candente

Practical rsa padding oracle attacks
Practical rsa padding oracle attacksPractical rsa padding oracle attacks
Practical rsa padding oracle attacksAlexandre Moneger
 
Capturing Network Traffic into Database
Capturing Network Traffic into Database Capturing Network Traffic into Database
Capturing Network Traffic into Database Tigran Tsaturyan
 
Debugging With Id
Debugging With IdDebugging With Id
Debugging With Idguest215c4e
 
NBTC#2 - Why instrumentation is cooler then ice
NBTC#2 - Why instrumentation is cooler then iceNBTC#2 - Why instrumentation is cooler then ice
NBTC#2 - Why instrumentation is cooler then iceAlexandre Moneger
 
Second phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANC...
Second phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANC...Second phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANC...
Second phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANC...Nikhil Jain
 
First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...
First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...
First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...Nikhil Jain
 
Sequence to Sequence Pattern Learning Algorithm for Real-time Anomaly Detecti...
Sequence to Sequence Pattern Learning Algorithm for Real-time Anomaly Detecti...Sequence to Sequence Pattern Learning Algorithm for Real-time Anomaly Detecti...
Sequence to Sequence Pattern Learning Algorithm for Real-time Anomaly Detecti...Gobinath Loganathan
 
State of Transport Security in the E-Mail Ecosystem at Large
State of Transport Security in the E-Mail Ecosystem at LargeState of Transport Security in the E-Mail Ecosystem at Large
State of Transport Security in the E-Mail Ecosystem at LargeAaron Zauner
 
Dynamic Filtering: Multi-Purpose Architecture Support for Language Runtime Sy...
Dynamic Filtering: Multi-Purpose Architecture Support for Language Runtime Sy...Dynamic Filtering: Multi-Purpose Architecture Support for Language Runtime Sy...
Dynamic Filtering: Multi-Purpose Architecture Support for Language Runtime Sy...Yuanxuan Wang
 
Как разработать DBFW с нуля
Как разработать DBFW с нуляКак разработать DBFW с нуля
Как разработать DBFW с нуляPositive Hack Days
 
Oram And Secure Computation
Oram And Secure ComputationOram And Secure Computation
Oram And Secure ComputationChong-Kuan Chen
 
BSides LV 2016 - Beyond the tip of the iceberg - fuzzing binary protocols for...
BSides LV 2016 - Beyond the tip of the iceberg - fuzzing binary protocols for...BSides LV 2016 - Beyond the tip of the iceberg - fuzzing binary protocols for...
BSides LV 2016 - Beyond the tip of the iceberg - fuzzing binary protocols for...Alexandre Moneger
 
Shannon’s strategy
Shannon’s strategyShannon’s strategy
Shannon’s strategySri Vidhya
 
Evaluation of mininet WiFi integration via ns-3
Evaluation of mininet WiFi integration via ns-3Evaluation of mininet WiFi integration via ns-3
Evaluation of mininet WiFi integration via ns-3Farzaneh Pakzad
 
CNIT 141 10. RSA
CNIT 141 10. RSACNIT 141 10. RSA
CNIT 141 10. RSASam Bowne
 
Link Capacity Estimation in SDN-based End-hosts
Link Capacity Estimation in SDN-based End-hostsLink Capacity Estimation in SDN-based End-hosts
Link Capacity Estimation in SDN-based End-hostsFarzaneh Pakzad
 
Introduction to Dynamic Malware Analysis ...Or am I "Cuckoo for Malware?"
Introduction to Dynamic Malware Analysis   ...Or am I "Cuckoo for Malware?"Introduction to Dynamic Malware Analysis   ...Or am I "Cuckoo for Malware?"
Introduction to Dynamic Malware Analysis ...Or am I "Cuckoo for Malware?"Lane Huff
 

La actualidad más candente (20)

Practical rsa padding oracle attacks
Practical rsa padding oracle attacksPractical rsa padding oracle attacks
Practical rsa padding oracle attacks
 
Capturing Network Traffic into Database
Capturing Network Traffic into Database Capturing Network Traffic into Database
Capturing Network Traffic into Database
 
BlueHat v17 || Disrupting the Mirai Botnet
BlueHat v17 || Disrupting the Mirai Botnet BlueHat v17 || Disrupting the Mirai Botnet
BlueHat v17 || Disrupting the Mirai Botnet
 
Debugging With Id
Debugging With IdDebugging With Id
Debugging With Id
 
NBTC#2 - Why instrumentation is cooler then ice
NBTC#2 - Why instrumentation is cooler then iceNBTC#2 - Why instrumentation is cooler then ice
NBTC#2 - Why instrumentation is cooler then ice
 
Distributed Hash Table
Distributed Hash TableDistributed Hash Table
Distributed Hash Table
 
Second phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANC...
Second phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANC...Second phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANC...
Second phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANC...
 
First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...
First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...
First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...
 
Sequence to Sequence Pattern Learning Algorithm for Real-time Anomaly Detecti...
Sequence to Sequence Pattern Learning Algorithm for Real-time Anomaly Detecti...Sequence to Sequence Pattern Learning Algorithm for Real-time Anomaly Detecti...
Sequence to Sequence Pattern Learning Algorithm for Real-time Anomaly Detecti...
 
State of Transport Security in the E-Mail Ecosystem at Large
State of Transport Security in the E-Mail Ecosystem at LargeState of Transport Security in the E-Mail Ecosystem at Large
State of Transport Security in the E-Mail Ecosystem at Large
 
Dynamic Filtering: Multi-Purpose Architecture Support for Language Runtime Sy...
Dynamic Filtering: Multi-Purpose Architecture Support for Language Runtime Sy...Dynamic Filtering: Multi-Purpose Architecture Support for Language Runtime Sy...
Dynamic Filtering: Multi-Purpose Architecture Support for Language Runtime Sy...
 
Как разработать DBFW с нуля
Как разработать DBFW с нуляКак разработать DBFW с нуля
Как разработать DBFW с нуля
 
Oram And Secure Computation
Oram And Secure ComputationOram And Secure Computation
Oram And Secure Computation
 
BSides LV 2016 - Beyond the tip of the iceberg - fuzzing binary protocols for...
BSides LV 2016 - Beyond the tip of the iceberg - fuzzing binary protocols for...BSides LV 2016 - Beyond the tip of the iceberg - fuzzing binary protocols for...
BSides LV 2016 - Beyond the tip of the iceberg - fuzzing binary protocols for...
 
Shannon’s strategy
Shannon’s strategyShannon’s strategy
Shannon’s strategy
 
Evaluation of mininet WiFi integration via ns-3
Evaluation of mininet WiFi integration via ns-3Evaluation of mininet WiFi integration via ns-3
Evaluation of mininet WiFi integration via ns-3
 
CNIT 141 10. RSA
CNIT 141 10. RSACNIT 141 10. RSA
CNIT 141 10. RSA
 
Link Capacity Estimation in SDN-based End-hosts
Link Capacity Estimation in SDN-based End-hostsLink Capacity Estimation in SDN-based End-hosts
Link Capacity Estimation in SDN-based End-hosts
 
Introduction to Dynamic Malware Analysis ...Or am I "Cuckoo for Malware?"
Introduction to Dynamic Malware Analysis   ...Or am I "Cuckoo for Malware?"Introduction to Dynamic Malware Analysis   ...Or am I "Cuckoo for Malware?"
Introduction to Dynamic Malware Analysis ...Or am I "Cuckoo for Malware?"
 
Introduction to Exploitation
Introduction to ExploitationIntroduction to Exploitation
Introduction to Exploitation
 

Similar a Outsourced database

Secure and Privacy-Preserving Big-Data Processing
Secure and Privacy-Preserving Big-Data ProcessingSecure and Privacy-Preserving Big-Data Processing
Secure and Privacy-Preserving Big-Data ProcessingShantanu Sharma
 
Isse 2014 homomorphic encryption and porticor post event
Isse 2014 homomorphic encryption and porticor   post eventIsse 2014 homomorphic encryption and porticor   post event
Isse 2014 homomorphic encryption and porticor post eventICT Economic Impact
 
Internet2 DNSSEC Pilot
Internet2 DNSSEC PilotInternet2 DNSSEC Pilot
Internet2 DNSSEC PilotShumon Huque
 
Cryptography Challenges for Computational Privacy in Public Clouds
Cryptography Challenges for Computational Privacy in Public CloudsCryptography Challenges for Computational Privacy in Public Clouds
Cryptography Challenges for Computational Privacy in Public CloudsSashank Dara
 
Data Security for Project Managers
Data Security for Project ManagersData Security for Project Managers
Data Security for Project ManagersJoseph Wojowski
 
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malwareDefcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malwarePriyanka Aash
 
Climb stateoftheartintro
Climb stateoftheartintroClimb stateoftheartintro
Climb stateoftheartintrothomasrconnor
 
Taking Splunk to the Next Level - Architecture Breakout Session
Taking Splunk to the Next Level - Architecture Breakout SessionTaking Splunk to the Next Level - Architecture Breakout Session
Taking Splunk to the Next Level - Architecture Breakout SessionSplunk
 
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malwareDefcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malwareDaveEdwards12
 
MesosCon EU 2017 - Criteo - Operating Mesos-based Infrastructures
MesosCon EU 2017 - Criteo - Operating Mesos-based InfrastructuresMesosCon EU 2017 - Criteo - Operating Mesos-based Infrastructures
MesosCon EU 2017 - Criteo - Operating Mesos-based Infrastructurespierrecdn -
 
7. Key-Value Databases: In Depth
7. Key-Value Databases: In Depth7. Key-Value Databases: In Depth
7. Key-Value Databases: In DepthFabio Fumarola
 
102.12.25 中正大學資管系古政元教授 屏東科技大學演講(2013-12-25)
102.12.25 中正大學資管系古政元教授 屏東科技大學演講(2013-12-25)102.12.25 中正大學資管系古政元教授 屏東科技大學演講(2013-12-25)
102.12.25 中正大學資管系古政元教授 屏東科技大學演講(2013-12-25)平原 謝
 
Attack All the Layers - What's Working in Penetration Testing
Attack All the Layers - What's Working in Penetration TestingAttack All the Layers - What's Working in Penetration Testing
Attack All the Layers - What's Working in Penetration TestingNetSPI
 
Attack All The Layers - What's Working in Penetration Testing
Attack All The Layers - What's Working in Penetration TestingAttack All The Layers - What's Working in Penetration Testing
Attack All The Layers - What's Working in Penetration TestingNetSPI
 
Attack All the Layers: What's Working during Pentests (OWASP NYC)
Attack All the Layers: What's Working during Pentests (OWASP NYC)Attack All the Layers: What's Working during Pentests (OWASP NYC)
Attack All the Layers: What's Working during Pentests (OWASP NYC)Scott Sutherland
 
Share winter 2016 encryption
Share winter 2016 encryptionShare winter 2016 encryption
Share winter 2016 encryptionbigendiansmalls
 
20-security.ppt
20-security.ppt20-security.ppt
20-security.pptajajkhan16
 
Real-Time Inverted Search NYC ASLUG Oct 2014
Real-Time Inverted Search NYC ASLUG Oct 2014Real-Time Inverted Search NYC ASLUG Oct 2014
Real-Time Inverted Search NYC ASLUG Oct 2014Bryan Bende
 
NYJavaSIG - Big Data Microservices w/ Speedment
NYJavaSIG - Big Data Microservices w/ SpeedmentNYJavaSIG - Big Data Microservices w/ Speedment
NYJavaSIG - Big Data Microservices w/ SpeedmentSpeedment, Inc.
 

Similar a Outsourced database (20)

Secure and Privacy-Preserving Big-Data Processing
Secure and Privacy-Preserving Big-Data ProcessingSecure and Privacy-Preserving Big-Data Processing
Secure and Privacy-Preserving Big-Data Processing
 
Isse 2014 homomorphic encryption and porticor post event
Isse 2014 homomorphic encryption and porticor   post eventIsse 2014 homomorphic encryption and porticor   post event
Isse 2014 homomorphic encryption and porticor post event
 
Internet2 DNSSEC Pilot
Internet2 DNSSEC PilotInternet2 DNSSEC Pilot
Internet2 DNSSEC Pilot
 
Cryptography Challenges for Computational Privacy in Public Clouds
Cryptography Challenges for Computational Privacy in Public CloudsCryptography Challenges for Computational Privacy in Public Clouds
Cryptography Challenges for Computational Privacy in Public Clouds
 
Data Security for Project Managers
Data Security for Project ManagersData Security for Project Managers
Data Security for Project Managers
 
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malwareDefcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
 
Climb stateoftheartintro
Climb stateoftheartintroClimb stateoftheartintro
Climb stateoftheartintro
 
Taking Splunk to the Next Level - Architecture Breakout Session
Taking Splunk to the Next Level - Architecture Breakout SessionTaking Splunk to the Next Level - Architecture Breakout Session
Taking Splunk to the Next Level - Architecture Breakout Session
 
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malwareDefcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
 
MesosCon EU 2017 - Criteo - Operating Mesos-based Infrastructures
MesosCon EU 2017 - Criteo - Operating Mesos-based InfrastructuresMesosCon EU 2017 - Criteo - Operating Mesos-based Infrastructures
MesosCon EU 2017 - Criteo - Operating Mesos-based Infrastructures
 
7. Key-Value Databases: In Depth
7. Key-Value Databases: In Depth7. Key-Value Databases: In Depth
7. Key-Value Databases: In Depth
 
Internals of Presto Service
Internals of Presto ServiceInternals of Presto Service
Internals of Presto Service
 
102.12.25 中正大學資管系古政元教授 屏東科技大學演講(2013-12-25)
102.12.25 中正大學資管系古政元教授 屏東科技大學演講(2013-12-25)102.12.25 中正大學資管系古政元教授 屏東科技大學演講(2013-12-25)
102.12.25 中正大學資管系古政元教授 屏東科技大學演講(2013-12-25)
 
Attack All the Layers - What's Working in Penetration Testing
Attack All the Layers - What's Working in Penetration TestingAttack All the Layers - What's Working in Penetration Testing
Attack All the Layers - What's Working in Penetration Testing
 
Attack All The Layers - What's Working in Penetration Testing
Attack All The Layers - What's Working in Penetration TestingAttack All The Layers - What's Working in Penetration Testing
Attack All The Layers - What's Working in Penetration Testing
 
Attack All the Layers: What's Working during Pentests (OWASP NYC)
Attack All the Layers: What's Working during Pentests (OWASP NYC)Attack All the Layers: What's Working during Pentests (OWASP NYC)
Attack All the Layers: What's Working during Pentests (OWASP NYC)
 
Share winter 2016 encryption
Share winter 2016 encryptionShare winter 2016 encryption
Share winter 2016 encryption
 
20-security.ppt
20-security.ppt20-security.ppt
20-security.ppt
 
Real-Time Inverted Search NYC ASLUG Oct 2014
Real-Time Inverted Search NYC ASLUG Oct 2014Real-Time Inverted Search NYC ASLUG Oct 2014
Real-Time Inverted Search NYC ASLUG Oct 2014
 
NYJavaSIG - Big Data Microservices w/ Speedment
NYJavaSIG - Big Data Microservices w/ SpeedmentNYJavaSIG - Big Data Microservices w/ Speedment
NYJavaSIG - Big Data Microservices w/ Speedment
 

Último

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 

Último (20)

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 

Outsourced database

  • 1. Data Outsourcing Security of DBs course given at Tarbiat Modares University Lecturer: Faraz Safarpour Instructor: Dr. Sadegh Dorri Fall Semester 2018-2019 12/31/2018
  • 2. Purpose A Practical and Privacy-Preserving Outsourced Database
  • 3. Outline • Outsourcing • Long White Cloud (LWC) • Previous approaches • Future works
  • 4. Where to have outsourcing!?
  • 5. Secure Data A Naive Approach • Use standard encryption techniques • No operations could be performed
  • 6. SSE Scheme Searchable Symmetric Encryption • Introduced by Song in 2000 • Fully Homomorphic Encryption (FHE) • Oblivious RAM (ORAM) • Secure Multi-Party Computation (SMC) • Problem ?!
  • 7. Problems 1. Information Leakage Correlation between the queries and the matched data Solution : ORAM and PIR:  To minimize information leakage  Very costly  Not scale well  When dealing with dynamic data
  • 8. Problems 2. Lack of Support for a Full-Fledged Multi-User Access a) All users share the same key (Single User (SU) schemes) b) have a read-only key shared among all the users and one special key for inserting/updating data (Semi Fledged Multiple User (SFMU) schemes) Misplacing a key or revoking access Generation of a new key and re-encryption
  • 9. Solution A Full-Fledged Multi-User (FFMU) scheme: • Any authorized user is able to read and write • Users are able to join and leave the organization at any time without affecting rest of the users. LWC !
  • 10. Long White Cloud • Sub-linear Dynamic SSE • Supports high throughput of queries • Minimizes information leakage • Designed for large organizations Main Idea: Using a hybrid private/public cloud approach • Private part of the infrastructure to store the encrypted data  Speeding up the query processing to minimize information leakage on their local premises • The rest to a public cloud provider
  • 12. Long White Cloud • DataBase User (DBU) • DataBase Administrator (DBA) • Operations Proxy Server (OPS) • Private Cloud • Cloud Server (CS) • Public Cloud • Key Management Authority (KMA) • responsible for issuing encryption keys
  • 13. How to initialize the system?! Step 1: Set up the OPS Step 2: Prepare the DB on CS Step 3: Bringing the KMA online
  • 14. • Encrypting and Sending queries to OPS What are the steps? • Fetching data from CS by OPS • Doing calculation in OPS • Encrypting data and sending responses to DBU 2 1 3 4 1 2 4 3
  • 15. Details • (𝐾 𝐷𝐵𝑈, 𝐾 𝑈) • DBU has Both, OPS has the first • First encrypted by 𝐾 𝑈 then 𝐾 𝐷𝐵𝑈 • First Encryption : Deterministic and Symmetric to be searchable ( Just keywords) • Second Encryption: Semantically secure
  • 16. Example of Encryptions The first Encryption: “select * from Staff WHERE "𝐾 𝑈 (name) ="𝐾 𝑈 (Alice) AND "𝐾 𝑈 (age) = "𝐾 𝑈 (25)” The second Encryption: All the data
  • 18. Cloud Server Blocks, Slots ( Records), Cells B+ Tree: An encrypted keyword, and a pointer points to a list of (bi; sj) indicating the record store location on the CS.
  • 19. Oblivious Access Problem: • All users have 𝐾 𝑈 • Revoked users can access CS! Solution: • Using a pseudo-random permutation • Keeping seed in OPS
  • 20. Security Analysis γ − k blocks are picked randomly K : needed blocks γ: random blocks Fills a number of empty slots with random bit strings for each block
  • 21. Security Analysis • Search Pattern Privacy (SPP) • Distinguishing if two (or more) queries are the same or not • Achieved by random blocks • Access Pattern Privacy (APP) • Unable to learn if two (or more) real result sets overlap or not • Achieved in 2 levels: • Having Blocks • Random Blocks
  • 22. Security Analysis • Size Pattern Privacy (SzPP): • Unable to learn the size of returned (real) records. • Achieved in 2 levels: • Fetching data in blocks NOT slots • Having γ • Operation Pattern Privacy (OPP): • Unable to tell if the executed query is a select, update, delete, or insert. • Achieved by γ • Deleting by changing the flag
  • 23. Threats 1. External attack on OPS 2. Due to deterministic encryption APP, SPP and OPP is in danger
  • 24. Experimental Evaluation • Intel i5-4670 3:40 GHz processor • 8 GB of RAM • Linux Ubuntu 15.04 • Programmed in C • Compiled using GCC version 4.9.2 • No parallel operations or hyper-threading • OPS: picked up 2·k blocks • (k: needed blocks to execute the query)
  • 25. Experimental Evaluation End-to-end search time in LWC Query throughput comparisons for database schemes.
  • 26. Experimental Evaluation Time taken for executing an insert query in LWC. Time taken for executing a delete query in LWC
  • 28. • Shujie Cui, Ming Zhang, Muhammad Rizwan Asghar and Giovanni Russello (The University of Auckland, New Zealand). Long White Cloud (LWC): A Practical and Privacy-Preserving Outsourced Database Reference • http://www.onlinetech.com/ • D. Cash, P. Grubbs, J. Perry, and T. Ritsenpart. Leakage-abuse attacks against searchable encryption.

Notas del editor

  1. Notes to presenter: What is your purpose for sharing this reflection? Is it at the end of a unit or project? Are you sharing this reflection, at the attainment of a learning goal you set for yourself? Is it at the end of a course? State your purpose for the reflection or even the purpose of the learning experience or learning goal. Be clear and be specific in stating your purpose.
  2. Notes to presenter: Description of what you learned in your own words on one side. Include information about the topic Details about the topic will also be helpful here. Tell the story of your learning experience. Just like a story there should always be a beginning, middle and an end. On the other side, you can add a graphic that provides evidence of what you learned. Feel free to use more than one slide to reflect upon your process. It also helps to add some video of your process.
  3. Notes to presenter: What did you think at first? What obstacles did you encounter along the way? How did you overcome those obstacles? What images can you add to support your process? This SmartArt allows you add images and text to help outline your process. If a picture is worth a thousand words, then pictures and words should help you communicate this reflection on learning perfectly! You can always click on Insert>SmartArt to change this graphic or select the graphic and click on the Design contextual menu to change the colors. Feel free to use more than one slide to reflect upon your process. It also helps to add some video of your process.
  4. Notes to presenter: What steps will you be taking as a result of this learning experience? Did you learn from any failed experiences? How will you do things differently? What advice will you give to others so they can learn from your experiences? How can you share what you learned with a real-world audience? Some examples of next steps might be: After delivering my first persuasive presentation, I am thinking about joining the debate team. After making my first film, I’m considering entering it in our school film festival or local film festival. After connecting with this career expert, I’d like to do some research on that career field because it sounds interesting to me. This SmartArt allows you add images and text to help outline your process. If a picture is worth a thousand words, then pictures and words should help you communicate this reflection on learning perfectly! You can always click on Insert>SmartArt to change this graphic or select the graphic and click on the Design contextual menu to change the colors. Feel free to use more than one slide to share your next steps. It also helps to add some video content to explain your message.
  5. Notes to presenter: What was important about this learning experience? How is it relevant to your course, yourself, or your society or community? Why is this significant? This SmartArt allows you add images and text to help outline your process. If a picture is worth a thousand words, then pictures and words should help you communicate this reflection on learning perfectly! You can always click on Insert>SmartArt to change this graphic or select the graphic and click on the Design contextual menu to change the colors.