Abstract
Database outsourcing is becoming increasingly popular introducing a new paradigm, called database-as-a-service, where an encrypted client's database is stored at an external service provider. Existing proposals for querying encrypted databases are based on the association, with each encrypted tuple, of additional indexing information obtained from the plaintext values of attributes that can be used in the queries. However, the relationship between indexes and data should not open the door to inference and linking attacks that can compromise the protection granted by encryption.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Aczél, J.: On Weighted Synthesis of Judgments. Aequationes Math. 27 (1984) 288–307
Ceselli, A., Damiani, E., De Capitani di Vimercati, S., Jajodia, S., Paraboschi, S., Samarati, P.: Modeling and Assessing Inference Exposure in Encrypted Databases. ACM Transactions on Information and System Security (TISSEC) 8(1) (February 2005) 119–152
Damiani, E., De Capitani di Vimercati, S., Finetti, M., Paraboschi, S., Samarati, P., Jajodia, S.: Implementation of a Storage Mechanism for Untrusted DBMSs. In Proc. of the Second International IEEE Security in Storage Workshop, Washington DC, USA (May 2003)
Damiani, E., De Capitani di Vimercati, S., Jajodia, S., Paraboschi, S., Samarati, P.: Balancing Confidentiality and Efficiency in Untrusted Relational DBMSs. In Proc. of the 10th ACM Conference on Computer and Communications Security, Washington, DC, USA (October 2003)
Davida, G.I., Wells, D.L., Kam, J.B.: A Database Encryption System with Subkeys. ACM Transactions on Database Systems 6(2) (June 1981) 312–328
Denning, D.E.: Cryptography and Data Security. Addison-Wesley (1982)
Fodor, J., Marichal, J.L., Roubens, M.: Characterization of the Ordered Weighted Averaging Operators. IEEE Transactions on Fuzzy Systems 3(2) (1995) 236–240
Grabisch, M.: Fuzzy Integral in Multicriteria Decision Making. Fuzzy Sets and Systems 69 (1995)279–298
Hacigümüs, H., Iyer, B., Mehrotra, S.: Providing Database as a Service. In Proc. of the 18th International Conference on Data Engineering, San Jose, California, USA (February 2002)
Hacigümüs, H., Iyer, B., Mehrotra, S.: Ensuring Integrity of Encrypted Databases in Database as a Service Model. In Proc. of the IFIP Conference on Data and Applications Security, Estes Park Colorado (August 2003)
Hacigümüs, H., Iyer, B., Mehrotra, S., Li, C.: Executing SQL over Encrypted Data in the Database-Service-Provider Model. In Proc. of the ACM SIGMOD'2002, Madison, Wisconsin, USA (June 2002)
Hore, B., Mehrotra, S., Tsudik, G.: A Privacy-Preserving Index for Range Queries. In Proc. of the 30th Very Large DataBase Conference, Toronto, Canada (2004)
McKay, B.D.: Practical Graph Isomorphism. Congressus Numerantium, 30 (1981) 45–87
Mesiar, R., Komorníková, M.: Aggregation Operators. In Proc. of the XI Conference on Applied Mathematics “PRIM' 96”, Budva, Serbia and Montenegro (1996).
Mykletun, E., Narasimha, M., Tsudik, G.: Authentication and Integrity in Outsourced Database. In Proc. of the 1lth Annual Network and Distributed System Security Symposium, San Diego, California, USA (February 2004)
Torra, V.: The Weighted OWA Operator. International Journal of Intelligent Systems 12(2) (1997)153–166
Torra, V.: On the Learning of Weights in some Aggregation Operators: the Weighted Mean and the OWA Operators. Math ware and Soft Computing 6 (1999) 249–265
Xu, Z.S., Da, Q.L.: An Overview of Operators for Aggregating Information. Iternational Journal of Intelligent Systems 18 (2003) 953–969
Yager, R.: On Ordered Weighted Averaging Aggregation Operators in Multicriteria Decision Making. IEEE Transactions on Systems, Man and Cybernetics 18(1) (1988) 183–190
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer Science+Business Media, LLC.
About this paper
Cite this paper
Damiani, E., De Capitani di Vimercati, S., Foresti, S., Samarati, P., Viviani, M. (2006). Measuring Inference Exposure in Outsourced Encrypted Databases. In: Gollmann, D., Massacci, F., Yautsiukhin, A. (eds) Quality of Protection. Advances in Information Security, vol 23. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-36584-8_15
Download citation
DOI: https://doi.org/10.1007/978-0-387-36584-8_15
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-29016-4
Online ISBN: 978-0-387-36584-8
eBook Packages: Computer ScienceComputer Science (R0)