Skip to main content

Processing OLAP Queries over an Encrypted Data Warehouse Stored in the Cloud

  • Conference paper
Data Warehousing and Knowledge Discovery (DaWaK 2014)

Abstract

Several studies deal with mechanisms for processing transactional queries over encrypted data. However, little attention has been devoted to determine how a data warehouse (DW) hosted in a cloud should be encrypted to enable analytical queries processing. In this article, we present a novel method for encrypting a DW and show performance results of this DW implementation. Moreover, an OLAP system based on the proposed encryption method was developed and performance tests were conducted to validate our system in terms of query processing performance. Results showed that the overhead caused by the proposed encryption method decreased when the proposed system was scaled out and compared to a non-encrypted dataset (46.62% with one node and 9.47% with 16 nodes). Also, the computation of aggregates and data groupings over encrypted data in the server produced performance gains (from 84.67% to 93.95%) when compared to their executions in the client, after decryption.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kadhen, H., Amagasa, T., Kitagawa, H.: A Novel Framework for Database Security Based on Mixed Cryptography. In: Proc. ICIW, Venice, Italy, pp. 163–170 (2009)

    Google Scholar 

  2. Hore, B., Mehrotra, S., Canim, M., Kantarcioglu, M.: Secure Multidimensional Range Queries over Outsourced Data. The VLDB Journal 21(3), 333–358 (2012)

    Article  Google Scholar 

  3. Kadhen, H., Amagasa, T., Kitagawa, H.: Optimization Techniques for Range Queries in the Multivalued-Partial Order Preserving Encryption Scheme. Knowledge Discovery, Knowledge Engineering and Knowledge Management 272, 338–353 (2013)

    Article  Google Scholar 

  4. Kadhen, H., Amagasa, T., Kitagawa, H.: MV-OPES: Multivalued-Order Preserving Encryption Scheme: A Novel Scheme for Encrypting Integer Value to Many Different Values. IEICE Trans. Inf. & Syst. 93-D(9), 2520–2533 (2010)

    Google Scholar 

  5. Chen, K., Kavuluru, R., Guo, S.: RASP: Efficient Multidimensional Range Query on Attack-resilient Encrypted Databases. In: Proc. CODASPY, New York, USA, pp. 249–260 (2011)

    Google Scholar 

  6. Liu, D., Wang, S.: Programmable Order-Preserving Secure Index for Encrypted Database Query. In: Proc. CLOUD, Washington, USA, pp. 502–509 (2012)

    Google Scholar 

  7. Popa, R.A., Redfield, C.M.S., Zeldovich, N., Balakrishnan, H.: CryptDB: Processing Queries on an Encrypted Database. Commun. ACM 55(9), 103–111 (2012)

    Article  Google Scholar 

  8. Castelluccia, C., Chan, A.C.F., Mykletun, E., Tsudik, G.: Efficient and Provably Secure Aggregation of Encrypted Data in WSN. ACM Trans. Sen. Netw. 5(3), 1–36 (2009)

    Article  Google Scholar 

  9. Liu, D.: Securing Outsourced Databases in the Cloud. In: Security, Privacy and Trust in Cloud Systems, pp. 259–282. Springer, Heidelberg (2014)

    Chapter  Google Scholar 

  10. Schneier, B.: Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish). In: Fast Software Encryption, Cambridge Security Workshop, London, UK, pp. 191–204 (1993)

    Google Scholar 

  11. O’Neil, P., O’Neil, E., Chen, X.: The Star Schema Benchmark. Online Publication of Database Generation Program (2007), http://www.cs.umb.edu/~poneil/StarSchemaB.pdf

  12. Wang, P., Ravishankar, C.V.: Secure and Efficient Range Queries on Outsourced Databases using Rp-trees. In: Proc. ICDE, Brisbane, Australia, pp. 314–325 (2013)

    Google Scholar 

  13. Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Order Preserving Encryption for Numeric Data. In: Proc. SIGMOD, Paris, France, pp. 563–574 (2004)

    Google Scholar 

  14. Kimball, R., Ross, M.: The Data Warehouse Toolkit: The Definitive Guide to Dimensional Modeling, 3rd edn. John Wiley & Sons (2013)

    Google Scholar 

  15. Suciu, D.: SQL on an Encrypted Database: Technical Perspective. Commun. ACM 55(9), 102–102 (2012)

    Article  Google Scholar 

  16. Adabi, J.D.: Data Management in the Cloud: Limitations and Opportunities. IEEE Data Eng. Bull. 32(1), 3–12 (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Lopes, C.C., Times, V.C., Matwin, S., Ciferri, R.R., Ciferri, C.D.d.A. (2014). Processing OLAP Queries over an Encrypted Data Warehouse Stored in the Cloud. In: Bellatreche, L., Mohania, M.K. (eds) Data Warehousing and Knowledge Discovery. DaWaK 2014. Lecture Notes in Computer Science, vol 8646. Springer, Cham. https://doi.org/10.1007/978-3-319-10160-6_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-10160-6_18

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-10159-0

  • Online ISBN: 978-3-319-10160-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics