Skip to main content

Secure and Privacy Preserving Outsourcing of Tree Structured Data

  • Conference paper
Book cover Secure Data Management (SDM 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3178))

Included in the following conference series:

Abstract

With the increasing use of web services, many new challenges concerning data security are becoming critical. Data or applications can now be outsourced to powerful remote servers, which are able to provide services on behalf of the owners. Unfortunately, such hosts may not always be trustworthy. In [1,2], we presented a one-server computationally private tree traversal technique, which allows clients to outsource tree-structured data. In this paper, we extend this protocol to prevent a polynomial time server with large memory to use correlations in client queries and in data structures to learn private information about queries and data. We show that, when the proposed techniques are used, computational privacy is achieved even for non-uniformly distributed node accesses that are common in real databases.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Lin, P., Candan, K.S.: Hiding traversal of tree structured data from untrusted data stores. In: Proc. of the 2nd Inernational Workshop on Security In Informtion Systems, WOSIS 2004, pp. 314–323 (2004)

    Google Scholar 

  2. Lin, P., Candan, K.S. (2004) Ensuring privacy of tree structured data and queries from untrusted data stores. Information System Security, pp. 22–38 (May/June 2004)

    Google Scholar 

  3. Yang, X., Li, C.: Secure XML publishing without information leakage in the presence of data inference. In: VLDB 2004 (2004)

    Google Scholar 

  4. Hore, B., Mehrotra, S., Tsudik, G.: A privacy-preserving index for range queries. In: VLDB 2004 (2004)

    Google Scholar 

  5. Song, D.X., Wagner, D., Perrig, A.: Practical Techniques for Searches on Encrypted Data. In: IEEE Symposium on Security and Privacy 2000, pp. 44–55 (2000)

    Google Scholar 

  6. Damiani, E., Vimercati, S.D.C., Jajodia, S., Paraboschi, S., Samarati, P.: Balancing confidentiality and efficiency in untrusted relational DBMSs. In: Proc. of ACM Conference on Computer and Communications Security, pp. 93–102 (2003)

    Google Scholar 

  7. Hacigümüs, H., Iyer, B.R., Li, C., Mehrotra, S.: Executing SQL over encrypted data in the database-service-provider model. In: Proc. of ACM SIGMOD International Conference on Management of Data, Madison, Wisconsin, USA, June 3-6, pp. 216–227 (2002)

    Google Scholar 

  8. Paparizos, S., Al-Khalifa, S., Chapman, A., Jagadish, H.V., Lakshmanan, L.V.S., Nierman, A., Patel, J.M., Srivastava, D., Wiwatwattana, N., Wu, Y., Yu, C.: TIMBER: A Native XML Database for Querying XML. In: Proc. of ACM SIGMOD International Conference on Management of Data, San Diego, California, USA, June 9-12, p. 672 (2003)

    Google Scholar 

  9. Bertino, E., Carminati, B., Ferrari, E., Thuraisinggam, B.M., Gupta, A.: Selective and authentic third-party distribution of XML documents. MIT Sloan Working Paper No. 4343-02 (2002)

    Google Scholar 

  10. Bertino, E., Ferrari, E.: Secure and selective dissemination of XML documents. ACM Transactions on Information and System Security 5(3), 290–331 (2002)

    Article  Google Scholar 

  11. Damiani, E., di Vimercati, S.D.C., Paraboschi, S., Samarati, P.: Securing XML documents. In: Proc. of the 7th International Conference on Extending Database Technology, Konstanz, Germany, March 27-31, pp. 121–135 (2000)

    Google Scholar 

  12. Smith, S.W., Safford, D.: Practical server privacy with secure coprocessors. IBM Systems Journal 40(3), 683–695 (2001)

    Article  Google Scholar 

  13. Chor, B., Goldreich, O., Kushilevitz, E., Sudan, M.: Private information retrieval. In: Proc. of 36th IEEE Symposium on Foundations of Computer Science, Milwaukee, Wisconsin, USA, October 23-25, pp. 41–50 (1995)

    Google Scholar 

  14. Ambainis, A.: Upper bound on the communication complexity of private information retrieval. In: Degano, P., Gorrieri, R., Marchetti-Spaccamela, A. (eds.) ICALP 1997. LNCS, vol. 1256, pp. 401–407. Springer, Heidelberg (1997)

    Google Scholar 

  15. Beimel, A., Ishai, Y., Kushilevitz, E., Raymond, J.F.: Breaking the O(n 1/(2k − 1)) barrier for information-theoretic private information retrieval. In: Proc. of 43rd IEEE Symposium on Foundations of Computer Science, Vancouver, BC, Canada, November 16-19, pp. 261–270 (2002)

    Google Scholar 

  16. Chor, B., Gilboa, N.: Computationally private information retrieval. In: Proc. of the 29th Annual ACM Symposium on the Theory of Computing, El Paso, Texas, USA, May 4-6, pp. 304–313 (1997)

    Google Scholar 

  17. Kushilevitz, E., Ostrovsky, R.: Relication is not needed: single database. Computationally-private information retrieval. In: Proc. of the 38th IEEE Symposium on Foundations of Computer Science, Miami Beach, Florida, USA, October 19-22, pp. 365–373 (1997)

    Google Scholar 

  18. Beimel, A., Ishai, Y., Kushilevitz, E., Marlkin, T.: One way functions are essential for single-server private information retrieval. In: Proc. of the 31st Annual ACM Symposium on Theory of Computing, Atlanta, Georgia, USA, May 1-4, pp. 89–98 (1999)

    Google Scholar 

  19. Chang, Y.C.: Single database private information retrieval with logarithmic communication. eprint 2004/036 (2004)

    Google Scholar 

  20. Bouganim, L., Pucheral, P.: Chip-secured data access: confidencial data on untrusted servers. In: Proc. of 28th VLDB, Hongkong, China, pp. 131–142 (2002)

    Google Scholar 

  21. Bayer, R., Schkolnich, M.: Concurrency of operations on B-trees. Acta Informatica 9, 1–21 (1977)

    Article  MATH  Google Scholar 

  22. Chor, B., Gilboa, N., Naor, M.: Private information retrieval by keywords. Technical Report TR CS0917. Technion Israel (1997)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lin, P., Candan, K.S. (2004). Secure and Privacy Preserving Outsourcing of Tree Structured Data. In: Jonker, W., Petković, M. (eds) Secure Data Management. SDM 2004. Lecture Notes in Computer Science, vol 3178. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30073-1_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30073-1_1

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-22983-4

  • Online ISBN: 978-3-540-30073-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics