skip to main content
10.1145/2345396.2345492acmotherconferencesArticle/Chapter ViewAbstractPublication PagesacciciConference Proceedingsconference-collections
research-article

Efficient privacy-preserving data distribution in outsourced environments: a fragmentation-based approach

Published: 03 August 2012 Publication History

Abstract

With the increasing cost of maintaining IT centers, there is a trend among organizations to outsource data management functions to a third-party service provider to reduce storage and computational cost. However, this opens the door for privacy violations. Existing approaches for protecting data confidentiality are based on encryption or a combination of encryption and fragmentation. In this paper, we propose an approach based only on fragmentation. In particular, we discuss the issue of employing both vertical and horizontal fragmentation to a database relation so that a minimum amount of data is stored at the owner. We represent the privacy (confidentiality) constraints as a graph. The constraint graph may have some cycles. We employ the two-coloring technique for the acyclic portion of the graph. We propose some heuristic algorithms to eliminate cycles and complete the coloring of all the nodes in the graph. This leads to an effective fragmentation process. The algorithm assigns one set of nodes to owner and the other to the external server. The proposed scheme considers both data dependent and data independent confidentiality constraints. In addition, it considers dependency constraints. We illustrate the proposed scheme using an example and show its efficacy. We provide proof of correctness for the proposed scheme.

References

[1]
P. Samarati and S. De Capitani di Vimercati. Data Protection in Out-sourcing Scenarios: Issues and Directions, in Proc. of ASIACCS 2010, Beijing, China, April 2010.
[2]
W. Wang, Z. Li, R. Owens, and B. Bhargava. Secure and Efficient Access to Outsourced Data, in Proc. of CCSW 2009, the 2009 ACM Workshop on Cloud Computing Security.
[3]
G. Aggarwal, et al. Two can keep a secret: a distributed architecture for secure database services, in: Proc. CIDR 2005, Asilomar, CA, USA, January 2005.
[4]
V. Ciriani, S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati, Fragmentation design for efficient query execution over sensitive distributed databases, in: Proc. of ICDCS 2009, Montreal, QC, Canada, June 2009.
[5]
V. Ciriani, S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati. Keep a few: Outsourcing data while maintaining confidentiality, in: Proc. of ESORICS 2009, Saint Malo, France, September 2009.
[6]
V. Ciriani, S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati. Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients, in: Proc. of DBSec 2009, Montreal, QC, Canada, July 2009.
[7]
V. Ciriani, S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati. Selective data outsourcing for enforcing privacy, in: Journal of Computer Security (2011), 531--566.
[8]
Lena Wiese. Horizontal Fragmentation for Data Outsourcing with Formula-Based Confidentiality Constraints, in: IWSEC 2010: 5th International Workshop on Security, Kobe International Conference Center, Kobe, Japan, November 22--24, 2010.
[9]
T.J.V.R.K.M.K. Sayi, R. K. N. Sai Krishna, R. Mukkamala, and P. K. Baruah. Privacy preserving data distribution in outsourced environments, in: IEEE International Conference on High Performing Computing(HiPC 2011), Student Research Symposium, Bangalore, India, Dec 19--21, 2011.

Cited By

View all
  • (2017)A New Mechanism to Preserving Data Confidentiality in Cloud Database ScenariosEnterprise Information Systems10.1007/978-3-319-62386-3_13(261-283)Online publication date: 29-Jun-2017
  • (2016)A New Approach to Preserving Data Confidentiality in the CloudProceedings of the 20th International Database Engineering & Applications Symposium10.1145/2938503.2938512(256-263)Online publication date: 11-Jul-2016

Index Terms

  1. Efficient privacy-preserving data distribution in outsourced environments: a fragmentation-based approach

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICACCI '12: Proceedings of the International Conference on Advances in Computing, Communications and Informatics
    August 2012
    1307 pages
    ISBN:9781450311960
    DOI:10.1145/2345396
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    • ISCA: International Society for Computers and Their Applications
    • RPS: Research Publishing Services

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 03 August 2012

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. 2-coloring technique
    2. data independent and data dependent confidentiality constraints
    3. dependency constraints
    4. hybrid fragmentation
    5. outsourcing
    6. privacy

    Qualifiers

    • Research-article

    Conference

    ICACCI '12
    Sponsor:
    • ISCA
    • RPS

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)1
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 08 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2017)A New Mechanism to Preserving Data Confidentiality in Cloud Database ScenariosEnterprise Information Systems10.1007/978-3-319-62386-3_13(261-283)Online publication date: 29-Jun-2017
    • (2016)A New Approach to Preserving Data Confidentiality in the CloudProceedings of the 20th International Database Engineering & Applications Symposium10.1145/2938503.2938512(256-263)Online publication date: 11-Jul-2016

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media