Affiliation:
1. Università degli Studi di Milano, Crema CR, Italy
2. Università degli Studi di Bergamo, Dalmine BG, Italy
3. Politecnico di Milano, Milano (MI), Italy
Abstract
Data outsourcing and cloud computing have been emerging at an ever-growing rate as successful approaches for allowing users and companies to rely on external services for storing and managing data. As data and access to them are not under the control of the data owner, there is a clear need to provide proper confidentiality protection. Such requirements concern the confidentiality not only of the stored data (content) but also of the specific accesses (or patterns of them) that users make on such data.
In this article, we address these issues and propose an approach for guaranteeing content, access, and pattern confidentiality in a data outsourcing scenario. The proposed solution is based on the definition of a
shuffle index
structure, which adapts traditional
B
+-trees and, by applying a combination of techniques (covers, caches, and shuffling), ensures confidentiality of the data and of queries over them, protecting each single access as well as sequences thereof. The proposed solution also supports update operations over the data, while making reads and writes not recognizable as such by the server. We show that the shuffle index exhibits a limited performance cost, thus resulting effectively usable in practice.
Funder
Italian MIUR within project “GenData 2020.”
EC
Publisher
Association for Computing Machinery (ACM)
Subject
Hardware and Architecture
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Architecture for Confidential Digital Asset Transfer on Blockchain Through Obfuscation;2023 IEEE 31st International Conference on Network Protocols (ICNP);2023-10-10
2. Protecting Data and Queries in Cloud-Based Scenarios;SN Computer Science;2023-06-10
3. Secure and distributed assessment of privacy-preserving GWAS releases;Proceedings of the 23rd ACM/IFIP International Middleware Conference;2022-11-07
4. Shuffle Index;Encyclopedia of Cryptography, Security and Privacy;2022
5. Low-Cost Hiding of the Query Pattern;Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security;2021-05-24