Affiliation:
1. Singapore Management University, Singapore
Abstract
In IT outsourcing, a user may delegate the data storage and query processing functions to a third-party server that is not completely trusted. This gives rise to the need to safeguard the privacy of the database as well as the user queries over it. In this article, we address the problem of running ad hoc equi-join queries directly on encrypted data in such a setting. Our contribution is the first solution that achieves constant complexity per pair of records that are evaluated for the join. After formalizing the privacy requirements pertaining to the database and user queries, we introduce a cryptographic construct for securely joining records across relations. The construct protects the database with a strong encryption scheme. Moreover, information disclosure after executing an equi-join is kept to the minimum—that two input records combine to form an output record if and only if they share common join attribute values. There is no disclosure on records that are not part of the join result.
Building on this construct, we then present join algorithms that optimize the join execution by eliminating the need to match every record pair from the input relations. We provide a detailed analysis of the cost of the algorithms and confirm the analysis through extensive experiments with both synthetic and benchmark workloads. Through this evaluation, we tease out useful insights on how to configure the join algorithms to deliver acceptable execution time in practice.
Funder
Singapore Management University
Ministry of Education - Singapore
Publisher
Association for Computing Machinery (ACM)
Reference28 articles.
1. Order preserving encryption for numeric data
2. Elaine Barker William Barker William Burr William Polk and Miles Smid. 2012. Recommendation for key management part 1: General (revision 3). http://csrc.nist.gov/publications/nistpubs/800-57/SP800-57_Part1_rev3_general.pdf. Elaine Barker William Barker William Burr William Polk and Miles Smid. 2012. Recommendation for key management part 1: General (revision 3). http://csrc.nist.gov/publications/nistpubs/800-57/SP800-57_Part1_rev3_general.pdf.
3. Space/time trade-offs in hash coding with allowable errors
4. Short Group Signatures
Cited by
16 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献