To mitigate security concerns of outsourced databases, quite a few protocols have been proposed that outsource data in encrypted format and allow encrypted query execution on the server side. Among the more practical ...
详细信息
ISBN:
(纸本)9781450322782
To mitigate security concerns of outsourced databases, quite a few protocols have been proposed that outsource data in encrypted format and allow encrypted query execution on the server side. Among the more practical protocols, the "bucketization" approach facilitates query execution at the cost of reduced efficiency by allowing some false positives in the query results. Precise Query Protocols (PQPs), on the other hand, enable the server to execute queries without incurring any false positives. Even though these protocols do not reveal the underlying data, they reveal query access pattern to an adversary. In this paper, we introduce a general attack on PQPs based on access pattern disclosure in the context of secure range queries. Our empirical analysis on several real world datasets shows that the proposed attack is able to disclose significant amount of sensitive data with high accuracy provided that the attacker has reasonable amount of background knowledge. We further demonstrate that a slight variation of such an attack can also be used on imprecise protocols (e.g., bucketization) to disclose significant amount of sensitive information. Copyright 2014acm.
In recent years, database as a service (DAS) model where data management is outsourced to cloud service providers has become more prevalent. Although DAS model offers lower cost and flexibility, it necessitates the tr...
详细信息
ISBN:
(纸本)9781450322782
In recent years, database as a service (DAS) model where data management is outsourced to cloud service providers has become more prevalent. Although DAS model offers lower cost and flexibility, it necessitates the transfer of potentially sensitive data to untrusted cloud servers. To ensure the confidentiality, encryption of sensitive data before its transfer to the cloud emerges as an important option. Encrypted storage provides protection but it complicates data processing including crucial selective record retrieval. To achieve selective retrieval over encrypted collection, considerable amount of searchable encryption schemes have been proposed in the literature with distinct privacy guarantees. Among the available approaches, oblivious RAM based ones offer optimal privacy. However, they are computationally intensive and do not scale well to very large databases. On the other hand, almost all efficient schemes leak some information, especially data access pattern to the remote servers. Unfortunately, recent evidence on access pattern leakage indicates that adversary's background knowledge could be used to infer the contents of the encrypted data and may potentially endanger individual privacy. In this paper, we introduce a novel construction for practical and privacy-aware selective record retrieval over encrypted databases. Our approach leaks obfuscated access pattern to enable efficient retrieval while ensuring individual privacy. Applied obfuscation is based on differential privacy which provides rigorous individual privacy guarantees against adversaries with arbitrary background knowledge. Copyright 2014acm.
Android's permission system follows an "all or nothing" approach when installing an application. the end user has no way to know how the permissions are actually used by the application, and how the sens...
详细信息
Modern mobile devices store and process an abundance of data. Although many users consider some of this data as private, they do not yet obtain satisfactory support for con- Trolling what applications might do withth...
详细信息
there is an increased amount of data produced by next generation sequencing (NGS) machines which demand scalable storage and analysis of genomic data. In order to cope withthis huge amount of information, many bioban...
详细信息
there is an increased amount of data produced by next generation sequencing (NGS) machines which demand scalable storage and analysis of genomic data. In order to cope withthis huge amount of information, many biobanks are interested in cloud computing capabilities such as on-demand elasticity of computing power and storage capacity. there are several security and privacy requirements mandated by personal data protection legislation which hinder biobanks from migrating big data generated by the NGS machines. this paper describes the privacy requirements of platform-as-service BiobankClouds according to the European data Protection Directive (DPD). It identifies several key privacythreats which leave BiobankClouds vulnerable to an attack. this study benefits health-care application designers in the requirement elicitation cycle when building privacy-preserving BiobankCloud platforms. (C) 2014the Authors. Published by Elsevier B.V. this is an open access article under the CC BY-NC-ND license.
Designers of Visual Sensor Network (VSN) platforms face many challenges. Image sensors deliver large amounts of data and substantial computing power and memory are required for processing. At the same time power consu...
详细信息
ISBN:
(纸本)9781450329255
Designers of Visual Sensor Network (VSN) platforms face many challenges. Image sensors deliver large amounts of data and substantial computing power and memory are required for processing. At the same time power consumption should be kept low to facilitate battery-powered operation. the increasing deployment of VSNs also raises privacy and security related questions. In this work we present a new VSN platform called TrustEYE.M4 which is designed as a state-of-the-art research platform for the development of secure VSN applications. It integrates an ARM Cortex M4 processor, a WiFi radio, a high-performance image sensor and a dedicated security chip. We present the architecture of TrustEYE.M4 and demonstrate its capabilities with a secure video streaming application. Copyright 2014acm.
privacy preserving plays an important role in application of the Internet of things (IoT). As apart of the IT, Wireless Sensor Networks (WSNs) should provide the privacy preserving in data aggregation. this paper pres...
详细信息
data aggregation in Wireless Sensor Network refers to acquiring the sensed data from the sensors to the gateway node. data aggregation scheme minimize a large amount of transmission data to the base station, so that i...
详细信息
ISBN:
(纸本)9781479930708
data aggregation in Wireless Sensor Network refers to acquiring the sensed data from the sensors to the gateway node. data aggregation scheme minimize a large amount of transmission data to the base station, so that improve the energy efficiency and prolong the wireless network lifetime. CDAMA is designed by using multiple points, each of which has different order. It is designed for a multi-application environment. it mitigates the impact of compromising attacks in single application environments and degrades the damage from unauthorized aggregations. In the database-service-provider model, user's data resides on the premises of the provider. Both corporations and individuals view their data as a very valuable asset. To maintain data confidentiality, clients need to outsource their data to servers in encrypted form. At the same time, clients must still be able to execute queries over encrypted data.
暂无评论