SlideShare uma empresa Scribd logo
1 de 26
SECURING SOCIAL INFORMATION
FROM QUERY ANALYSIS
IN OUTSOURCED DATABASES	

Junpei Kawamoto and Masatoshi Yoshikawa (Kyoto University)
iDB Forum 2008	
 2008/9/22	

AGENDA	
1. 
2. 
3. 
4. 
5. 

Security problems of outsourced databases
The data encryption model we employ
Query Generalization by Dynamic Hash
Result Generalization by Bloom Filter
Conclusion and future work	

2
iDB Forum 2008	
 2008/9/22	

AGENDA	
1. 
2. 
3. 
4. 
5. 

Security problems of outsourced databases
The data encryption model we employ
Query Generalization by Dynamic Hash
Response Generalization by Bloom Filter
Conclusion and future work	

3
iDB Forum 2008	
 2008/9/22	

BACKGROUND OF OUR RESEARCH	
Ò 

Outsourced Database systems are in widely use

We can delegate management to service providers
É  We can save on management costs
É  We do not accept requests from outside of local networks
É  We can protect the security of local networks
É 

www	

Traditional database system	

www	

Outsourced database system	

4
iDB Forum 2008	
 2008/9/22	

PROBLEMS	
Ò 

Security of users’ data
Service Provider has total authority of databases
É  Service Provider can inspect users’ data
É 

Data encryption at client side gives us a solution to the problem	
Ò 

Security of users’ social information
Social information
means the relationships among user’s accounts	
5
iDB Forum 2008	
 2008/9/22	

WHY IS SOCIAL INFORMATION IMPORTANT?	
Ò 

Two kinds of risk emerge from the social information leak
Personal information could be compromised in a chain effect
É  Different online personae could be connected 	
É 

6
iDB Forum 2008	
 2008/9/22	

WHY IS SOCIAL INFORMATION IMPORTANT?	
Ò 

Personal information could be compromised in a chain
effect
Bob do not compromise his information.
However server can guess his name.	
ID: lee	

ID: carol	
ID: alice_gc	
Alice compromised her personal
information blunderingly.
Name: Alice, Boss: Bob, etc.

In a chain effect, server may be able
to guess other users information.

7
iDB Forum 2008	
 2008/9/22	

WHY IS SOCIAL INFORMATION IMPORTANT?	
Ò 

Different online personae are connected 	
Servers could guess these login
names are associated with Alice.	

ID: alice_gc	

Public (official) account	

Other people’s account	

ID: Cheshire	

Private account	

8
iDB Forum 2008	
 2008/9/22	

OUR PROPOSAL METHODS	
Ò 

Query Generalization by Dynamic Hash

Ò 

Result Generalization by Bloom Filter	

9
iDB Forum 2008	
 2008/9/22	

AGENDA	
1. 
2. 
3. 
4. 
5. 

Security problems of outsourced databases
The data encryption model we employ
Query Generalization by Dynamic Hash
Response Generalization by Bloom Filter
Conclusion and future work	

10
iDB Forum 2008	
 2008/9/22	

DATA ENCRYPTION MODEL	
Ò 

We use a traditional data encryption model
É 

Original table (not encrypted)
No
.	

name	

1	

Products Review	
 7/17 15:00	
 7/17 18:00	
 Alice, Bob	

2	

Business Trip	

7/18 10:00	
 7/20 18:00	
 Alice, Bob	

3	
É 

begin	

Who has authority	
end	

Team Meeting	

7/20 15:00	
 7/20 18:00	
 Alice, Carol	

4	
 Business Trip	
7/21 12:00	
Encrypted table (with index)
No etuple	
.	

Iname	
 Ibegin	
 Iend	

acl	

7/21 17:00	
 Dave	
Etuple is encrypted original tuple	
etuple = Encrypt(name, begin, end, acl)	

1	

5f0f1f46...	
 00	

10	

10	

2	

b98009af...	
 01	

00	

11	

3	

082ba604...	
 10	

11	

11	

4	

8bc546af...	
 01	

01	

01	

Iname, Ibegin, and Iend are hash index
used for query processing	
Iname = Hash(name)	
11
iDB Forum 2008	
 2008/9/22	

DATA ENCRYPTION MODEL	
Ò 

Query processing on the data encryption model	
Name = “Business Trip”
&
Begin = “7/18 10:00”	
Original query	

Iname = “01”
&
IBegin = “00”	
Query on server	
Name = “Business Trip”
&
Begin = “7/18 10:00”	
Query on client	

No
.	

name	

begin	

end	

2	

Business Trip	
 7/18 10:00	
 7/20 18:00	

4	

Business Trip	
 7/21 12:00	
 7/21 17:00	

etuple	

Iname	
 Ibegin	
 Iend	

b98009af...	
 01	

00	

11	

8bc546af...	
 01	

01	

01	
12
iDB Forum 2008	
 2008/9/22	

AGENDA	
1. 
2. 
3. 
4. 
5. 

Security problems of outsourced databases
The data encryption model we employ
Query Generalization by Dynamic Hash
Response Generalization by Bloom Filter
Conclusion and future work	

13
iDB Forum 2008	
 2008/9/22	

QUERY GENERALIZATION	
Ò 

Servers can guess users’ relationship by queries.
If only Alice and Bob sent this query,
server can guess they have some relation.	

Alice

Bob

Carol

SELECT *
FROM schedule
WHERE begin = “7/15 10:00”
SELECT *
FROM schedule
WHERE begin = “7/14 10:00”

SELECT *
FROM schedule
WHERE begin = “7/15 10:00”
or “7/14 10:00”

This query is requested by at least three users
so that server cannot find group information.	
14
iDB Forum 2008	
 2008/9/22	

HOW TO GENERALIZE	
Ò 

Firstly, queries are described by hash indices
Begin = 7/15 10:00	
Begin = 7/14 10:00	

Ò 

IBegin = 0001011	
IBegin = 0011110

Next, the query is translated before it send to DB.

www	

DB	

Generalizer	
Organization’s network	
15
iDB Forum 2008	
 2008/9/22	

HOW TO GENERALIZE	
Ò 

Generalizer uses dynamic hash to translate queries
Translated query is
IBegin = 00*****	

0	

0001011
0011110

1	

0100101
0110110	

IBegin = 01*****	

1010011
1101101
1100011

IBegin = 1******	

0	
1	

*: wild card	
node	

leaf	

Begin = 7/15 10:00	

IBegin = 00*****	

Begin = 7/14 10:00	

IBegin = 00*****
16
iDB Forum 2008	
 2008/9/22	

SPLITTING LEAF	
Ò 

Leaves are split to keep the distribution of hash balanced
Insert new hash : 1000110	
0	

0001011
0011110

1	

0100101
0110110	

0	
1	

1010011
1101101
1100011
1000110

0	

0001011
0011110

1	

0100101
0110110	

0	

1	

0	

1010011
1000110

1	

1101101
1100011

So that, moderate size hashes could be mixed.
17
iDB Forum 2008	
 2008/9/22	

AGENDA	
1. 
2. 
3. 
4. 
5. 

Security problems of outsourced databases
The data encryption model we employ
Query Generalization by Dynamic Hash
Result Generalization by Bloom Filter
Conclusion and future work	

18
iDB Forum 2008	
 2008/9/22	

RESULT GENERALIZATION	
Ò 

Servers can guess users’ relationship by query result.
user

tuple

Alice

tuple1

Bob

tuple2

Carol

tuple3

Dave

tuple4

If only Alice and Carol request
the tuple2, servers can guess
there are some relationships
between them
If Alice and Dave never request
same tuples, servers can guess
there are no relationship
between them	

To prevent servers’ guessing, some irrelevant tuples are requested.

19
iDB Forum 2008	
 2008/9/22	

RESULT GENERALIZATION	
Ò 

User’s queries are generalized
Original query	

Generalized query	

www	

user

DB	

tuple

Alice

tuple1

Bob

tuple2

Carol

tuple3

Dave

tuple4

In generalized query, each tuple is
received by three users.
Servers cannot guess relationships
from the information of result
tuples	
20
iDB Forum 2008	
 2008/9/22	

BLOOM FILTER BASED GENERALIZATION	
Ò 

Users are described by k+n length bit string
Alice(uid = 1)	
 1 0 0 0 0 1 1

Bob(uid = 2)	
 0 1 1 1 0 0 0
Carol(uid = 3)	
 1 0 1 0 1 0 0

(uid mod 2) + 1	

Ò 

hash(uid)	

Dave(uid = 4)	
 0 1 0 0 1 0 1

Access authority is logical disjunction of the bit strings	
If Alice and Bob have authority: 	
1 1 1 1 0 1 1
If Alice and Carol have authority: 	
1 0 1 0 1 1 1
In this example,
k =2, n = 5	

Alice	
 1 0 0 0 0 1 1
∨

Bob	
 0 1 1 1 0 0 0
21
iDB Forum 2008	
 2008/9/22	

QUERY PROCESSING	
Ò 

When user requests tuples, bit string is used	
A tuple Alice & Bob have
authority to	

1111011

1111011

Alice	

1000011

10

00011

Bob	

0111000

01

11000

Carol	

1010100

10

10100

Dave	

0100101

01

00101

Server side	
At server side,
first k bits are used	

Client side	
At client side,
last n bits are used	
22
iDB Forum 2008	
 2008/9/22	

ANONYMITY	
In first k bits used at server side,
⎡N / k ⎤ users are assigned to each bit.
Ò  Each tuple is received at least ⎡N / k ⎤ users.
Ò 

Alice(uid = 1)	
 1 0 0 0 0 1 1

(uid mod 2) + 1	

Ò 

N: Total number of user	

hash(uid)	

To avoid result analysis, we could introduce
⎡N / k ⎤ - anonymity.
23
iDB Forum 2008	
 2008/9/22	

AGENDA	
1. 
2. 
3. 
4. 
5. 

Security problems of outsourced databases
The data encryption model we employ
Query Generalization by Dynamic Hash
Response Generalization by Bloom Filter
Conclusion and future work	

24
iDB Forum 2008	
 2008/9/22	

CONCLUSION AND FUTURE WORK	
Ò 
Ò 
Ò 

Ò 

We introduce a new problem for outsourced DB
Social information means the relationships among user’s accounts
To protect the social information, we introduce two method
É  Query Generalization by Dynamic Hash
É  Result Generalization by Bloom Filter
Future work
É  Implement our methods and apply them to real service.
É  Evaluate our methods.

25
iDB Forum 2008	
 2008/9/22	

Thank you!	

26

Mais conteúdo relacionado

Semelhante a Securing Social Information from Query Analysis in Outsourced Databases

FACE: Fast and Customizable Sorting Accelerator for Heterogeneous Many-core S...
FACE: Fast and Customizable Sorting Accelerator for Heterogeneous Many-core S...FACE: Fast and Customizable Sorting Accelerator for Heterogeneous Many-core S...
FACE: Fast and Customizable Sorting Accelerator for Heterogeneous Many-core S...Ryohei Kobayashi
 
Advanced Features with Catapult: Building the Future of Blockchain Applications
Advanced Features with Catapult: Building the Future of Blockchain ApplicationsAdvanced Features with Catapult: Building the Future of Blockchain Applications
Advanced Features with Catapult: Building the Future of Blockchain ApplicationsSandy Palacios
 
Advanced Features with Catapult: Building the Future of Blockchain Applications
Advanced Features with Catapult: Building the Future of Blockchain ApplicationsAdvanced Features with Catapult: Building the Future of Blockchain Applications
Advanced Features with Catapult: Building the Future of Blockchain ApplicationsLoyalCoin
 
Eliptic-Curve Cryptography and the Internet
Eliptic-Curve Cryptography and the InternetEliptic-Curve Cryptography and the Internet
Eliptic-Curve Cryptography and the InternetOwaspCzech
 
Combined 2 Bank Compiled Post: SO(IT) Date: 25.09.2021 Taker: AUST
Combined 2 Bank Compiled Post: SO(IT)  Date: 25.09.2021  Taker: AUSTCombined 2 Bank Compiled Post: SO(IT)  Date: 25.09.2021  Taker: AUST
Combined 2 Bank Compiled Post: SO(IT) Date: 25.09.2021 Taker: AUSTEngr. Md. Jamal Uddin Rayhan
 
3DConsulting_Presentation
3DConsulting_Presentation3DConsulting_Presentation
3DConsulting_PresentationJoseph Baca
 
4 Steps to Paperless Transportation Documents
4 Steps to Paperless Transportation Documents4 Steps to Paperless Transportation Documents
4 Steps to Paperless Transportation DocumentseFileCabinet
 
Real-Time Web Apps & .NET - What are your options?
Real-Time Web Apps & .NET - What are your options?Real-Time Web Apps & .NET - What are your options?
Real-Time Web Apps & .NET - What are your options?Phil Leggetter
 
Users as Data
Users as DataUsers as Data
Users as Datapdingles
 
Leveraging Apache Spark and Delta Lake for Efficient Data Encryption at Scale
Leveraging Apache Spark and Delta Lake for Efficient Data Encryption at ScaleLeveraging Apache Spark and Delta Lake for Efficient Data Encryption at Scale
Leveraging Apache Spark and Delta Lake for Efficient Data Encryption at ScaleDatabricks
 
Session #4 b content providers
Session #4 b  content providersSession #4 b  content providers
Session #4 b content providersVitali Pekelis
 
Split Miner: Discovering Accurate and Simple Business Process Models from Eve...
Split Miner: Discovering Accurate and Simple Business Process Models from Eve...Split Miner: Discovering Accurate and Simple Business Process Models from Eve...
Split Miner: Discovering Accurate and Simple Business Process Models from Eve...Marlon Dumas
 
Oracle Database: Checklist Connection Issues
Oracle Database: Checklist Connection IssuesOracle Database: Checklist Connection Issues
Oracle Database: Checklist Connection IssuesMarkus Flechtner
 
Why And When Should We Consider Stream Processing In Our Solutions Teqnation ...
Why And When Should We Consider Stream Processing In Our Solutions Teqnation ...Why And When Should We Consider Stream Processing In Our Solutions Teqnation ...
Why And When Should We Consider Stream Processing In Our Solutions Teqnation ...Soroosh Khodami
 
Malware vs Big Data
Malware vs Big DataMalware vs Big Data
Malware vs Big DataFrank Denis
 
A Block Cipher Based Cryptosystem through Modified Forward Backward Overlappe...
A Block Cipher Based Cryptosystem through Modified Forward Backward Overlappe...A Block Cipher Based Cryptosystem through Modified Forward Backward Overlappe...
A Block Cipher Based Cryptosystem through Modified Forward Backward Overlappe...IOSR Journals
 
Deduplication Using Solr: Presented by Neeraj Jain, Stubhub
Deduplication Using Solr: Presented by Neeraj Jain, StubhubDeduplication Using Solr: Presented by Neeraj Jain, Stubhub
Deduplication Using Solr: Presented by Neeraj Jain, StubhubLucidworks
 

Semelhante a Securing Social Information from Query Analysis in Outsourced Databases (20)

FACE: Fast and Customizable Sorting Accelerator for Heterogeneous Many-core S...
FACE: Fast and Customizable Sorting Accelerator for Heterogeneous Many-core S...FACE: Fast and Customizable Sorting Accelerator for Heterogeneous Many-core S...
FACE: Fast and Customizable Sorting Accelerator for Heterogeneous Many-core S...
 
Advanced Features with Catapult: Building the Future of Blockchain Applications
Advanced Features with Catapult: Building the Future of Blockchain ApplicationsAdvanced Features with Catapult: Building the Future of Blockchain Applications
Advanced Features with Catapult: Building the Future of Blockchain Applications
 
Advanced Features with Catapult: Building the Future of Blockchain Applications
Advanced Features with Catapult: Building the Future of Blockchain ApplicationsAdvanced Features with Catapult: Building the Future of Blockchain Applications
Advanced Features with Catapult: Building the Future of Blockchain Applications
 
Eliptic-Curve Cryptography and the Internet
Eliptic-Curve Cryptography and the InternetEliptic-Curve Cryptography and the Internet
Eliptic-Curve Cryptography and the Internet
 
Combined 2 Bank Compiled Post: SO(IT) Date: 25.09.2021 Taker: AUST
Combined 2 Bank Compiled Post: SO(IT)  Date: 25.09.2021  Taker: AUSTCombined 2 Bank Compiled Post: SO(IT)  Date: 25.09.2021  Taker: AUST
Combined 2 Bank Compiled Post: SO(IT) Date: 25.09.2021 Taker: AUST
 
3DConsulting_Presentation
3DConsulting_Presentation3DConsulting_Presentation
3DConsulting_Presentation
 
4 Steps to Paperless Transportation Documents
4 Steps to Paperless Transportation Documents4 Steps to Paperless Transportation Documents
4 Steps to Paperless Transportation Documents
 
Real-Time Web Apps & .NET - What are your options?
Real-Time Web Apps & .NET - What are your options?Real-Time Web Apps & .NET - What are your options?
Real-Time Web Apps & .NET - What are your options?
 
Users as Data
Users as DataUsers as Data
Users as Data
 
Leveraging Apache Spark and Delta Lake for Efficient Data Encryption at Scale
Leveraging Apache Spark and Delta Lake for Efficient Data Encryption at ScaleLeveraging Apache Spark and Delta Lake for Efficient Data Encryption at Scale
Leveraging Apache Spark and Delta Lake for Efficient Data Encryption at Scale
 
Session #4 b content providers
Session #4 b  content providersSession #4 b  content providers
Session #4 b content providers
 
Split Miner: Discovering Accurate and Simple Business Process Models from Eve...
Split Miner: Discovering Accurate and Simple Business Process Models from Eve...Split Miner: Discovering Accurate and Simple Business Process Models from Eve...
Split Miner: Discovering Accurate and Simple Business Process Models from Eve...
 
Redecentralizing the Web: IPFS and Filecoin
Redecentralizing the Web: IPFS and FilecoinRedecentralizing the Web: IPFS and Filecoin
Redecentralizing the Web: IPFS and Filecoin
 
Oracle Database: Checklist Connection Issues
Oracle Database: Checklist Connection IssuesOracle Database: Checklist Connection Issues
Oracle Database: Checklist Connection Issues
 
current-trends
current-trendscurrent-trends
current-trends
 
Why And When Should We Consider Stream Processing In Our Solutions Teqnation ...
Why And When Should We Consider Stream Processing In Our Solutions Teqnation ...Why And When Should We Consider Stream Processing In Our Solutions Teqnation ...
Why And When Should We Consider Stream Processing In Our Solutions Teqnation ...
 
Malware vs Big Data
Malware vs Big DataMalware vs Big Data
Malware vs Big Data
 
A Block Cipher Based Cryptosystem through Modified Forward Backward Overlappe...
A Block Cipher Based Cryptosystem through Modified Forward Backward Overlappe...A Block Cipher Based Cryptosystem through Modified Forward Backward Overlappe...
A Block Cipher Based Cryptosystem through Modified Forward Backward Overlappe...
 
IPv6 Address Planning
IPv6 Address PlanningIPv6 Address Planning
IPv6 Address Planning
 
Deduplication Using Solr: Presented by Neeraj Jain, Stubhub
Deduplication Using Solr: Presented by Neeraj Jain, StubhubDeduplication Using Solr: Presented by Neeraj Jain, Stubhub
Deduplication Using Solr: Presented by Neeraj Jain, Stubhub
 

Mais de Junpei Kawamoto

レビューサイトにおける不均質性を考慮した特異なレビュアー発⾒とレビューサマリの推測
レビューサイトにおける不均質性を考慮した特異なレビュアー発⾒とレビューサマリの推測レビューサイトにおける不均質性を考慮した特異なレビュアー発⾒とレビューサマリの推測
レビューサイトにおける不均質性を考慮した特異なレビュアー発⾒とレビューサマリの推測Junpei Kawamoto
 
初期レビューを用いた長期間評価推定􏰀
初期レビューを用いた長期間評価推定􏰀初期レビューを用いた長期間評価推定􏰀
初期レビューを用いた長期間評価推定􏰀Junpei Kawamoto
 
Frequency-based Constraint Relaxation for Private Query Processing in Cloud D...
Frequency-based Constraint Relaxation for Private Query Processing in Cloud D...Frequency-based Constraint Relaxation for Private Query Processing in Cloud D...
Frequency-based Constraint Relaxation for Private Query Processing in Cloud D...Junpei Kawamoto
 
クエリログとナビゲーション履歴から探索意図抽出による協調探索支援
クエリログとナビゲーション履歴から探索意図抽出による協調探索支援クエリログとナビゲーション履歴から探索意図抽出による協調探索支援
クエリログとナビゲーション履歴から探索意図抽出による協調探索支援Junpei Kawamoto
 
Privacy for Continual Data Publishing
Privacy for Continual Data PublishingPrivacy for Continual Data Publishing
Privacy for Continual Data PublishingJunpei Kawamoto
 
暗号化ベクトルデータベースのための索引構造
暗号化ベクトルデータベースのための索引構造暗号化ベクトルデータベースのための索引構造
暗号化ベクトルデータベースのための索引構造Junpei Kawamoto
 
暗号化データベースモデルにおける問合せの関連情報を秘匿する範囲検索
暗号化データベースモデルにおける問合せの関連情報を秘匿する範囲検索暗号化データベースモデルにおける問合せの関連情報を秘匿する範囲検索
暗号化データベースモデルにおける問合せの関連情報を秘匿する範囲検索Junpei Kawamoto
 
マルコフ過程を用いた位置情報継続開示のためのアドバーザリアルプライバシ
マルコフ過程を用いた位置情報継続開示のためのアドバーザリアルプライバシマルコフ過程を用いた位置情報継続開示のためのアドバーザリアルプライバシ
マルコフ過程を用いた位置情報継続開示のためのアドバーザリアルプライバシJunpei Kawamoto
 
データ共有型WEBアプリケーションにおけるサーバ暗号化
データ共有型WEBアプリケーションにおけるサーバ暗号化データ共有型WEBアプリケーションにおけるサーバ暗号化
データ共有型WEBアプリケーションにおけるサーバ暗号化Junpei Kawamoto
 
マルコフモデルを仮定した位置情報開示のためのアドバーザリアルプライバシ
マルコフモデルを仮定した位置情報開示のためのアドバーザリアルプライバシマルコフモデルを仮定した位置情報開示のためのアドバーザリアルプライバシ
マルコフモデルを仮定した位置情報開示のためのアドバーザリアルプライバシJunpei Kawamoto
 
プライベート問合せにおける問合せ頻度を用いた制約緩和手法
プライベート問合せにおける問合せ頻度を用いた制約緩和手法プライベート問合せにおける問合せ頻度を用いた制約緩和手法
プライベート問合せにおける問合せ頻度を用いた制約緩和手法Junpei Kawamoto
 
プライバシを考慮した移動系列情報解析のための安全性の提案
プライバシを考慮した移動系列情報解析のための安全性の提案プライバシを考慮した移動系列情報解析のための安全性の提案
プライバシを考慮した移動系列情報解析のための安全性の提案Junpei Kawamoto
 
A Locality Sensitive Hashing Filter for Encrypted Vector Databases
A Locality Sensitive Hashing Filter for Encrypted Vector DatabasesA Locality Sensitive Hashing Filter for Encrypted Vector Databases
A Locality Sensitive Hashing Filter for Encrypted Vector DatabasesJunpei Kawamoto
 
位置情報解析のためのプライバシ保護手法
位置情報解析のためのプライバシ保護手法位置情報解析のためのプライバシ保護手法
位置情報解析のためのプライバシ保護手法Junpei Kawamoto
 
Sponsored Search Markets (from Networks, Crowds, and Markets: Reasoning About...
Sponsored Search Markets (from Networks, Crowds, and Markets: Reasoning About...Sponsored Search Markets (from Networks, Crowds, and Markets: Reasoning About...
Sponsored Search Markets (from Networks, Crowds, and Markets: Reasoning About...Junpei Kawamoto
 
Private Range Query by Perturbation and Matrix Based Encryption
Private Range Query by Perturbation and Matrix Based EncryptionPrivate Range Query by Perturbation and Matrix Based Encryption
Private Range Query by Perturbation and Matrix Based EncryptionJunpei Kawamoto
 
暗号化データベースモデルにおける関係情報推定を防ぐ索引手法
暗号化データベースモデルにおける関係情報推定を防ぐ索引手法暗号化データベースモデルにおける関係情報推定を防ぐ索引手法
暗号化データベースモデルにおける関係情報推定を防ぐ索引手法Junpei Kawamoto
 
VLDB09勉強会 Session27 Privacy2
VLDB09勉強会 Session27 Privacy2VLDB09勉強会 Session27 Privacy2
VLDB09勉強会 Session27 Privacy2Junpei Kawamoto
 
Security of Social Information from Query Analysis in DaaS
Security of Social Information from Query Analysis in DaaSSecurity of Social Information from Query Analysis in DaaS
Security of Social Information from Query Analysis in DaaSJunpei Kawamoto
 

Mais de Junpei Kawamoto (19)

レビューサイトにおける不均質性を考慮した特異なレビュアー発⾒とレビューサマリの推測
レビューサイトにおける不均質性を考慮した特異なレビュアー発⾒とレビューサマリの推測レビューサイトにおける不均質性を考慮した特異なレビュアー発⾒とレビューサマリの推測
レビューサイトにおける不均質性を考慮した特異なレビュアー発⾒とレビューサマリの推測
 
初期レビューを用いた長期間評価推定􏰀
初期レビューを用いた長期間評価推定􏰀初期レビューを用いた長期間評価推定􏰀
初期レビューを用いた長期間評価推定􏰀
 
Frequency-based Constraint Relaxation for Private Query Processing in Cloud D...
Frequency-based Constraint Relaxation for Private Query Processing in Cloud D...Frequency-based Constraint Relaxation for Private Query Processing in Cloud D...
Frequency-based Constraint Relaxation for Private Query Processing in Cloud D...
 
クエリログとナビゲーション履歴から探索意図抽出による協調探索支援
クエリログとナビゲーション履歴から探索意図抽出による協調探索支援クエリログとナビゲーション履歴から探索意図抽出による協調探索支援
クエリログとナビゲーション履歴から探索意図抽出による協調探索支援
 
Privacy for Continual Data Publishing
Privacy for Continual Data PublishingPrivacy for Continual Data Publishing
Privacy for Continual Data Publishing
 
暗号化ベクトルデータベースのための索引構造
暗号化ベクトルデータベースのための索引構造暗号化ベクトルデータベースのための索引構造
暗号化ベクトルデータベースのための索引構造
 
暗号化データベースモデルにおける問合せの関連情報を秘匿する範囲検索
暗号化データベースモデルにおける問合せの関連情報を秘匿する範囲検索暗号化データベースモデルにおける問合せの関連情報を秘匿する範囲検索
暗号化データベースモデルにおける問合せの関連情報を秘匿する範囲検索
 
マルコフ過程を用いた位置情報継続開示のためのアドバーザリアルプライバシ
マルコフ過程を用いた位置情報継続開示のためのアドバーザリアルプライバシマルコフ過程を用いた位置情報継続開示のためのアドバーザリアルプライバシ
マルコフ過程を用いた位置情報継続開示のためのアドバーザリアルプライバシ
 
データ共有型WEBアプリケーションにおけるサーバ暗号化
データ共有型WEBアプリケーションにおけるサーバ暗号化データ共有型WEBアプリケーションにおけるサーバ暗号化
データ共有型WEBアプリケーションにおけるサーバ暗号化
 
マルコフモデルを仮定した位置情報開示のためのアドバーザリアルプライバシ
マルコフモデルを仮定した位置情報開示のためのアドバーザリアルプライバシマルコフモデルを仮定した位置情報開示のためのアドバーザリアルプライバシ
マルコフモデルを仮定した位置情報開示のためのアドバーザリアルプライバシ
 
プライベート問合せにおける問合せ頻度を用いた制約緩和手法
プライベート問合せにおける問合せ頻度を用いた制約緩和手法プライベート問合せにおける問合せ頻度を用いた制約緩和手法
プライベート問合せにおける問合せ頻度を用いた制約緩和手法
 
プライバシを考慮した移動系列情報解析のための安全性の提案
プライバシを考慮した移動系列情報解析のための安全性の提案プライバシを考慮した移動系列情報解析のための安全性の提案
プライバシを考慮した移動系列情報解析のための安全性の提案
 
A Locality Sensitive Hashing Filter for Encrypted Vector Databases
A Locality Sensitive Hashing Filter for Encrypted Vector DatabasesA Locality Sensitive Hashing Filter for Encrypted Vector Databases
A Locality Sensitive Hashing Filter for Encrypted Vector Databases
 
位置情報解析のためのプライバシ保護手法
位置情報解析のためのプライバシ保護手法位置情報解析のためのプライバシ保護手法
位置情報解析のためのプライバシ保護手法
 
Sponsored Search Markets (from Networks, Crowds, and Markets: Reasoning About...
Sponsored Search Markets (from Networks, Crowds, and Markets: Reasoning About...Sponsored Search Markets (from Networks, Crowds, and Markets: Reasoning About...
Sponsored Search Markets (from Networks, Crowds, and Markets: Reasoning About...
 
Private Range Query by Perturbation and Matrix Based Encryption
Private Range Query by Perturbation and Matrix Based EncryptionPrivate Range Query by Perturbation and Matrix Based Encryption
Private Range Query by Perturbation and Matrix Based Encryption
 
暗号化データベースモデルにおける関係情報推定を防ぐ索引手法
暗号化データベースモデルにおける関係情報推定を防ぐ索引手法暗号化データベースモデルにおける関係情報推定を防ぐ索引手法
暗号化データベースモデルにおける関係情報推定を防ぐ索引手法
 
VLDB09勉強会 Session27 Privacy2
VLDB09勉強会 Session27 Privacy2VLDB09勉強会 Session27 Privacy2
VLDB09勉強会 Session27 Privacy2
 
Security of Social Information from Query Analysis in DaaS
Security of Social Information from Query Analysis in DaaSSecurity of Social Information from Query Analysis in DaaS
Security of Social Information from Query Analysis in DaaS
 

Último

EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 

Último (20)

EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

Securing Social Information from Query Analysis in Outsourced Databases

  • 1. SECURING SOCIAL INFORMATION FROM QUERY ANALYSIS IN OUTSOURCED DATABASES Junpei Kawamoto and Masatoshi Yoshikawa (Kyoto University)
  • 2. iDB Forum 2008 2008/9/22 AGENDA 1.  2.  3.  4.  5.  Security problems of outsourced databases The data encryption model we employ Query Generalization by Dynamic Hash Result Generalization by Bloom Filter Conclusion and future work 2
  • 3. iDB Forum 2008 2008/9/22 AGENDA 1.  2.  3.  4.  5.  Security problems of outsourced databases The data encryption model we employ Query Generalization by Dynamic Hash Response Generalization by Bloom Filter Conclusion and future work 3
  • 4. iDB Forum 2008 2008/9/22 BACKGROUND OF OUR RESEARCH Ò  Outsourced Database systems are in widely use We can delegate management to service providers É  We can save on management costs É  We do not accept requests from outside of local networks É  We can protect the security of local networks É  www Traditional database system www Outsourced database system 4
  • 5. iDB Forum 2008 2008/9/22 PROBLEMS Ò  Security of users’ data Service Provider has total authority of databases É  Service Provider can inspect users’ data É  Data encryption at client side gives us a solution to the problem Ò  Security of users’ social information Social information means the relationships among user’s accounts 5
  • 6. iDB Forum 2008 2008/9/22 WHY IS SOCIAL INFORMATION IMPORTANT? Ò  Two kinds of risk emerge from the social information leak Personal information could be compromised in a chain effect É  Different online personae could be connected É  6
  • 7. iDB Forum 2008 2008/9/22 WHY IS SOCIAL INFORMATION IMPORTANT? Ò  Personal information could be compromised in a chain effect Bob do not compromise his information. However server can guess his name. ID: lee ID: carol ID: alice_gc Alice compromised her personal information blunderingly. Name: Alice, Boss: Bob, etc. In a chain effect, server may be able to guess other users information. 7
  • 8. iDB Forum 2008 2008/9/22 WHY IS SOCIAL INFORMATION IMPORTANT? Ò  Different online personae are connected Servers could guess these login names are associated with Alice. ID: alice_gc Public (official) account Other people’s account ID: Cheshire Private account 8
  • 9. iDB Forum 2008 2008/9/22 OUR PROPOSAL METHODS Ò  Query Generalization by Dynamic Hash Ò  Result Generalization by Bloom Filter 9
  • 10. iDB Forum 2008 2008/9/22 AGENDA 1.  2.  3.  4.  5.  Security problems of outsourced databases The data encryption model we employ Query Generalization by Dynamic Hash Response Generalization by Bloom Filter Conclusion and future work 10
  • 11. iDB Forum 2008 2008/9/22 DATA ENCRYPTION MODEL Ò  We use a traditional data encryption model É  Original table (not encrypted) No . name 1 Products Review 7/17 15:00 7/17 18:00 Alice, Bob 2 Business Trip 7/18 10:00 7/20 18:00 Alice, Bob 3 É  begin Who has authority end Team Meeting 7/20 15:00 7/20 18:00 Alice, Carol 4 Business Trip 7/21 12:00 Encrypted table (with index) No etuple . Iname Ibegin Iend acl 7/21 17:00 Dave Etuple is encrypted original tuple etuple = Encrypt(name, begin, end, acl) 1 5f0f1f46... 00 10 10 2 b98009af... 01 00 11 3 082ba604... 10 11 11 4 8bc546af... 01 01 01 Iname, Ibegin, and Iend are hash index used for query processing Iname = Hash(name) 11
  • 12. iDB Forum 2008 2008/9/22 DATA ENCRYPTION MODEL Ò  Query processing on the data encryption model Name = “Business Trip” & Begin = “7/18 10:00” Original query Iname = “01” & IBegin = “00” Query on server Name = “Business Trip” & Begin = “7/18 10:00” Query on client No . name begin end 2 Business Trip 7/18 10:00 7/20 18:00 4 Business Trip 7/21 12:00 7/21 17:00 etuple Iname Ibegin Iend b98009af... 01 00 11 8bc546af... 01 01 01 12
  • 13. iDB Forum 2008 2008/9/22 AGENDA 1.  2.  3.  4.  5.  Security problems of outsourced databases The data encryption model we employ Query Generalization by Dynamic Hash Response Generalization by Bloom Filter Conclusion and future work 13
  • 14. iDB Forum 2008 2008/9/22 QUERY GENERALIZATION Ò  Servers can guess users’ relationship by queries. If only Alice and Bob sent this query, server can guess they have some relation. Alice Bob Carol SELECT * FROM schedule WHERE begin = “7/15 10:00” SELECT * FROM schedule WHERE begin = “7/14 10:00” SELECT * FROM schedule WHERE begin = “7/15 10:00” or “7/14 10:00” This query is requested by at least three users so that server cannot find group information. 14
  • 15. iDB Forum 2008 2008/9/22 HOW TO GENERALIZE Ò  Firstly, queries are described by hash indices Begin = 7/15 10:00 Begin = 7/14 10:00 Ò  IBegin = 0001011 IBegin = 0011110 Next, the query is translated before it send to DB. www DB Generalizer Organization’s network 15
  • 16. iDB Forum 2008 2008/9/22 HOW TO GENERALIZE Ò  Generalizer uses dynamic hash to translate queries Translated query is IBegin = 00***** 0 0001011 0011110 1 0100101 0110110 IBegin = 01***** 1010011 1101101 1100011 IBegin = 1****** 0 1 *: wild card node leaf Begin = 7/15 10:00 IBegin = 00***** Begin = 7/14 10:00 IBegin = 00***** 16
  • 17. iDB Forum 2008 2008/9/22 SPLITTING LEAF Ò  Leaves are split to keep the distribution of hash balanced Insert new hash : 1000110 0 0001011 0011110 1 0100101 0110110 0 1 1010011 1101101 1100011 1000110 0 0001011 0011110 1 0100101 0110110 0 1 0 1010011 1000110 1 1101101 1100011 So that, moderate size hashes could be mixed. 17
  • 18. iDB Forum 2008 2008/9/22 AGENDA 1.  2.  3.  4.  5.  Security problems of outsourced databases The data encryption model we employ Query Generalization by Dynamic Hash Result Generalization by Bloom Filter Conclusion and future work 18
  • 19. iDB Forum 2008 2008/9/22 RESULT GENERALIZATION Ò  Servers can guess users’ relationship by query result. user tuple Alice tuple1 Bob tuple2 Carol tuple3 Dave tuple4 If only Alice and Carol request the tuple2, servers can guess there are some relationships between them If Alice and Dave never request same tuples, servers can guess there are no relationship between them To prevent servers’ guessing, some irrelevant tuples are requested. 19
  • 20. iDB Forum 2008 2008/9/22 RESULT GENERALIZATION Ò  User’s queries are generalized Original query Generalized query www user DB tuple Alice tuple1 Bob tuple2 Carol tuple3 Dave tuple4 In generalized query, each tuple is received by three users. Servers cannot guess relationships from the information of result tuples 20
  • 21. iDB Forum 2008 2008/9/22 BLOOM FILTER BASED GENERALIZATION Ò  Users are described by k+n length bit string Alice(uid = 1) 1 0 0 0 0 1 1 Bob(uid = 2) 0 1 1 1 0 0 0 Carol(uid = 3) 1 0 1 0 1 0 0 (uid mod 2) + 1 Ò  hash(uid) Dave(uid = 4) 0 1 0 0 1 0 1 Access authority is logical disjunction of the bit strings If Alice and Bob have authority: 1 1 1 1 0 1 1 If Alice and Carol have authority: 1 0 1 0 1 1 1 In this example, k =2, n = 5 Alice 1 0 0 0 0 1 1 ∨ Bob 0 1 1 1 0 0 0 21
  • 22. iDB Forum 2008 2008/9/22 QUERY PROCESSING Ò  When user requests tuples, bit string is used A tuple Alice & Bob have authority to 1111011 1111011 Alice 1000011 10 00011 Bob 0111000 01 11000 Carol 1010100 10 10100 Dave 0100101 01 00101 Server side At server side, first k bits are used Client side At client side, last n bits are used 22
  • 23. iDB Forum 2008 2008/9/22 ANONYMITY In first k bits used at server side, ⎡N / k ⎤ users are assigned to each bit. Ò  Each tuple is received at least ⎡N / k ⎤ users. Ò  Alice(uid = 1) 1 0 0 0 0 1 1 (uid mod 2) + 1 Ò  N: Total number of user hash(uid) To avoid result analysis, we could introduce ⎡N / k ⎤ - anonymity. 23
  • 24. iDB Forum 2008 2008/9/22 AGENDA 1.  2.  3.  4.  5.  Security problems of outsourced databases The data encryption model we employ Query Generalization by Dynamic Hash Response Generalization by Bloom Filter Conclusion and future work 24
  • 25. iDB Forum 2008 2008/9/22 CONCLUSION AND FUTURE WORK Ò  Ò  Ò  Ò  We introduce a new problem for outsourced DB Social information means the relationships among user’s accounts To protect the social information, we introduce two method É  Query Generalization by Dynamic Hash É  Result Generalization by Bloom Filter Future work É  Implement our methods and apply them to real service. É  Evaluate our methods. 25
  • 26. iDB Forum 2008 2008/9/22 Thank you! 26