DP-Sync: Hiding Update Patterns in Secure Outsourced Databases with Differential Privacy.

作者: Ashwin Machanavajjhala , Kartik Nayak , Johes Bater , Chenghong Wang

DOI: 10.1145/3448016.3457306

关键词:

摘要: In this paper, we have introduced a new type of leakage associated with modern encrypted databases called update pattern leakage. We formalize the definition and security model DP-Sync DP patterns. also proposed framework DP-Sync, which extends existing database schemes to guarantees that entire data history over outsourced structure is protected by differential privacy. This achieved imposing differentially-private strategies dictate owner's synchronization local~data.

参考文章(80)
Mihir Bellare, Alexandra Boldyreva, Adam O’Neill, Deterministic and Efficiently Searchable Encryption Advances in Cryptology - CRYPTO 2007. pp. 535- 552 ,(2007) , 10.1007/978-3-540-74143-5_30
Melissa Chase, Seny Kamara, Structured Encryption and Controlled Disclosure international conference on the theory and application of cryptology and information security. ,vol. 6477, pp. 577- 594 ,(2010) , 10.1007/978-3-642-17373-8_33
Omkant Pandey, Yannis Rouselakis, Property Preserving Symmetric Encryption Advances in Cryptology – EUROCRYPT 2012. pp. 375- 391 ,(2012) , 10.1007/978-3-642-29011-4_23
Dan Boneh, Eu-Jin Goh, Kobbi Nissim, Evaluating 2-DNF Formulas on Ciphertexts Theory of Cryptography. pp. 325- 341 ,(2005) , 10.1007/978-3-540-30576-7_18
Alexandra Boldyreva, Nathan Chenette, Younho Lee, Adam O’Neill, Order-Preserving Symmetric Encryption international cryptology conference. pp. 224- 241 ,(2009) , 10.1007/978-3-642-01001-9_13
Florian Hahn, Florian Kerschbaum, Searchable Encryption with Secure and Efficient Updates computer and communications security. pp. 310- 320 ,(2014) , 10.1145/2660267.2660297
Bijit Hore, Sharad Mehrotra, Mustafa Canim, Murat Kantarcioglu, Secure multidimensional range queries over outsourced data very large data bases. ,vol. 21, pp. 333- 358 ,(2012) , 10.1007/S00778-011-0245-7
Cynthia Dwork, Moni Naor, Toniann Pitassi, Guy N. Rothblum, Differential privacy under continual observation Proceedings of the 42nd ACM symposium on Theory of computing - STOC '10. pp. 715- 724 ,(2010) , 10.1145/1806689.1806787
Muhammad Naveed, Manoj Prabhakaran, Carl A. Gunter, Dynamic Searchable Encryption via Blind Storage ieee symposium on security and privacy. pp. 639- 654 ,(2014) , 10.1109/SP.2014.47