cs573 data privacy and security secure data outsourcing – combining encryption and fragmentation

12
CS573 Data Privacy and Security Secure data outsourcing – Combining encryption and fragmentation

Upload: scot-mcdowell

Post on 17-Jan-2016

224 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: CS573 Data Privacy and Security Secure data outsourcing – Combining encryption and fragmentation

CS573 Data Privacy and Security

Secure data outsourcing – Combining encryption and fragmentation

Page 2: CS573 Data Privacy and Security Secure data outsourcing – Combining encryption and fragmentation

Combining Fragmentation and Encryption for outsourcing

• Breaking sensitive associations between attributes

Page 3: CS573 Data Privacy and Security Secure data outsourcing – Combining encryption and fragmentation

Confidentiality Constraints

• Example: constraint {DoB, Zip, Illness}– Okay to release {DoB, Zip}, {Zip}, …

Page 4: CS573 Data Privacy and Security Secure data outsourcing – Combining encryption and fragmentation

Constraint Example

Page 5: CS573 Data Privacy and Security Secure data outsourcing – Combining encryption and fragmentation

Basic ideas

• Singleton constraints– encryption

• Association constraints– encryption of any one attribute– Fragmentation of the attributes

Page 6: CS573 Data Privacy and Security Secure data outsourcing – Combining encryption and fragmentation

Example

Page 7: CS573 Data Privacy and Security Secure data outsourcing – Combining encryption and fragmentation
Page 8: CS573 Data Privacy and Security Secure data outsourcing – Combining encryption and fragmentation
Page 9: CS573 Data Privacy and Security Secure data outsourcing – Combining encryption and fragmentation

Fragmentation

• Classical distributed database design problem (vertical fragmentation)

• Total number of possible fragmentations given N attributes?

• What would be an optimal fragmentation?

Page 10: CS573 Data Privacy and Security Secure data outsourcing – Combining encryption and fragmentation

Optimal fragmentation

• Correctly enforce constraints• Maximal visibility• Minimal fragmentation– Maximal attribute affinity

• Problem is NP hard

Page 11: CS573 Data Privacy and Security Secure data outsourcing – Combining encryption and fragmentation

Algorithm without confidentiality constraints

• Without confidentiality constraints - Hierarchical clustering

• With confidentiality constraints?– {s}, {n,d}, {n,z}, {n, i}, {n, p}, {d, z, i}, {d, z, p}

Page 12: CS573 Data Privacy and Security Secure data outsourcing – Combining encryption and fragmentation

References

• Combining fragmentation and encryption to protect privacy in data storage, TISSEC, 2010

• Fragmentation design for efficient query execution over sensitive distributed databases, ICDCS, 2009