ObliuSky: Oblivious User-Defined Skyline Query Processing in the Cloud
- URL: http://arxiv.org/abs/2310.07148v1
- Date: Wed, 11 Oct 2023 02:48:13 GMT
- Title: ObliuSky: Oblivious User-Defined Skyline Query Processing in the Cloud
- Authors: Yifeng Zheng, Weibo Wang, Songlei Wang, Zhongyun Hua, Yansong Gao,
- Abstract summary: We present ObliuSky, a new system framework enabling oblivious user-defined skyline query processing in the cloud.
ObliuSky provides confidentiality protection for the content of the outsourced database, the user-defined skyline query, and the query results.
ObliuSky is superior in database and query encryption efficiency, with practically affordable query latency.
- Score: 18.055213945537357
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: The proliferation of cloud computing has greatly spurred the popularity of outsourced database storage and management, in which the cloud holding outsourced databases can process database queries on demand. Among others, skyline queries play an important role in the database field due to its prominent usefulness in multi-criteria decision support systems. To accommodate the tailored needs of users, user-defined skyline query has recently emerged as an intriguing advanced type of skyline query, which allows users to define custom preferences in their skyline queries (including the target attributes, preferred dominance relations, and range constraints on the target attributes). However, user-defined skyline query services, if deployed in the cloud, may raise critical privacy concerns as the outsourced databases and skyline queries may contain proprietary/privacy-sensitive information, and the cloud might even suffer from data breaches. In light of the above, this paper presents ObliuSky, a new system framework enabling oblivious user-defined skyline query processing in the cloud. ObliuSky departs from the state-of-the-art prior work by not only providing confidentiality protection for the content of the outsourced database, the user-defined skyline query, and the query results, but also making the cloud oblivious to the data patterns (e.g., user-defined dominance relations among database points and search access patterns) which may indirectly cause data leakages. We formally analyze the security guarantees and conduct extensive performance evaluations. The results show that while achieving much stronger security guarantees than the state-of-the-art prior work, ObliuSky is superior in database and query encryption efficiency, with practically affordable query latency.
Related papers
- Robust Utility-Preserving Text Anonymization Based on Large Language Models [80.5266278002083]
Text anonymization is crucial for sharing sensitive data while maintaining privacy.
Existing techniques face the emerging challenges of re-identification attack ability of Large Language Models.
This paper proposes a framework composed of three LLM-based components -- a privacy evaluator, a utility evaluator, and an optimization component.
arXiv Detail & Related papers (2024-07-16T14:28:56Z) - K-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data [0.0]
In public cloud environments while data is encrypted, the cloud service provider typically controls the encryption keys.
This situation makes traditional privacy-preserving classification systems inadequate.
We propose a secure k nearest neighbor classification algorithm for encrypted, outsourced data.
arXiv Detail & Related papers (2024-07-05T19:44:17Z) - Database-Augmented Query Representation for Information Retrieval [59.57065228857247]
We present a novel retrieval framework called Database-Augmented Query representation (DAQu)
DAQu augments the original query with various (query-related) metadata across multiple tables.
We validate DAQu in diverse retrieval scenarios that can incorporate metadata from the relational database.
arXiv Detail & Related papers (2024-06-23T05:02:21Z) - Privacy-Enhanced Database Synthesis for Benchmark Publishing [16.807486872855534]
Differential privacy has become a key method for safeguarding privacy when sharing data, but the focus has largely been on minimizing errors in aggregate queries or classification tasks.
This paper delves into the creation of privacy-preserving databases specifically for benchmarking, aiming to produce a differentially private database.
PrivBench uses sum-product networks (SPNs) to partition and sample data, enhancing data representation while securing privacy.
arXiv Detail & Related papers (2024-05-02T14:20:24Z) - Enc2DB: A Hybrid and Adaptive Encrypted Query Processing Framework [47.11111145443189]
We introduce Enc2DB, a novel secure database system following a hybrid strategy on and openGauss.
We present a micro-benchmarking test and self-adaptive mode switch strategy that can choose the best execution path (cryptography or TEE) to answer a given query.
We also design and implement a ciphertext index compatible with native cost model and querys to accelerate query processing.
arXiv Detail & Related papers (2024-04-10T08:11:12Z) - Feature Selection using the concept of Peafowl Mating in IDS [2.184775414778289]
Cloud computing provides services that are Infrastructure based, Platform based and Software based.
The popularity of this technology is due to its superb performance, high level of computing ability, low cost of services, scalability, availability and flexibility.
The obtainability and openness of data in cloud environment make it vulnerable to the world of cyber-attacks.
To detect the attacks Intrusion Detection System is used, that can identify the attacks and ensure information security.
arXiv Detail & Related papers (2024-02-03T06:04:49Z) - Privacy-Preserved Neural Graph Databases [48.57788773216699]
We propose a privacy-preserved neural graph database (P-NGDB) framework to alleviate the risks of privacy leakage in NGDBs.
We introduce adversarial training techniques in the training stage to enforce the NGDBs to generate indistinguishable answers when queried with private information.
arXiv Detail & Related papers (2023-12-25T02:32:05Z) - Exploring Security Practices in Infrastructure as Code: An Empirical
Study [54.669404064111795]
Cloud computing has become popular thanks to the widespread use of Infrastructure as Code (IaC) tools.
scripting process does not automatically prevent practitioners from introducing misconfigurations, vulnerabilities, or privacy risks.
Ensuring security relies on practitioners understanding and the adoption of explicit policies, guidelines, or best practices.
arXiv Detail & Related papers (2023-08-07T23:43:32Z) - Scalable Discovery and Continuous Inventory of Personal Data at Rest in
Cloud Native Systems [0.0]
Cloud native systems are processing large amounts of personal data through numerous and possibly multi-paradigmatic data stores.
From a privacy engineering perspective, a core challenge is to keep track of all exact locations, where personal data is being stored.
We present Teiresias, comprising i) a workflow pattern for scalable discovery of personal data at rest, and ii) a cloud native system architecture and open source prototype implementation of said workflow pattern.
arXiv Detail & Related papers (2022-09-09T10:45:34Z) - A Privacy-Preserving Distributed Architecture for
Deep-Learning-as-a-Service [68.84245063902908]
This paper introduces a novel distributed architecture for deep-learning-as-a-service.
It is able to preserve the user sensitive data while providing Cloud-based machine and deep learning services.
arXiv Detail & Related papers (2020-03-30T15:12:03Z) - A Quantum-based Database Query Scheme for Privacy Preservation in Cloud
Environment [7.331387596311974]
Privacy-preserving database query allows the user to retrieve a data item from the cloud database without revealing the information of the queried data item.
All the data items of the database are encrypted by different keys for protecting server's privacy.
Two oracle operations, a modified Grover iteration, and a special offset encryption mechanism are combined together to ensure that the client can correctly query the desirable data item.
arXiv Detail & Related papers (2020-02-01T11:14:38Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.