Project Details
Projekt Print View

Privacy-aware Management of Relational Data

Subject Area Security and Dependability, Operating-, Communication- and Distributed Systems
Term from 2014 to 2018
Project identifier Deutsche Forschungsgemeinschaft (DFG) - Project number 256809816
 
Final Report Year 2019

Final Report Abstract

Outsourcing of private data to service providers, aka. database as a service (DBaaS), is an important scenario in today’s economy and is gaining more and more importance. However, up to now, we are not aware of any fully satisfying approach that copes well with all secrecy requirements of all different scenarios. In this approach we target at the development of efficient approaches tailored to individual scenarios in contrast to a general approach. The core contributions of this project are: (1) fundamental contributions that helps developing tailored approaches in the context of DBaaS and (2) concrete solutions for outsourcing and querying OSN data. A secretization scheme for DBaaS have in general three distinctive procedures: (1) a secretization procedure sec, that transforms the original database db to a corresponding secretized database db by means of data transformations, (2) a query transformation procedure T , that translates a query q for db to a corresponding query q for db , and (3) a result construction procedure R, that constructs the final result of q for db from the result of q for db . The data transformations of an approach determine its secrecy, but also its query support and performance. Regarding the first category, we have shown how one can delimit the design alternatives of secrecy approaches in the context of DBaaS. Concretely, we specified two characteristics of the query transformation procedure T and the result construction procedure R, that can detect secrecy-effective data transformation, the ones that contribute to secrecy, from others. This characterization (a) allow us to detect the chosen design alternatives of an approach only by analyzing its procedures R and T and so its general weakness, without involving concrete data, (b) help us choosing the right data transformations for the right scenario, (c) help us exploring new secrecy-effective data transformations. Based on these findings we have developed FEAST a framework that (a) reduces the implementation effort for secrecy approaches in the context of DBaaS, (b) automates the execution of experiments, and (c) facilitates comparisons of secrecy approaches with different query support. Next, we have proposed the notion of distancepreserving encryption (DPE), having shown that our definition is exact and cannot be relaxed. Based of our DPE definition we developed DisPE, a general procedure for designing DPE implementations for given data types and distance functions. Regarding the second category of contributions, we addressed to main issues: (a) the flexibility of access policies and (b) the distrust of users toward the service providers. For the first issue, we propose and define the syntax and semantics of a new type of authorization, called mutual, which allows to model reciprocal behavior in the context of access control models. For the second issue, we consider two different scenarios. In the first scenario, the query performer is at the same time the data owner. In the second scenario we consider the case in which the query performer is not allowed to access the data needed to compute queries, however, he is allowed to access query results over the data. For both scenarios we developed tailored schemes with provable secrecy guarantees. Both approaches include a revocation feature and provide secrecy guarantees under collusion assumption, i.e., an adversary can collude with the service provider.

Publications

  • “Distance-Based Data Mining Over Encrypted Data”. In: 2018 IEEE 34th International Conference on Data Engineering (ICDE). IEEE. 2018, pp. 1264–1267
    Christine Tex, Martin Schäler, and Klemens Böhm
    (See online at https://doi.org/10.1109/ICDE.2018.00126)
  • “Towards meaningful distancepreserving encryption”. In: Proceedings of the 30th International Conference on Scientific and Statistical Database Management (SSDBM). ACM. 2018
    Christine Tex, Martin Schäler, and Klemens Böhm
    (See online at https://doi.org/10.1145/3221269.3223029)
  • On Mutual Authorizations: Semantics, Integration Issues, and Performance. Tech. rep. 6. Karlsruher Institut für Technologie (KIT), 2019. 21 pp.
    Gabriela Suntaxi, Aboubakr Achraf El Ghazi, and Klemens Böhm
    (See online at https://doi.org/10.5445/IR/1000093936)
  • On Preserving u Secrecy in Mobile Social Networks. Tech. rep. 7. Karlsruher Institut für Technologie (KIT), 2019. 27 pp.
    Gabriela Suntaxi, Aboubakr Achraf El Ghazi, and Klemens Böhm
    (See online at https://doi.org/10.5445/IR/1000096955)
  • “Mutual Authorizations: Semantics and Integration Issues”. In: Proceedings of the 24th ACM Symposium on Access Control Models and Technologies. 2019, pp. 213–218
    Gabriela Suntaxi, Aboubakr Achraf El Ghazi, and Klemens Böhm
    (See online at https://doi.org/10.1145/3322431.3325415)
 
 

Additional Information

Textvergrößerung und Kontrastanpassung