期刊文献+

基于关系分解的外包数据库机密性保护方案研究

Relation-Fragmentation-Based Confidential Scheme for Database Outsourcing
下载PDF
导出
摘要 针对外包数据库服务中数据库服务提供商本身并不完全可信等潜在威胁引起的隐私数据机密性威胁,提出了一种基于关系分解的外包关系数据库机密性保护方案。设计了考虑查询类型和属性所处查询位置的属性分解代价计算策略,并以此计算策略为评价标准,给出了求解最小属性分解代价方案的算法。然后,对各数据切片进行了准标识符的抗共谋攻击处理,并进行了性能测试。实验对比结果表明该方案对不同的应用查询类型有较好的适应性,有效降低了关系分解代价,提高了查询执行效率。 A confidentiality protecting scheme based on relation fragmentation is proposed to solve the privacy risk caused by untrusted database service providers (DSP) in database outsourcing sce- nario. The scheme firstly designs an application oriented strategy to compute attribute fragmentation cost, which concerns the query type and the position that the involved attribute is in. Secondly, by using the self-adaptive strategy, an algorithm is established to find the least cost attribute fragmenta- tion scheme for the given table. Furthermore, the link of identifiers is broken of the same tuples in different fragmented attribute sub-set to resist DSPs-collusion. Finally, a brief look is given of the query executing mechanism for this scheme and an experiment is demonstrated to test its efficiency.
出处 《信息工程大学学报》 2013年第4期504-512,共9页 Journal of Information Engineering University
关键词 数据库外包 机密性 关系分解 抗共谋攻击 database outsourcing confidentiality relation fragmentation collusion-resistance
  • 相关文献

参考文献12

  • 1Hakan H, Bala I, Sharad M. Providing Database as a Service [ C ://Proc of the 18th International Conference on Data Engineer- ing (ICDE). 2002: 29-38.
  • 2冯登国,张敏,张妍,徐震.云计算安全研究[J].软件学报,2011,22(1):71-83. 被引量:1063
  • 3Damiani E,Vimercati S D, Jajodia S, et al. Balancing Confidentiality and Efficiency in Untrusted Relational DBMSs [ C ]// Proc. of the 10'h ACM Conference on Computer and Communications Security. New York:ACM Press,2003:93-102.
  • 4Aggarwal G, Bawa M, Ganesan P, et al. Two can Keep a Secret : a Distributed Architecture for Secure Database Services [ C ]// Proc of the 2th Conference on Innovative Data System Research( CIDR' 05). 2005:186-199.
  • 5余永红,柏文阳.基于加密技术的外包数据库服务集成安全[J].计算机应用,2011,31(1):110-114. 被引量:4
  • 6张坤,李庆忠,史玉良.面向SaaS应用的数据组合隐私保护机制研究[J].计算机学报,2010,33(11):2044-2054. 被引量:35
  • 7Ganapathy V,Thomas D, Feder T, et al. Distributing Data for Secure Database Services [ C ]//Proc of the 4th International Workshop on Privacy and Anonymity in the Information Society. Uppsala,Sweden,2011:217-221.
  • 8Li Xiong,Slawomir G,Vaidy S. Adaptive, Secure, and Scalable Distributed Data Outsourcing: A Vision Paper[ C ]//Proc of the 3rd Data-Intensive Application, Programming Abstractions, and System. San Jose, USA, 2011:1-6.
  • 9Tamer Ozsu M,Valduries P. Principles of Distributed Database Systems[ M]. 2nd edition. Prentice Hall, 1999.
  • 10李超零,陈越,谭鹏许,杨刚,李文俊.基于分解与加密的云数据库隐私保护机制研究[J].信息工程大学学报,2012,13(3):376-384. 被引量:10

二级参考文献56

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 2Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 3Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 4Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 5Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 6Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 7Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 8Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.
  • 9Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University of Twente, 2009.
  • 10Roy S, Chuah M. Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs. Technical Report, 2009.

共引文献1100

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部