CS573 Data Privacy and Security Secure data outsourcing – Combining encryption and fragmentation.

Post on 17-Jan-2016

224 views 0 download

Transcript of CS573 Data Privacy and Security Secure data outsourcing – Combining encryption and fragmentation.

CS573 Data Privacy and Security

Secure data outsourcing – Combining encryption and fragmentation

Combining Fragmentation and Encryption for outsourcing

• Breaking sensitive associations between attributes

Confidentiality Constraints

• Example: constraint {DoB, Zip, Illness}– Okay to release {DoB, Zip}, {Zip}, …

Constraint Example

Basic ideas

• Singleton constraints– encryption

• Association constraints– encryption of any one attribute– Fragmentation of the attributes

Example

Fragmentation

• Classical distributed database design problem (vertical fragmentation)

• Total number of possible fragmentations given N attributes?

• What would be an optimal fragmentation?

Optimal fragmentation

• Correctly enforce constraints• Maximal visibility• Minimal fragmentation– Maximal attribute affinity

• Problem is NP hard

Algorithm without confidentiality constraints

• Without confidentiality constraints - Hierarchical clustering

• With confidentiality constraints?– {s}, {n,d}, {n,z}, {n, i}, {n, p}, {d, z, i}, {d, z, p}

References

• Combining fragmentation and encryption to protect privacy in data storage, TISSEC, 2010

• Fragmentation design for efficient query execution over sensitive distributed databases, ICDCS, 2009