Loading...

An Approach for Secure Data Outsourcing

Hadavi, Mohammad Ali | 2015

793 Viewed
  1. Type of Document: Ph.D. Dissertation
  2. Language: Farsi
  3. Document No: 47537 (19)
  4. University: Sharif University of Technology
  5. Department: Computer Engineering
  6. Advisor(s): alili, Rasool
  7. Abstract:
  8. Data outsourcing is an approach to delegate the burden of data management to external servers. In spite of its clear advantages, data outsourcing requires security assurances including data confidentiality, query result correctness, and access control enforcement. Research proposals have identified solutions with disparate assumptions for different security requirements. It is a real obstacle towards having an integrated solution through the combination of existing approaches. The practicality of data outsourcing to the cloud is seriously affected by this challenge. In this thesis, a unified view based on secret sharing is proposed to simultaneously achieve confidentiality, correctness, and access control enforcement assurances when relational data is outsourced to untrustworthy servers. First, we introduce searchable secret sharing schemes for securely dividing attribute values into their shares over which user queries are efficiently executed. Second, we extend our solution to adopt a multi-user setting where users have selective accesses to the outsourced data. We propose a mechanism by which private and dynamic access policies are enforced in retrieving shares as well as in reconstructing original values. Using the idea of multisecret sharing, we finally extend our solution to adopt outsourcing data to potentially malicious servers. Thus, any unauthorized manipulation of shares in query results is detected at client side through an efficient verification process. Correctness verification is performed at the finest level of granularity, i.e., an individual attribute value, without need to building verification information at server side for query results. We have theoretically analyzed our solutions to evaluate the satisfaction of desired properties. We have also experimentally evaluated our basic scheme as well as its extensions to assess the efficiency and practicality issues. Theoretical and experimental evaluations confirm the security and effectiveness of our solutions. Our solutions can be directly applied to the existing DBMSs without changes to their internals
  9. Keywords:
  10. Relational Database ; Access Control ; Secret Sharing ; Security ; Outsourcing ; Confidentiality

 Digital Object List

 Bookmark

...see more