A Novel Approach to Build Reliable and Efficient Query Services in Cloud with RASP Data Perturbation

Mohammad Junaid, V. Padmaja

Abstract


Inspired and motivated by the widespread development and deployment of public cloud computing infrastructures, using clouds to host data query services has become an fascinating solution for the advantages on scalability and cost-saving. However, Data owners show reluctance to share the sensitive and confidential data unless the Data integrity is guaranteed. On the other hand, a secured query service should still provide efficient query processing and significantly reduce the in-house workload to fully realize the benefits of cloud computing. We propose the random space perturbation (RASP) data perturbation method to provide secure and efficient range query and kNN query services for protected data in the cloud. The RASP data perturbation method combines order preserving encryption, dimensionality expansion, random noise injection, and random projection, to provide strong resilience to attacks on the perturbed data and queries. It also preserves multidimensional ranges, which allows existing indexing techniques to be applied to speedup range query processing. The kNN-R algorithm is designed to work with the RASP range query algorithm to process the kNN queries. We have carefully analyzed the attacks on data and queries under a precisely defined threat model and realistic security assumptions. Extensive experiments have been conducted to show the advantages of this approach on efficiency and security


References


R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, “Order Preserving Encryption for Numeric Data,†Proc. ACM SIGMOD Int’l Conf. Management of Data (SIGMOD), 2004.

M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.K. Andy Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “Above the Clouds: A Berkeley View of Cloud Computing,†technical report, Univ. of Berkerley, 2009.

J. Bau and J.C. Mitchell, “Security Modeling and Analysis,†IEEE Security and Privacy, vol. 9, no. 3, pp. 18-25, May/June 2011.

S. Boyd and L. Vandenberghe, Convex Optimization. Cambridge Univ. Press, 2004.

N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, “Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data,†Proc. IEEE INFOCOMM, 2011.

K. Chen, R. Kavuluru, and S. Guo, “RASP: Efficient Multidimensional Range Query on Attack-Resilient Encrypted Databases,†Proc. ACM Conf. Data and Application Security and Privacy, pp. 249-260, 2011.

K. Chen and L. Liu, “Geometric Data Perturbation for Outsourced Data Mining,†Knowledge and Information Systems, vol. 29, pp. 657- 695, 2011.

K. Chen, L. Liu, and G. Sun, “Towards Attack-Resilient Geometric Data Perturbation,†Proc. SIAM Int’l Conf. Data Mining, 2007.

B. Chor, E. Kushilevitz, O. Goldreich, and M. Sudan, “Private nformation Retrieval,†ACM Computer Survey, vol. 45, no. 6, pp. 965-981, 1998.

R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, “Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions,†Proc. 13th ACM Conf. Computer and Comm. Security, pp. 79-88, 2006 N.R. Draper and H. Smith, Applied Regression Analysis. Wiley, 1998.

H. Hacigumus, B. Iyer, C. Li, and S. Mehrotra, “Executing SQL over Encrypted Data in the Database-Service-Provider Model,†Proc. ACM SIGMOD Int’l Conf. Management of Data (SIGMOD), 2002.


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.

Â