Advertisement

Abstract

Preserving the anonymity of individuals by technical means when outsourcing databases to semi-trusted providers gained importance in recent years. Anonymization approaches exist that fulfill anonymity notions like \(\ell \)-diversity and can be used to outsource databases. However, indexes on anonymized data significantly differ from plaintext indexes both in terms of usage and possible performance gains. In most cases, it is not clear whether using an anonymized index is beneficial or not.

In this paper, we present Dividat, an approach that makes anonymized database outsourcing more practical and deployable by optimizing the indexing of \(\ell \)-diversified data. We show that the efficiency of anonymized indexes differs from traditional indexes and performance gains of a factor of 5 are possible by optimizing indexing strategies. We propose strategies to determine which indexes should be created for a given query workload and used for a given query. To apply these strategies without actually creating each possible index, we propose and validate models that estimate the performance of anonymized index tables a-priori.

Keywords

Database-as-a-service Anonymized indexes \(\ell \)-diversity Performance optimization 

References

  1. 1.
    De Capitani di Vimercati, S., Foresti, S., Samarati, P.: Managing and accessing data in the cloud: Privacy risks and approaches.: In Proceedings of the 7th International Conference on Risk and Security of Internet and Systems (CRiSIS), pp. 1–9 (2012)Google Scholar
  2. 2.
    Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: L-diversity: Privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data (TKDD) 1, 3 (2007)CrossRefGoogle Scholar
  3. 3.
    Nergiz, A.E., Clifton, C.: Query processing in private data outsourcing using anonymization. In: Li, Y. (ed.) DBSec. LNCS, vol. 6818, pp. 138–153. Springer, Heidelberg (2011) CrossRefGoogle Scholar
  4. 4.
    Nergiz, A.E., Clifton, C., Malluhi, Q.M.: Updating outsourced anatomized private databases. In: Proceedings of the International Conference on Extending Database Technology (EDBT), pp. 179–190 (2013)Google Scholar
  5. 5.
    De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Livraga, G., Paraboschi, S., Samarati, P.: Extending loose associations to multiple fragments. In: Wang, L., Shafiq, B. (eds.) DBSec 2013. LNCS, vol. 7964, pp. 1–16. Springer, Heidelberg (2013) CrossRefGoogle Scholar
  6. 6.
    Fung, B.C.M., Wang, K., Chen, R., Yu, P.S.: Privacy-preserving data publishing: A survey of recent developments. ACM Comput. Surv. (CSUR) 42, 14:1–14:53 (2010)CrossRefGoogle Scholar
  7. 7.
    Sweeney, L.: k-anonymity: a model for protecting privacy. Intl. J. Uncertainty Fuzziness Knowl. Based Syst. 10(05), 557–570 (2002)CrossRefzbMATHMathSciNetGoogle Scholar
  8. 8.
    Bayardo, R., Agrawal, R.: Data privacy through optimal k-anonymization. In: Proceedings of the IEEE 21th International Conference on Data Engineering (ICDE), pp. 217–228 (2005)Google Scholar
  9. 9.
    Zhang, Q., Koudas, N., Srivastava, D., Yu, T.: Aggregate query answering on anonymized tables. In: Proceedings of the IEEE 23th International Conference on Data Engineering (ICDE), pp. 116–125 (2007)Google Scholar
  10. 10.
    Gedik, B., Liu, L.: Location privacy in mobile systems: A personalized anonymization model. In: Proceedings of the 25th IEEE International Conference on Distributed Computing Systems (ICDCS), pp. 620–629 (2005)Google Scholar
  11. 11.
    Kikuchi, H., Basu, A., Vaidya, J.: Perturbation based privacy preserving slope one predictors for collaborative filtering. In: Dimitrakos, T., Moona, R., Patel, D., McKnight, D.H. (eds.) IFIPTM 2012. IFIP AICT, vol. 374, pp. 17–35. Springer, Heidelberg (2012) Google Scholar
  12. 12.
    Popa, R.A., Redfield, C., Zeldovich, N., Balakrishnan, H.: Cryptdb: Protecting confidentiality with encrypted query processing. In: Proceedings of the 23rd ACM Symposium on Operating Systems Principles (SOSP), pp. 85–100 (2011)Google Scholar
  13. 13.
    Hacigumus, H., Iyer, B., Li, C., Mehrotra, S.: Executing SQL over encrypted data in the database-service-provider model. In: Proceedings of SIGMOD (2002)Google Scholar
  14. 14.
    Damiani, E., De Capitani di Vimercati, S., Jajodia, S., Paraboschi, S., Samarati, P.: Balancing confidentiality and efficiency in untrusted relational DBMSs. In: Proceedings of CCS (2003)Google Scholar
  15. 15.
    De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: On information leakage by indexes over data fragments. In: Proceedings of the 1st International Workshop on Privacy-Preserving Data Publication and Analysis (PrivDB) (2013)Google Scholar
  16. 16.
    Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Combining fragmentation and encryption to protect privacy in data storage. ACM Trans. Inf. Sys. Secur. (TISSEC) 13, 22:1–22:33 (2010)Google Scholar
  17. 17.
    Aggarwal, G., Bawa, M., Ganesan, P., Garcia-Molina, H., Kenthapadi, K., Motwani, R., Srivastava, U., Thomas, D., Xu, Y.: Two can keep a secret: A distributed architecture for secure database services. In: Proceedings of CIDR (2005)Google Scholar
  18. 18.
    Jünemann, K., Köhler, J., Hartenstein, H.: Data outsourcing simplified: Generating data connectors from confidentiality and access policies. In: Proceedings of the Workshop on Data-intensive Process Management in Large-Scale Sensor Systems (CCGrid-DPMSS) (2012)Google Scholar
  19. 19.
    Ceselli, A., Damiani, E., De Capitani di Vimercati, S., Jajodia, S., Paraboschi, S., Samarati, P.: Modeling and assessing inference exposure in encrypted databases. ACM Trans. Inform. Sys. Secur. (TISSEC) 8, 119–152 (2005)CrossRefGoogle Scholar
  20. 20.
    He, Y., Barman, S., Naughton, J.: Preventing equivalence attacks in updated, anonymized data. In: Proceedings of the IEEE 27th International Conference on Data Engineering (ICDE), pp. 529–540 (2011)Google Scholar
  21. 21.
    Fung, B.C.M., Wang, K., Fu, A.W.-C., Pei, J.: Anonymity for continuous data publishing. In: Proceedings of the International Conference on Extending Database Technology (EDBT), pp. 264–275 (2008)Google Scholar
  22. 22.
    Xiao, X., Tao, Y.: M-invariance: towards privacy preserving re-publication of dynamic datasets. In: Proceedings of the ACM International Conference on Management of Data (SIGMOD), pp. 689–700 (2007)Google Scholar
  23. 23.
    Zhou, B., Han, Y., Pei, J., Jiang, B., Tao, Y., Jia, Y.: Continuous privacy preserving publishing of data streams. In: Proceedings of the International Conference on Extending Database Technology (EDBT), pp. 648–659 ( 2009)Google Scholar
  24. 24.
    Ioannidis, Y.E.: Query optimization. ACM Comput. Surv. (CSUR) 28(1), 121–123 (1996)CrossRefGoogle Scholar
  25. 25.
    Chaudhuri, S.: An overview of query optimization in relational systems. In: Proceedings of the 17th ACM Symposium on Principles of Database Systems (PODS), pp. 34–43 (1998)Google Scholar
  26. 26.
    Haas, P.J., Ilyas, I.F., Lohman, G.M., Markl, V.: Discovering and exploiting statistical properties for query optimization in relational databases: a survey. Stat. Anal. Data Min. 1(4), 223–250 (2009)CrossRefMathSciNetGoogle Scholar
  27. 27.
    Goldstein, J., Larson, P.-A.: Optimizing queries using materialized views: a practical, scalable solution. In: Proceedings of the ACM International Conference on Management of Data (SIGMOD), pp. 331-342 (2001)Google Scholar
  28. 28.
    Chaudhuri, S., Krishnamurthy, R., Potamianos, S., Shim, K.: Optimizing queries with materialized views. In: Proceedings of the 11th International conference on Data Engineering, pp. 190–200 (1995)Google Scholar
  29. 29.
    Hellerstein, J.M., Stonebraker, M.: Predicate migration: Optimizing querieswith expensive predicates. In: Proceedings of the 1993 ACM International Conference on Managementof Data (SIGMOD), pp. 267–276 (1993)Google Scholar
  30. 30.
  31. 31.
    Jain, R.: The Art of Computer System Performance Analysis: Techniques for Experimental Design, Measurement, Simulation and Modeling. John Wiley, New York (1991) Google Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  1. 1.Karlsruhe Institute of Technology (KIT), Steinbuch Centre for Computing (SCC) and Institute of TelematicsKarlsruheGermany

Personalised recommendations