12
CS573 Data Privacy and Security Secure data outsourcing – Combining encryption and fragmentation

CS573 Data Privacy and Security

  • Upload
    jadon

  • View
    34

  • Download
    0

Embed Size (px)

DESCRIPTION

CS573 Data Privacy and Security. Secure data outsourcing – Combining encryption and fragmentation. Combining Fragmentation and Encryption for outsourcing. Breaking sensitive associations between attributes. Confidentiality Constraints. Example: constraint { DoB , Zip, Illness} - PowerPoint PPT Presentation

Citation preview

Page 1: CS573 Data Privacy and Security

CS573 Data Privacy and Security

Secure data outsourcing – Combining encryption and fragmentation

Page 2: CS573 Data Privacy and Security

Combining Fragmentation and Encryption for outsourcing

• Breaking sensitive associations between attributes

Page 3: CS573 Data Privacy and Security

Confidentiality Constraints

• Example: constraint {DoB, Zip, Illness}– Okay to release {DoB, Zip}, {Zip}, …

Page 4: CS573 Data Privacy and Security

Constraint Example

Page 5: CS573 Data Privacy and Security

Basic ideas

• Singleton constraints– encryption

• Association constraints– encryption of any one attribute– Fragmentation of the attributes

Page 6: CS573 Data Privacy and Security

Example

Page 7: CS573 Data Privacy and Security
Page 8: CS573 Data Privacy and Security
Page 9: CS573 Data Privacy and Security

Fragmentation

• Classical distributed database design problem (vertical fragmentation)

• Total number of possible fragmentations given N attributes?

• What would be an optimal fragmentation?

Page 10: CS573 Data Privacy and Security

Optimal fragmentation

• Correctly enforce constraints• Maximal visibility• Minimal fragmentation– Maximal attribute affinity

• Problem is NP hard

Page 11: CS573 Data Privacy and Security

Algorithm without confidentiality constraints

• Without confidentiality constraints - Hierarchical clustering

• With confidentiality constraints?– {s}, {n,d}, {n,z}, {n, i}, {n, p}, {d, z, i}, {d, z, p}

Page 12: CS573 Data Privacy and Security

References

• Combining fragmentation and encryption to protect privacy in data storage, TISSEC, 2010

• Fragmentation design for efficient query execution over sensitive distributed databases, ICDCS, 2009