Top Banner
Network Security and Applied Cryptography Laboratory http://crypto.cs.stonybrook.edu Secure Data Outsourcing Tutorial @ VLDB 2007 ver. 2.5 (7/23/2007) © 2005-07. All Rights Reserved. Selected portions © of their respective authors. Used by permission. Radu Sion Stony Brook NSAC Lab [email protected]
95

Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

Jul 09, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

Network Security and Applied Cryptography Laboratory

http://crypto.cs.stonybrook.edu

Secure Data OutsourcingTutorial @ VLDB 2007

ver. 2.5 (7/23/2007)© 2005-07. All Rights Reserved.Selected portions © of their respective authors. Used by permission.

Radu SionStony Brook NSAC Lab

[email protected]

Page 2: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

2

Feynman moment Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

“I have much experience only in teaching graduate students […] and as a result […] I know that I don't know how to teach.“

Page 3: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

3

Overview Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

� Crypto Crash Course� Data Outsourcing� Query Correctness� Data Confidentiality� Access Privacy� Searching on Encrypted Data� Trusted Hardware

Page 4: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

4

Crypto Crash Course Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

• Randomness• Crypto Hashes• Encryption• Public key encryption• Signatures• Ciphers• Semantic Security• Forward Secrecy• Performance• Merkle/Hash trees

Page 5: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

5

Crypto: Meet the cast Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

Mallory (“malicious”, bad guy)

MAlice(innocent)

Bob(mostly innocent,

sometimes malicious)

Eve(eavesdrops,

passive malicious)

just listens

doesstuff too

Trent(trusted guy)k

k

Ek(M)

Page 6: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

6

Crypto: Randomness Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

Cryptographically random numbers: a sequence of numbers X1, X2, … such that for any integer k > 0, it is impossible for an observer to predict Xk even if all of X1, …, Xk–1 are known.

Problem: True RNGs cannot be deterministically algorithmic in a closed system. “Anyone who considers arithmetic methods … is in a state of sin” (von Neuman)

Being creative: simulate a sequence of cryptographically random numbers but generate them by an algorithm.

Pseudo-random numbers: a sequence of numbers X1, X2, …such that for any integer k > 0, it is hard for an observer to predict Xk even if all of X1, …, Xk–1 are known.

Page 7: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

7

Crypto: Hashes Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

• A hash is a one-way, non-invertiblefunction of that produces unique (with high likelihood), fixed-size outputs for different inputs.

• The probability of any bit “flipping” in the output bit-string should be always ½ for any change (even one bit) in the input (“randomness”).

Page 8: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

8

Crypto: PKI Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

Alice

Bob

publicB privateBpublicAprivateA

EpublicB(M)

2

M=DprivateB(EpublicB

(M))3

Trent

Mallory Eve

no problemo

“public key certificate”

ST(time,expiration,“Bob”,publicB)1

“certificateauthority”

Page 9: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

9

Crypto: Signatures Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

Alice

Bob

publicB privateBpublicAprivateA

M=DpublicA(SA(M)) ?

2

M=DprivateA(EpublicA

(M))=DpublicA(EprivateA

(M))

SA(M)=EprivateA(M)

1

M

Mallory Eve

no problemo

Page 10: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

10

Crypto: RSA in a nutshell Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

n=pq1

e=172

d = e-1 mod (p-1)(q-1)

Extended Euclidean3

message m<n

RSA Encryption

c=me mod n4

RSA Decryption

m=cd mod n5

Alice

Bob

Page 11: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

11

Crypto: Condensed RSA Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

messages {mi}

Alice

Bob

verification: check that s = (∏ ∏ ∏ ∏ mi)e

3

“Condensed RSA Signature”2

s=∏ ∏ ∏ ∏ si

RSA Signature1

{si=mid mod n}

un-forgeable against adaptive chosen message

attacks

Page 12: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

12

Crypto: Ciphers Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

Alice

Bob

Mallory Eve

cipherm3 m2 m1…

m1 m2 m3…

cipher-1

ci

The compromise of individual blocks should not lead to the compromise of past communication !

Page 13: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

13

Crypto: Semantic Security Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

Mallory Alice

M1M2

2

Ep(Mx)3

x’4

x=x’ ?5

p1 p,s

len(M1)=len(M2) ?

E() is indistinguishable under a chosen plaintext attack (IND-CPA, “semantically secure”) if no probabilistic polynomial time-bounded Mallory can succeed in finding x’, significantly better than guessing.

Page 14: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

14

Crypto: Semantic Security Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

Mallory Alice

M1M2

1

Es(Mx)2

x’3

x=x’ ?4

sOracle

MEs(M)

Page 15: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

15

Crypto: Semantic Security Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

• Deterministic + stateless = insecure !• Semantic security implies bit security !• RSA : not semantically secure ! Why ?!• RSA + padding (e.g., RSA-OAEP): ok

Page 16: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

16

Crypto: Forward Secrecy Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

Future compromise (e.g., of PK secrets) should not propagate backwards in time.

Page 17: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

17

Crypto: Performance Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

Modular MUL 1024: 273000/secRSA1024/2048 sign/s: 261/50RSA1024 verify/s: 5324/16003DES: 26MB/secPaillier1024 enc/dec:12/30 / sec

Illustrative baseline.approx. Pentium 4. 3.6GHz. 1GB RAM. 11000 MIPS. OpenSSL 0.9.7f

DES/CBC: 70MB/secRC4: 138MB/secMD5: 18-615MB/secSHA1: 18-340MB/sec

Page 18: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

18

Crypto: Merkle/Hash trees Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

H(.)

x1 x2 x3 x4 x5 x6 x7 x8

H(x1) H(x2) H(x3) H(x4) H(x5) H(x6) H(x7) H(x8)

H(.) H(.) H(.) H(.)

H(.) H(.)

trust this (store or authenticate) compare

Idea: no needto be binary

Idea: sign stuff(when ?)

Page 19: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

19

Crypto: Hash chains Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

x1

h1=H(x1|h0)

h0 x2

h2=H(x2|h1)

xi

hi=H(xi|hi-1)

Can we breakthe chain ?

trust these (store or authenticate)

Page 20: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

20

Overview Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

� Crypto Crash Course� Data Outsourcing� Query Correctness� Data Confidentiality� Access Privacy� Searching on Encrypted Data� Trusted Hardware

Page 21: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

21

Data Outsourcing Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

data serverdata client(s!)

encrypted

plaintext

OutsourcedData

Mallory Eve

“outsourcing”1

Online Q

uery Interface

Query Processor

Dataqueries

2

query results, assurances3

Query Pre/Post-

Processing

Data Pre-Processor

assurances ⊆⊆⊆⊆ {query correctness, data confidentiality, access privacy}

(un-trusted)

“owner”

Page 22: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

22

Outsourcing Challenges Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

Un-trusted server:• lazy: incentives to perform less • curious: incentives to acquire information• malicious:

• denial of service • incorrect results• possibly compromised

Why is this hard ?• how ?• arbitrary expressivity• overheads

• network• computational costs

What do we do ?• query assurances• full privacy

• of queries (even encrypted)• of access patterns

• data confidentiality

Page 23: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

23

Hacigumus (2002) Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

H. Hacigumus, B. R. Iyer, and S. Mehrotra. Providing database as a service, ICDE 2002.

Stored Data ConfidentialitySELECT decrypt(discount,key)FROM lineitemWHERE custid = 300

Page 24: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

24

Overview Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

� Crypto Crash Course� Data Outsourcing� Query Correctness� Data Confidentiality� Access Privacy� Searching on Encrypted Data� Trusted Hardware

Page 25: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

25

Correctness Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

Client requires quantifiable assurances that query results are correct, for arbitrary query types in the presence of a server that could be …

… lazy

… and/or fully malicious (!)

Page 26: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

26

Devanbu et. al. (2000) Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

The owner provides database updates and summary signatures to the un-trusted publisher. When users make inquiries with the publisher, they get responses which can be verified using a returned verification-object. Only skO is secret, pkO is authenticated.

Page 27: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

27

Devanbu et. al. (2000) Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

A Merkle tree, with a continuous sub-range q, with a least common ancestor LCA(q) , and upper and lower bounds. Note the verifiable hash path “l" from LCA(q) to the root, and the proximity sub-trees (thick lines) for the “near miss”tuples for LUB(q) and GLB(q) which show that q is complete.

authenticated via signature

Page 28: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

28

Devanbu et. al. (2000) Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

Supported claimed operations:• selections• projections

• (1) maintaining VOs before duplicate elimination• (2) pre-computing VOs for common projections

• equiJOIN• (1) keep materialized cartesian product S x R

• construct VO on sorted version of product (according to difference (S.A-R.A)) – this yields 3 types of leaf nodes (“0”,”<“,”>”) in Merkle tree

• (2) all kinds of other tricks• set operations

• union (client does it and verifies VOs for input sets)• intersection (?)• multi-dimensional range queries (generalizing hash tree to “multi-dimensional range tree”)

Page 29: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

29

Devanbu et. al. (2000) Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

Covering canonical roots (CCR): roots of the canonical sub-trees

precisely covering the leaves with values in the interval.

Page 30: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

30

Devanbu et. al. (2000) Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

SELECT S.A4 FROM S,RWHERE S.A1=R.A1 AND A2<10 AND A3>17

Page 31: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

31

Devanbu et. al. (2000) Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

Issues:• query expressiveness• query flexibility

• works only on data with VOs• “universe split” phenomenon

• use timestamps, expiration times• expensive operations (!)

Page 32: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

32

Mykletun et.al. (NDSS 2004) Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

Discusses the use of batch verification of signatures and similar techniques (condensed RSA) to authenticate results.

Page 33: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

33

Pang et. al. (ICDE 2004) Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

TrustedDB Client

UnsecuredEdge Server

TrustedCentral DBMS

Result+ VOQuery

DB +MHT

“edge computing”

Page 34: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

34

Pang et. al. (ICDE 2004) Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

Claimed problems with [Devanbu 2000]

• A hash tree is needed for every sort-order • VOs need to contain links all the way to the root,

• VOs grow linearly to query result and logarithmic to base table size

• Projections may have to be performed by clients• No provision for dynamic updates on the database

Aim 1: VO size just linear in query result Aim 2: do not push projections to client

Page 35: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

35

Pang et. al. (ICDE 2004) Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

Idea: use different hash function

• h(x) = gx mod q• h is commutative, h(x+y) = h(y+x)

• Digests can be combined arbitrarily• Projection can be performed at the edge servers• Facilitates insertion of new tuples with minimal effect on other digests

• but: significantly (1000-10000 times) slower• trade-off: computation vs. communication

Page 36: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

36

Pang et. al. (ICDE 2004) Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

Root

Query Result

Tuples

Da Db

Dc Dd

DN

Verification object = DN + DS

where DS = {Da, Db, Dc, Dd}

Verifying Selection(no need to go up to the root

as everything is also signed)

Root

Query Result

Tuples

DN

EnvelopingSubtree

Page 37: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

37

Pang et. al. (SIGMOD 2005) Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

Similar expressiveness. But …

Asks: what about access control rules ? (Devanbu seems to reveal too much: boundary tuples)

Also claims: lower overheads for queries and updates.

Introduces “precision” (only data matching the query should be returned)

Page 38: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

38

Pang et. al. (SIGMOD 2005) Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

Idea: use signature chains – thus no need to reveal boundary elements. sig(ri) = s(h(g(ri-1) | g(ri) | g(ri+1)))

s-1(sig(ri))? s-1(sig(ri+1))?

g(ri)g(ri-1) g(ri+1) g(ri+2)

ri ri+1ri-1…

Result Q

Server:

User:

… ri+2

Page 39: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

39

Pang et. al. (SIGMOD 2005) Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

s-1(sig(ra))? s-1(sig(ra+1))?

g(ra)g(ra-1) g(ra+1) g(rn)

ra ra+1 rn g(rn+1)h (ra-1)α-ra-1-1 …

Result Q

hashU - αtimes

Distributor:

User:

Query: α ≤ r

But what is g:g(r) = hU-r-1(r)

does not require ra-1

Page 40: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

40

Pang et. al. (SIGMOD 2005) Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

RelationalQuery: α ≤ K ≤ βResult: {| ra, ra+1,…, rb |}

g(ra-1)

MerkleTree

h(ra-1.A)

h(ra-1.A1) h(ra-1.AR)

.:

Record ra-1: [ K A1 A2 … AR]

h (ra-1.K)U-ra-1.K-1

h (r.K)ra-1.K-L-1

h (ra-1.K)α-ra-1.K-1

hashU - αtimes

g(ra) g(ra+1)

s-1(sig(ra))?

Page 41: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

41

Sion (VLDB 2005) Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

P. Golle and I. Mironov,”Uncheatable Distributed Computations”, RSA 2001 (Cryptographer's track)

a1,…,an1

f(a1),…,f(an)2

b1,…,bx,…,bnf(bx)1

f(b1),…,f(bn) x’ 2x’=x ?3

a1,…,an,f()

f(ai)=?f()

AliceBob

Asks: What about arbitrary queries ?

Page 42: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

42

Sion: Execution Proofs Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

A challenge token (computed by client) is sent together with thebatch of queries. Upon return, batch execution is proved if x=x’.

data serverdata client

encrypted

plaintext

OutsourcedData

“outsourcing”1

Online Q

uery Interface

Query Processor

Dataqueries

2

query results, C()3

Query Pre/Post-

Processing

Data Pre-Processor

(un-trusted)

“owner”

Page 43: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

43

Sion: Cheating Probability Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

Only handles lazy server !

Page 44: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

44

Overview Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

� Crypto Crash Course� Data Outsourcing� Query Correctness� Data Confidentiality� Access Privacy� Searching on Encrypted Data� Trusted Hardware

Page 45: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

45

Hacigumus (SIGMOD 2002) Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

Page 46: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

46

Hacigumus (SIGMOD 2002) Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

Main Steps:1. Partition sensitive domains

• Order preserving: supports comparison• Random: query rewriting becomes hard

2. Rewrite queries to target partitions3. Execute queries and return results4. Prune/post-process results on client

Page 47: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

47

Hacigumus (SIGMOD 2002) Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

SELECT emp.name FROM empWHERE emp.salary > (SELECT AVG(salary) FROM emp WHERE did=1)

Page 48: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

48

Hacigumus (SIGMOD 2002) Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

client

client

server

server

Client pruningcould be expensive

Page 49: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

49

Hacigumus (SIGMOD 2002) Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

Confidentiality-Overhead Trade-off

Larger segments ==increased privacy ==

increased overheads

Page 50: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

50

Hore (VLDB 2004) Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

Goal: For a uniform distribution of queries - minimize any leaks to any adversaries (even) knowing segmentation parameters.

Idea 1: Maximize variance of distribution of values in segmentIdea 2: Increase segment entropy

Issue: What about performance ?

Page 51: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

51

Hore (VLDB 2004) Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

Solution: “Controlled Diffusion”

Idea: 1. design for efficiency, then …2. … diffuse (re-distribute) elements

inside the segments to increase per-segment entropy and variance

Page 52: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

52

Hacigumus (DASFAA 2005) Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

Asks: Similarly, how to structure query trees to optimally balance the security-efficiency trade-off in [Hacigumus 2002].

Idea: client generates optimal partitioned query execution plans given statistics and metadata input from the server.

Page 53: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

53

Tingjian and Zdonik (2007) Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

Issue:speed ? Paillier operates in n2 !!!Specifically:

For n = 1024 bitsFinal decryption: speed << 50 tuples/secHomomorphism: 50M records = 12 days !

Page 54: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

54

Overview Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

� Crypto Crash Course� Data Outsourcing� Query Correctness� Data Confidentiality� Access Privacy� Searching on Encrypted Data� Trusted Hardware

Page 55: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

55

QR PIR Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

x

x

x

x

x

x

x

i

1

2

3

n

n-1

n-2

QRi-1

QNR

QRi+1

QR1

QR2

QR3

QRn

QRn-2

QRn-1

client server

bit string d[n]

Question d[i] =?

.

...

.

.

v[i]1

Π(v[i]*d[i])2

Π(v[i]*d[i]) = QNR ?3

yes

d[i] =1

n

x

xx

x x

x

x

n

Π1 ΠΠΠΠ2 Π3...

Perform same protocol per column and look at returned product of interest

escape O(n) costs

Page 56: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

56

QR PIR Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

Page 57: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

57

PIR is (still) impractical Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

Page 58: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

58

Overview Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

� Crypto Crash Course� Data Outsourcing� Query Correctness� Data Confidentiality� Access Privacy� Searching on Encrypted Data� Trusted Hardware

Page 59: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

59

Search on Encrypted Data Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

• Sequential Scan• Index-based

Page 60: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

60

Song (2000) Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

Wi

m bits

Li

n bits

Li ← Gi (seed),

⊕ Ci

m bits

Ri

m-n bits

Ri ← FK ( Li )

Encryption :

Page 61: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

61

Song (2000) Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

Decryption :

m bits

n bits

⊕m-n bits

m bitsWi

L i Ri

Ci

n bits m-n bits

Ci,L Ci,R

Li ← Gi (seed), Ri ← FK ( Li )

L i Ri

Wi

Page 62: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

62

Song (2000) Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

Search :

Check: Ri' = FK ( Li

' ) ?Yes ⇒⇒⇒⇒ match ,

( false positive rate = 1 / 2m-n )

m bits

n bits

⊕m-n bits

m bitsWi

L i Ri

Ci

W⊕⊕⊕⊕

L i' Ri

'

n bits m-n bits

provided by client

Page 63: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

63

Song (2000) Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

“Hidden” Search :

Li

n bits

Li ← Gi (seed),

⊕ Ci

m bits

Ri

m-n bits

Ri ← FKi( Li )

Wi

m bits

E(.)

E1(Wi) E2(Wi)

where Ki = F'K( E1( Wi ))

providedby client

Page 64: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

64

Chang (2004) Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

Page 65: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

65

Chang (2004) Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

server-hosted

Page 66: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

66

Chang (2004) Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

Page 67: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

67

Chang (2004) Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

Page 68: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

68

Chang (2004) Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

Page 69: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

69

Golle (2004) Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

Server stores capabilities for conjunctive queries (linear in the total number of documents). These can be transferred offline.

The client is required to know before-hand future conjunctive queries.

Query part is sent online at the time of search. It is of constant size (number of keyword fields per documents).

Page 70: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

70

Sion (2005) Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

document serverdata client

k1

k2

k3 x

xx

d’4d’3d’2d’1

k4 x

C~

x

x

x

k1: (d1+x)(d3+x) mod p

k2: (d2+x)(d3+x) mod p

k1

k2

xx

d’4d’3d’2d’1C~

x

k1

k2

xx

d4d3d2d1C

xx

d1: k1

d2: k2

d3: k1 k2

d4: k3 k4

query: {k1 ,k2}1

F-1

4

retrieve: d3

6

qnr 1,qr2, qr3,…, qrk

2

qr’1,qnr’ 2, qr’3,... , qr’k

v’1,... ,v’n

compute vi values3

v1,... ,vn

5

verifychecksums

Idea: Deploy modified version of computational PIR targeted at aserver-side index. Augment with “multiplicative checksums”.

Computational Privacy

QueryCorrectness

Asks: What about correctness + privacy ?

Page 71: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

71

Overview Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

� Crypto Crash Course� Data Outsourcing� Query Correctness� Data Confidentiality� Access Privacy� Searching on Encrypted Data� Trusted Hardware

Page 72: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

72

Trusted Hardware Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

IBM 47xx

Page 73: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

73

IBM 4764 Architecture Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

Page 74: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

74

IBM 4764 Architecture Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

Page 75: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

75

Trust Propagation Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

Page 76: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

76

SCPU Performance Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

RSA1024 Sign: 848/secRSA1024 Verify: 1157/sec3DES: 1-8MB/secDES: 1-8MB/secSHA1: 1-21MB/sec

IBM 4764-001: 266MHz PowerPC. 64KB battery-backed SRAM storage. Crypto hardware engines: AES256, DES, TDES, DSS, SHA-1, MD5, RSA. FIPS 140-2 Level 4 certified.

Page 77: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

77

Possible Benefits Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

data management server

Server Storage

OutsourcedData

(encrypted)

Host CPUdata client

secure

insert/update

arbitrary

private query

encrypted query

response

SecureMemory

Secure Co-Processor

A secure co-processor on the data management side may allow for significant

leaps in expressivity for queries where privacy and completeness assurance are important.

encrypted item

Page 78: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

78

Searching Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

document server

Server Storage

OutsourcedDocuments(encrypted)

Host CPUdata client

conjunctive keyword

search query

encrypted query

response

SecureMemory

Secure Co-Processor

For conjunctive keyword searches on document (email, files) servers, oblivious search index

structures could be queried in secure memory achieving a novel zero-leak query model.

search index

secure

insert/remove

update index

Page 79: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

79

Hash-JOIN Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

database server

Server Storage

OutsourcedRelations

(encrypted)

Host CPUdata client

P x Q

private query

encrypted query

response

SecureMemory

Secure Co-Processor

Hash-JOIN could be naturally accommodated.

P

Q

HP

Page 80: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

80

Merge-JOIN Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

database server

Server Storage

OutsourcedRelations

(encrypted)

Host CPUdata client

P x Q

private query

encrypted query

response

SecureMemory

Secure Co-Processor

For Merge-JOIN, order-preserving encryption primitives could be deployed to minimize the amount

of data parsing required in the sorting phase.

P Q

Page 81: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

81

Sample DON’T Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

database server

Host CPUdata

client

queriesSecure Co-Processor

Server Storage

OutsourcedData

“client-server”interaction

“client proxy”

crypto work

database server

Host CPUdata

client

queries

Server Storage

OutsourcedData

client/serverinteraction

crypto work

crypto work

good idea ?not so sure !

Page 82: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

82

Other DON’Ts Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

• Process entire queries on SCPU (!)

• Dedicate (one) SCPU per query or equivalent• e.g., limit TPS by SCPU TPS

• Synchronize CPU with SCPU• e.g., block main CPU until SCPU completes

• Transfer >= O(n) on SCPU-CPU bus (!)

• Anything else un-smart ☺

Page 83: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

83

Bouganim (VLDB 2002) Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

Database Server

DBMSClient Secured communications

Encryption

Decryption

usurpationInsider

IntruderAdministrator

Encrypted Database

Database Server

Client EncryptionDecryption

DBMSSecured communications

Encrypted Database

Page 84: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

84

Bouganim (VLDB 2002) Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

Client C1

Client C2

Secured Operating Environment

C-SDA

C-SDA

DBMSClient C1

Client C2

Encrypteddatabase

Chip-Secured Data Access :

Smartcard: 32 bit RISC processor (≈ 40Mips), limited communication bandwidth (10 to100Kbps), tiny RAM, writes in EEPROM very costly.

Page 85: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

85

Bouganim (VLDB 2002) Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

C-SDAEncrypted Database

zrzerzarevgzdSdetgerFffezarevgzddedefzszdzzesdeefazdsd

badHongKong

Joe19goodHong

KongJim22

TypeCitynameIdDECRYPT

ACCESS RIGHTS TRANSF°

Select * from lqskdqswhere sdeef = "zarevgzd"

DBMS

Select * from Customerswhere City = ‘Hong Kong’

Equi-predicate-only Queries :

Page 86: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

86

Bouganim (VLDB 2002) Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

General queries :

C-SDA

1200Sum

Select sum(amount) from orders whereCustId = 22

ACCESS RIGHTS

TRANSF°

DECRYPTCOMPUTE

Select ygefh from iuzgswhere lpaszj ="euys"

kdleoretz

ygefh

Encrypted Database

DBMS

Page 87: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

87

Tsudik (2005) Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

Execute queries inside

Page 88: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

88

Conclusions Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

Practical maturity: in infancy, barely crawling. Very hard problems remain to be tackled:

• operators with integrated assurances• confidentiality• privacy of access• correctness

• scalable protocols for secure hardware• massive data• good utilization of host CPUs

• areas• relational data• file systems• streaming data

Page 89: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

89

/bin/yes > /dev/lunchtime Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

Thank you !

Page 90: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

90

refs: search Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano. Public key encryption with keyword search. In Proceedings of Eurocrypt 2004, pages 506–522. LNCS 3027, 2004.

R. Brinkman, J. Doumen, and W. Jonker. Using secret sharing for searching in encrypted data. In Secure Data Management, 2004.

Y. Chang and M. Mitzenmacher. Privacy preserving keyword searches on remote encrypted data. Cryptology ePrint Archive, Report 2004/051, 2004. http://eprint.iacr.org/.

E. Goh. Secure indexes. Cryptology ePrint Archive, Report 2003/216, 2003. http://eprint.iacr.org/2003/216/.

P. Golle, J. Staddon, and B. Waters. Secure conjunctive keyword search over encrypted data. In Proceedings of ACNS, pages 31–45. Springer-Verlag; Lecture Notes in Computer Science 3089, 2004.

D. Xiaodong Song, D. Wagner, and A. Perrig. Practical techniques for searches on encrypted data. In SP ’00: Proceedings of the 2000 IEEE Symposium on Security and Privacy (S&P 2000). IEEE Computer Society, 2000.

Page 91: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

91

refs: correctness Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

Premkumar T. Devanbu, Michael Gertz, Chip Martel, and Stuart G. Stubblebine. Authentic third-party data publication. In IFIP Workshop on Database Security, pages 101–112, 2000, also in Journal of Computer Security, Vol. 11, No. 3, pages 291-314, 2003.

W. Du and M. J. Atallah. Protocols for secure remote database access with approximate matching. In Proceedings of the 1st ACM Workshop on Security and Privacy in E-Commerce, 2000.

H. Hacigumus, B. R. Iyer, and S. Mehrotra. Providing database as a service. In IEEE International Conference on Data Engineering (ICDE), 2002.

HweeHwa Pang and Arpit Jain and Krithi Ramamritham and Kian-Lee Tan. Verifying Completeness of Relational Query Results in Data Publishing. In Proceedings of ACM SIGMOD, 2005.

J. Li, M. Krohn, D. Mazi`eres, and D. Shasha. Secure Untrusted Data Repository (SUNDR). In Proceedings of the 6th Symposium on Operating Systems Design and Implementation (OSDI 2004), pages 121–136, San Francisco, CA, December 2004. ACM SIGOPS.

Maithili Narasimha and Gene Tsudik. Authentication of Outsourced Databases using Signature Aggregation and Chaining. In Proceedings of DASFAA, 2006.

Charles Martel, Glen Nuckolls, Premkumar Devanbu, Michael Gertz, April Kwong, and Stuart G. Stubblebine. A general model for authenticated data structures. Algorithmica, 39(1):21–41, 2004.

E. Mykletun, M. Narasimha, and G. Tsudik. Authentication and integrity in outsourced databases. In ISOC Symposium on Network and Distributed Systems Security NDSS, 2004.

Cheng, W., Pang, H., and Tan, K., Authenticating multi-dimensional query results in data publishing. In IFIP Workshop on Database Security (DBSec) 2006.

Narasimha, M. and Tsudik, G., DSAC: Integrity of outsourced databases with signature aggregation and chaining. In Proc. of Conference on Information andKnowledge Management (CIKM) 2005

HweeHwa Pang and Kian-Lee Tan. Authenticating query results in edge computing. In ICDE ’04: Proceedings of the 20th International Conference on Data Engineering, page 560, Washington, DC, USA, 2004. IEEE Computer Society.

Radu Sion. Query execution assurance for outsourced databases. In Proceedings of the Very Large Databases Conference VLDB, 2005.

F. Li, M. Hadjieleftheriou, G. Kollios, L. Reyzin, “Dynamic authenticated index structures for outsourced databases “, SIGMOD 2006

A. Buldas, M. Roos, and J. Willemson. Undeniable replies for database queries. In Proceedings of the Fifth International Baltic Conference on DB and IS, volume 2, pages 215-226, 2002.

Page 92: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

92

refs: confidentiality Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

H. Hacigumus, B. Iyer, C. Li, and S. Mehrotra. Executing SQL over encrypted data in the database service-provider model. In Proceedings of the ACM SIGMOD international conference on Management of data, pages 216–227. ACM Press, 2002.

Elovici, Y., Shmueli, E., Waisenberg, R.W., Gudes, E.: A structure preserving database encryption scheme. In Workshop on Secure Data Management in a Connected World (SDM'04)

B. Hore, S. Mehrotra, and G. Tsudik. A privacy-preserving index for range queries. In Proceedings of VLDB 2004.

Nan Zhang and Wei Zhao, Distributed Privacy Preserving Information Sharing. In Proceedings of the International Conference on Very Large Databases VLDB 2005.

Tran Khanh Dang, Privacy-Preserving Search and Updates for Outsourced Tree-Structured Data on Untrusted Servers, Springer LNCS 3477/2005, pages 338-354

Hakan Hacigumus, Bala Iyer, Sharad Mehrotra, Query Optimization in Encrypted Database Systems, DASFAA 2005

Hakan Hacigumus, Bala Iyer, Sharad Mehrotra, Efficient Execution of Aggregation Queries over Encrypted Relational Databases, DASFAA 2004

Hakan Hacigumus, Sharad Mehrotra, Williams Jonker, Milan Petkovic, Efficient key updates in encrypted database systems, SDM 2005

Hakan Hacigümüs, Bala Iyer, Sharad Mehrotra, Ensuring the Integrity of Encrypted Databases in the Database-as-a-Service Model. DBSEC 2003

Hakan Hacigümüs, Bala Iyer, Sharad Mehrotra, Encrypted Database Integrity in Database Service Provider Model. Certification and Security in E-Services 2002

Page 93: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

93

refs: service providers Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

Activehost.com Internet Services. Online at http://www.activehost.com.

Adhost.com MySQL Hosting. Online at http://www.adhost.com.

Alentus.com Database Hosting. Online at http://www.alentus.com.

Datapipe.com Managed Hosting Services. Online at http://www.datapipe.com.

Discountasp.net Microsoft SQL Hosting. Online at http://www.discountasp.net.

Gate.com Database Hosting Services. Online at http://www.gate.com.

Hostchart.com Web Hosting Resource Center. Online at http://www.hostchart.com.

Hostdepartment.com MySQL Database Hosting. Online at http://www.hostdepartment.com/mysqlwebhosting/.

IBM Data Center Outsourcing Services. Online at http://www-1.ibm.com/services/.

IBM Data Encryption for DB2. Online at http://www.ibm.com/software/data/db2.

Inetu.net Managed Database Hosting. Online at http://www.inetu.net.

Mercurytechnology.com Managed Services for Oracle Systems. Online at http://www.mercurytechnology.com.

Neospire.net Managed Hosting for Corporate E-business. Online at http://www.neospire.net.

Netnation.com Microsoft SQL Hosting. Online at http://www.netnation.com.

Opendb.com Web Database Hosting. Online at http://www.opendb.com.

Page 94: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

94

refs: secure hardware Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

Bouganim L., Pucheral P., "Chip-Secured Data Access: Confidential Data on Untrusted Servers", Int. Conf. on Very Large Data Bases VLDB 2002.

Ernesto Damiani, S.De Capitani di Vimercati, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati, “Balancing Confidentiality and Efficiency in Untrusted Relation DBMS”, ACM CCS 2003

E. Mykletun and G. Tsudik, On using Secure Hardware in Outsourced Databases, International Workshop on Innovative Architecture for Future Generation High Performance Processors and Systems IWIA 2005.

IBM 4764 PCI-X Cryptographic Coprocessor (PCIXCC). Online at http://www-03.ibm.com/security/cryptocards/pcixcc/overview.shtml.

B. Bhattacharjee, N. Abe, K. Goldman, B. Zadrozny, V. Reddy, M. del Carpio, C. Apte,"Using secure coprocessors for privacy preserving collaborative data mining and analysis", Second ACM International Workshop on Data Management On New Hardware (DAMON) 2006

Kenneth Goldman, Enriquillo Valdez: “Matchbox: Secure Data Sharing”, IEEE Internet Computing 2004

“Practical server privacy with secure coprocessors”, IBM Systems Journal 2001, S. W. Smith, D. Safford

J. Marchesini, S.W. Smith, “SHEMP: Secure Hardware Enhanced MyProxy”, Technical Report TR2005-532, Department of Computer Science, Dartmouth College, February 2005.

A. Iliev, S.W. Smith, "Protecting Client Privacy with Trusted Computing at the Server", IEEE Security and Privacy, March/April 2005

A. Iliev, S.W. Smith, "Private Information Storage with Logarithmic-space Secure Hardware.", 3rd Working Conference on Privacy and Anonymity in Networked and Distributed Systems.

A. Iliev, S.W. Smith, "Prototyping an Armored Data Vault: Rights Management on Big Brother's Computer.", Privacy-Enhancing Technology 2002

E. Mykletun and G. Tsudik, “On using Secure Hardware in Outsourced Databases”, International Workshop on Innovative Architecture for Future Generation High-Performance Processors and Systems, January 2005

Maheshwari, Vingralek, and Shapiro, How to build a trusted database system on untrusted storage, OSDI 2000

Page 95: Secure Data Outsourcing · 6 Crypto: Randomness Stony Brook Network Security and Applied Cryptography Lab Secure Data Outsourcing (VLDB, September 2007) Cryptographically random numbers

95

refs: PIR & misc Stony Brook Network Security and Applied Cryptograp hy Lab

Secure Data Outsourcing (VLDB, September 2007)

E. Kushilevitz and R. Ostrovsky, “Replication is not needed: single database, computationally-private information retrieval”, FOCS 1997

Radu Sion and Bogdan Carbunar, On the Practicality of Private Information Retrieval, NDSS 2006

William Gasarch, A WebPage on Private Information Retrieval, http://www.cs.umd.edu/~gasarch/pir/pir.html

Josep Domingo-Ferrer, Ricardo X. Sanchez del Castillo, An Implementable Scheme for Secure Delegation of Computing and Data, 1st International Information and Communications Security Conference ICICS 1997