Bucketization Techniques for Encrypted Databases: Quantifying the Impact of Query Distributions

Bibliographic Details
Main Author: Raybourn, Tracey
Language:English
Published: Bowling Green State University / OhioLINK 2013
Subjects:
Online Access:http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1363638271
id ndltd-OhioLink-oai-etd.ohiolink.edu-bgsu1363638271
record_format oai_dc
spelling ndltd-OhioLink-oai-etd.ohiolink.edu-bgsu13636382712021-08-03T05:21:10Z Bucketization Techniques for Encrypted Databases: Quantifying the Impact of Query Distributions Raybourn, Tracey Computer Science Database security Query Distributions Database Bucketization Data Privacy An ongoing problem in Database As a Service (DAS) is how to increase the efficiency of retrieving encrypted data from remote untrusted servers without compromising security. Bucketization is a privacy preserving technique for executing SQL queries over encrypted data on a DAS server. Bucketization partitions encrypted attributes into queryable tables (buckets), thereby disguising which records are requested. While a number of bucketization techniques are optimized for uniform query access, many Internet and private network access patterns reflect a non-uniform or Zipf-like trend. If query access is non-uniform, existing techniques may be subject to substantial performance degradation. In order to evaluate that possibility, this thesis presents new bucketization technique, Query Sensitive Bucketization (QSB), that capitalizes on the probability distribution of non-uniform queries. Two existing uniform bucketization techniques were implemented to (1) evaluate their performance when the distribution of queries is non-uniform, and (2) evaluate their performance relative to QSB. Among the measures used for performance analysis, a new security metric is presented, which quantifies the risk of an adversary estimating the true value distribution of an encrypted data store. Unlike existing security metrics, the new metric expresses information disclosed by the pattern of query access over an encrypted bucket set. Results showed that QSB improves query efficiency over uniform techniques, while maintaining a high level of data security. QSB is not only an efficient example of query-based bucketization for DAS, but a conceptual model for future research, in which data are organized to accommodate a variety of query access patterns, thereby improving query efficiency and database security. 2013-05-06 English text Bowling Green State University / OhioLINK http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1363638271 http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1363638271 unrestricted This thesis or dissertation is protected by copyright: all rights reserved. It may not be copied or redistributed beyond the terms of applicable copyright laws.
collection NDLTD
language English
sources NDLTD
topic Computer Science
Database security
Query Distributions
Database Bucketization
Data Privacy
spellingShingle Computer Science
Database security
Query Distributions
Database Bucketization
Data Privacy
Raybourn, Tracey
Bucketization Techniques for Encrypted Databases: Quantifying the Impact of Query Distributions
author Raybourn, Tracey
author_facet Raybourn, Tracey
author_sort Raybourn, Tracey
title Bucketization Techniques for Encrypted Databases: Quantifying the Impact of Query Distributions
title_short Bucketization Techniques for Encrypted Databases: Quantifying the Impact of Query Distributions
title_full Bucketization Techniques for Encrypted Databases: Quantifying the Impact of Query Distributions
title_fullStr Bucketization Techniques for Encrypted Databases: Quantifying the Impact of Query Distributions
title_full_unstemmed Bucketization Techniques for Encrypted Databases: Quantifying the Impact of Query Distributions
title_sort bucketization techniques for encrypted databases: quantifying the impact of query distributions
publisher Bowling Green State University / OhioLINK
publishDate 2013
url http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1363638271
work_keys_str_mv AT raybourntracey bucketizationtechniquesforencrypteddatabasesquantifyingtheimpactofquerydistributions
_version_ 1719418553547882496