Database Access Pattern Protection Without Full-shuffles
Privacy protection is one of the fundamental security requirements for database outsourcing. A major threat is information leakage from database access patterns generated by query executions. The standard private information retrieval (PIR) schemes, which are widely regarded as theoretical solutions, entail O(n) computational overhead per query for a database with items. Recent works propose to protect access patterns by introducing a trusted component with constant storage size. The resulting privacy assurance is as strong as PIR, though with O(1) online computation cost, they still have O(n) amortized cost per query due to periodically full database shuffles. In this paper, we design a novel scheme in the same model with provable security, which only shuffles a portion of the database. The amortized server computational complexity is reduced to With a secure storage storing thousands of items, our scheme can protect the access pattern privacy of databases of billions of entries, at a lower cost than those using ORAM-based poly-logarithm algorithms.
Database, data privacy, information security.
Information Security and Trust
IEEE Transactions on Information Forensics and Security
DING, Xuhua; YANG, Yanjiang; and DENG, Robert H..
Database Access Pattern Protection Without Full-shuffles. (2011). IEEE Transactions on Information Forensics and Security. 6, (1), 189-201. Research Collection School Of Information Systems.
Available at: http://ink.library.smu.edu.sg/sis_research/1362
This document is currently not available here.