Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Issue title: DBSEC 2009
Guest editors: Jaideep VaidyaGuest Editor and Ehud GudesGuest Editor
Article type: Research Article
Authors: Ciriani, Valentinaa | De Capitani di Vimercati, Sabrinaa | Foresti, Saraa | Jajodia, Sushilb | Paraboschi, Stefanoc | Samarati, Pierangelaa; **
Affiliations: [a] DTI, Università degli Studi di Milano, Crema, Italy. E-mail: [email protected] | [b] CSIS, George Mason University, Fairfax, VA, USA. E-mail: [email protected] | [c] DIIMM, Università degli Studi di Bergamo, Dalmine, Italy. E-mail: [email protected]
Correspondence: [**] Corresponding author: Pierangela Samarati, DTI, Università degli Studi di Milano, Via Bramante 65, 26013 Crema, Italy. Tel.: +39 0373 898 061; Fax: +39 0373 898 010; E-mail: [email protected].
Note: [*] A preliminary version of this paper appeared under the title “Enforcing confidentiality constraints on sensitive databases with lightweight trusted clients” in: Proc. of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec 2009), Montreal, Canada, July 12–15, 2009 [12] and under the title “Keep a few: Outsourcing data while maintaining confidentiality” in: Proc. of the 14th European Symposium On Research In Computer Security (ESORICS 2009), Saint Malo, France, September 21–25, 2009 [13].
Abstract: Existing approaches for protecting sensitive information outsourced at external “honest-but-curious” servers are typically based on an overlying layer of encryption applied to the whole database, or on the combined use of fragmentation and encryption. In this paper, we put forward a novel paradigm for preserving privacy in data outsourcing, which departs from encryption. The basic idea is to involve the owner in storing a limited portion of the data, while storing the remaining information in the clear at the external server. We analyze the problem of computing a fragmentation that minimizes the owner's workload, which is represented using different metrics and corresponding weight functions, and prove that this minimization problem is NP-hard. We then introduce the definition of locally minimal fragmentation that is used to efficiently compute a fragmentation via a heuristic algorithm. The algorithm translates the problem of finding a locally minimal fragmentation in terms of a hypergraph 2-coloring problem. Finally, we illustrate the execution of queries on fragments and provide experimental results comparing the fragmentations returned by our heuristics with respect to optimal fragmentations. The experiments show that the heuristics guarantees a low computation cost and is able to compute a fragmentation close to optimum.
Keywords: Privacy, confidentiality constraints, fragmentation, outsourcing
DOI: 10.3233/JCS-2011-0422
Journal: Journal of Computer Security, vol. 19, no. 3, pp. 531-566, 2011
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]