• Login
    View Item 
    •   SMARTech Home
    • Institute for Information Security & Privacy (IISP)
    • Institute for Information Security & Privacy Cybersecurity Lecture Series
    • View Item
    •   SMARTech Home
    • Institute for Information Security & Privacy (IISP)
    • Institute for Information Security & Privacy Cybersecurity Lecture Series
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Secure Data Outsourcing: Access Pattern Confidentiality in Outsourced Databases

    Thumbnail
    View/Open
    degitz.mp4 (432.4Mb)
    degitz_videostream.html (962bytes)
    Date
    2017-01-13
    Author
    Degitz, Alexander
    Metadata
    Show full item record
    Abstract
    When sensitive data is outsourced to an untrustworthy cloud storage provider, encryption techniques can be used to enforce data confidentiality. Ideally, such encryption techniques should not only enforce the confidentiality of data at rest but also the confidentiality of data accesses, as database access patterns can leak parts of the database's contents. Encryption techniques like Oblivious RAM (ORAM) or dynamically shuffled B-trees were proposed to hide access patterns, but are computationally expensive and create a large overhead of network traffic. Furthermore, they currently support a very limited set of database search operations. In this talk, I will give an overview of current protocols for secure data outsourcing like shuffled B-tree and Oblivious RAM approaches, and I will introduce our proposed protocols SECURUS and PATCONFDB. SECURUS is a protocol that optimizes the query times on encrypted index structures for database outsourcing based on the security needs of users by using the optimal encryption technique (deterministic, order-preserving, homomorphic, etc…) and outsourcing technique (data partitioning, index separation, etc…) for every index. PATCONFDB is a protocol for database outsourcing that obfuscates access patterns to the database through the use of ORAM approaches. It provides fast range and prefix selections for databases while being agnostic to the type of underlying ORAM approach.
    URI
    http://hdl.handle.net/1853/56405
    Collections
    • Institute for Information Security & Privacy Cybersecurity Lecture Series [122]

    Browse

    All of SMARTechCommunities & CollectionsDatesAuthorsTitlesSubjectsTypesThis CollectionDatesAuthorsTitlesSubjectsTypes

    My SMARTech

    Login

    Statistics

    View Usage StatisticsView Google Analytics Statistics
    facebook instagram twitter youtube
    • My Account
    • Contact us
    • Directory
    • Campus Map
    • Support/Give
    • Library Accessibility
      • About SMARTech
      • SMARTech Terms of Use
    Georgia Tech Library266 4th Street NW, Atlanta, GA 30332
    404.894.4500
    • Emergency Information
    • Legal and Privacy Information
    • Human Trafficking Notice
    • Accessibility
    • Accountability
    • Accreditation
    • Employment
    © 2020 Georgia Institute of Technology