DocumentCode :
651707
Title :
Analysis of heuristic based access pattern obfuscation
Author :
Ulusoy, Huseyin ; Kantarcioglu, Murat ; Thuraisingham, Bhavani ; Cankaya, Ebru Celikel ; Pattuk, Erman
Author_Institution :
Univ. of Texas at Dallas, Dallas, TX, USA
fYear :
2013
fDate :
20-23 Oct. 2013
Firstpage :
537
Lastpage :
544
Abstract :
As cloud computing becomes popular, the security and privacy issues emerge as important hindrances to more widespread adoption of cloud computing. In particular, outsourcing sensitive data to untrusted cloud service providers creates important security and regulatory compliance challenges. Encryption of the outsourced data has been introduced as an alternative to protect privacy and security. In the context of searchable symmetric encryption, many solutions have been proposed to perform efficient search on the encrypted outsourced data. Some of them achieve protecting privacy of outsourced data, but may disclose the access patterns (i.e., they disclose which data items are retrieved based on the query execution). Recently, it has been shown that such access pattern disclosures could be exploited even further to infer sensitive information about underlying data, even if the data is stored in encrypted form. To address the access pattern disclosures, oblivious RAM and heuristic based techniques are proposed. However, the overhead of oblivious RAM based solutions is too high in many cases, and the security and scalability of heuristic based techniques have not been carefully analyzed yet. In this paper, we provide the first framework to analyze and compare the security and efficiency of such heuristics (e.g., caching, fake data access, and data duplication). In addition, we provide extensive empirical analysis that yields important insights into how to use such heuristics effectively in practice; and we discuss how such heuristics can be combined to improve security and efficiency.
Keywords :
cloud computing; cryptography; data privacy; security of data; RAM; access pattern disclosures; cloud computing; data privacy; data security; heuristic based access pattern obfuscation; heuristic based techniques; outsourced data encryption; searchable symmetric encryption; sensitive data outsourcing; untrusted cloud service providers; Cloud computing; Encryption; Indexes; Protocols; Random access memory;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Collaborative Computing: Networking, Applications and Worksharing (Collaboratecom), 2013 9th International Conference Conference on
Conference_Location :
Austin, TX
Type :
conf
Filename :
6680022
Link To Document :
بازگشت