Securus: From Confidentiality and Access Requirements to Data Outsourcing Solutions

Abstract : To preserve data confidentiality in database outsourcing scenarios, various techniques have been proposed that preserve a certain degree of confidentiality while still allowing to efficiently execute certain queries. Typically, several of those techniques have to be combined to achieve a certain degree of confidentiality. However, finding an appropriate combination is not a trivial task, as expert knowledge is required and interdependencies between the techniques exist. Securus, an approach we previously proposed, addresses this problem. Securus allows users to model their requirements regarding the information in the outsourced dataset that has to be protected. Furthermore, queries that have to be efficiently executable on the outsourced data can be specified. Based on these requirements, Securus uses Integer Linear Programming (ILP) to find a suitable combination of confidentiality enhancing techniques and generates a software adapter. This software adapter transparently applies the techniques to fulfill the specified requirements and can be used to seamlessly outsource and query the data. In this paper, we present an outline of Securus and extend our previous work by highlighting the differences to other approaches in the field. Furthermore, we show how Securus can be extended to allow for more efficient solutions if the attacker’s capabilities can be modeled by the user.
Document type :
Book sections
Marit Hansen; Jaap-Henk Hoepman; Ronald Leenes; Diane Whitehouse. Privacy and Identity Management for Emerging Services and Technologies : 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected Papers, AICT-421, Springer, pp.139-149, 2014, IFIP Advances in Information and Communication Technology (TUTORIAL), 978-3-642-55136-9. 〈10.1007/978-3-642-55137-6_11〉
Liste complète des métadonnées

Cited literature [19 references]  Display  Hide  Download

https://hal.archives-ouvertes.fr/hal-01276067
Contributor : Hal Ifip <>
Submitted on : Thursday, February 18, 2016 - 4:40:45 PM
Last modification on : Monday, March 7, 2016 - 1:10:22 PM
Document(s) archivé(s) le : Thursday, May 19, 2016 - 11:08:40 AM

File

978-3-642-55137-6_11_Chapter.p...
Files produced by the author(s)

Licence


Distributed under a Creative Commons Attribution 4.0 International License

Identifiers

Citation

Jens Köhler, Konrad Jünemann. Securus: From Confidentiality and Access Requirements to Data Outsourcing Solutions. Marit Hansen; Jaap-Henk Hoepman; Ronald Leenes; Diane Whitehouse. Privacy and Identity Management for Emerging Services and Technologies : 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected Papers, AICT-421, Springer, pp.139-149, 2014, IFIP Advances in Information and Communication Technology (TUTORIAL), 978-3-642-55136-9. 〈10.1007/978-3-642-55137-6_11〉. 〈hal-01276067〉

Share

Metrics

Record views

72

Files downloads

18