13,981 research outputs found
Towards More Secure Constructions of Adjustable Join Schemes
An adjustable join (\nadjoin) scheme [Popa-Zeldovich 2012] is a symmetric-key primitive that enables a user to securely outsource his database to a server, and later to issue join queries for a pair of columns. When queries are extended to a list of columns, \tp security of Adjoin schemes [Mironov-Segev-Shahaf 2017] does not capture the expected security. To address this deficiency, we introduce the syntax and security notion of multi-adjustable join (\nmadjoin) schemes. We propose a new security notion for this purpose, which we refer to as \mtp. The \tp security of \nadjoin extends to the \mtp security of \nmadjoin in a straightforward way. The gap between \tp and \mtp is filled with a sequence \{\smtpk{k}\}_{k\in\mathbb{N}} of security definitions where \smtpk{1} and \smtpk{\infty}, respectively, correspond to \tp and \mtp. We propose constructions for achieving both \mtp and \smtpk{k} security levels. Our \mtp-secure scheme joins columns, each containing elements, in time . Our \smtpk{k}-secure scheme uses ideas from secret sharing in its construction and does the job in time with some leakage that we refer to as -monotonous. It remains open if this barrier is inherent to the security definitions. Our schemes are substantially more efficient than previous ones
Security of Multi-Adjustable Join Schemes: Separations and Implications
Database management systems (DBMS) are one of cloud services with great interests in industry and business. In such
services, since there is no trust in the cloud servers, the databases are encrypted prior to outsourcing. One of the most challenging issues in designing these services is supporting SQL join queries on the encrypted database. The multi-adjustable join scheme (M-Adjoin) [Khazaei-Rafiee 2019], an extension of Adjoin [Popa-Zeldovich 2012 and Mironov-Segev-Shahaf 2017], is a symmetric-key primitive that supports the join queries for a list of column labels on an encrypted database. In previous works, the following security notions were introduced for Adjoin and M-Adjoin schemes: 3Partition, M3Partition and M3P k , for every integer k . Additionally, simulation-based and indistinguishability-based security notions have been defined by Mironov et al. for Adjoin scheme. In this paper, we extend their results to M-Adjoin and study the relations between all security notions for M-Adjoin. Some non-trivial relations are proved which resolve some open problems raised by [Mironov-Segev-Shahaf 2017]
Optimal approach to quantum communication using dynamic programming
Reliable preparation of entanglement between distant systems is an
outstanding problem in quantum information science and quantum communication.
In practice, this has to be accomplished via noisy channels (such as optical
fibers) that generally result in exponential attenuation of quantum signals at
large distances. A special class of quantum error correction protocols--quantum
repeater protocols--can be used to overcome such losses. In this work, we
introduce a method for systematically optimizing existing protocols and
developing new, more efficient protocols. Our approach makes use of a dynamic
programming-based searching algorithm, the complexity of which scales only
polynomially with the communication distance, letting us efficiently determine
near-optimal solutions. We find significant improvements in both the speed and
the final state fidelity for preparing long distance entangled states.Comment: 9 pages, 6 figure
Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits
Motivated by the problem of simultaneously preserving confidentiality and
usability of data outsourced to third-party clouds, we present two different
database encryption schemes that largely hide data but reveal enough
information to support a wide-range of relational queries. We provide a
security definition for database encryption that captures confidentiality based
on a notion of equivalence of databases from the adversary's perspective. As a
specific application, we adapt an existing algorithm for finding violations of
privacy policies to run on logs encrypted under our schemes and observe low to
moderate overheads.Comment: CCS 2015 paper technical report, in progres
GreedyDual-Join: Locality-Aware Buffer Management for Approximate Join Processing Over Data Streams
We investigate adaptive buffer management techniques for approximate evaluation of sliding window joins over multiple data streams. In many applications, data stream processing systems have limited memory or have to deal with very high speed data streams. In both cases, computing the exact results of joins between these streams may not be feasible, mainly because the buffers used to compute the joins contain much smaller number of tuples than the tuples contained in the sliding windows. Therefore, a stream buffer management policy is needed in that case. We show that the buffer replacement policy is an important determinant of the quality of the produced results. To that end, we propose GreedyDual-Join (GDJ) an adaptive and locality-aware buffering technique for managing these buffers. GDJ exploits the temporal correlations (at both long and short time scales), which we found to be prevalent in many real data streams. We note that our algorithm is readily applicable to multiple data streams and multiple joins and requires almost no additional system resources. We report results of an experimental study using both synthetic and real-world data sets. Our results demonstrate the superiority and flexibility of our approach when contrasted to other recently proposed techniques
CryptDB: Protecting confidentiality with encrypted query processing
Online applications are vulnerable to theft of sensitive information because adversaries can exploit software bugs to gain access to private data, and because curious or malicious administrators may capture and leak data. CryptDB is a system that provides practical and provable confidentiality in the face of these attacks for applications backed by SQL databases. It works by executing SQL queries over encrypted data using a collection of efficient SQL-aware encryption schemes. CryptDB can also chain encryption keys to user passwords, so that a data item can be decrypted only by using the password of one of the users with access to that data. As a result, a database administrator never gets access to decrypted data, and even if all servers are compromised, an adversary cannot decrypt the data of any user who is not logged in. An analysis of a trace of 126 million SQL queries from a production MySQL server shows that CryptDB can support operations over encrypted data for 99.5% of the 128,840 columns seen in the trace. Our evaluation shows that CryptDB has low overhead, reducing throughput by 14.5% for phpBB, a web forum application, and by 26% for queries from TPC-C, compared to unmodified MySQL. Chaining encryption keys to user passwords requires 11--13 unique schema annotations to secure more than 20 sensitive fields and 2--7 lines of source code changes for three multi-user web applications.National Science Foundation (U.S.) (CNS-0716273)National Science Foundation (U.S.) (IIS-1065219
- …