Equi-Joins Over Encrypted Data for Series of Queries

Equi-Joins Over Encrypted Data for Series of Queries

Equi-Joins over Encrypted Data for Series of Queries Masoumeh Shafieinejad Suraj Gupta Jin Yang Liu University of Waterloo University of Waterloo University of Waterloo Waterloo, Canada Waterloo, Canada Waterloo, Canada [email protected] [email protected] [email protected] Koray Karabina Florian Kerschbaum National Research Council Canada & University of Waterloo University of Waterloo Waterloo, Canada Waterloo, Canada [email protected] [email protected] ABSTRACT tuples that match a selection criterion. However, the leakage of Encryption provides a method to protect data outsourced to a DBMS a series of queries in this encryption scheme corresponds to the provider, e.g., in the cloud. However, performing database opera- leakage of the union of the queries, i.e., it may be larger than the tions over encrypted data requires specialized encryption schemes union (sum) of the leakage of each query. We provide an example that carefully balance security and performance. In this paper, we of such super-additive leakage in Section 2. In this paper we aim to present a new encryption scheme that can efficiently perform equi- reduce the leakage of equality conditions even further. joins over encrypted data with better security than the state-of-the- We present a new encryption scheme for joins that not only art. In particular, our encryption scheme reduces the leakage to restricts the leakage of the equality condition to tuples that match a equality of rows that match a selection criterion and only reveals selection criterion, but also limits the leakage of a series of queries the transitive closure of the sum of the leakages of each query in corresponds to the transitive closure of the union of the leakage of a series of queries. Our encryption scheme is provable secure. We each query, i.e., there is no super-additive leakage. We believe that implemented our encryption scheme and evaluated it over a dataset this leakage is a natural lower bound for the leakage of an efficient from the TPC-H benchmark. encryption scheme for non-interactive joins using one outsourced DBMS. Note that oblivious joins [2, 3, 25] which only leak the size of the joint table, either require secure hardware or multi-party 1 INTRODUCTION computation [4], and an interactive protocol that reveals the size Outsourcing data management into the cloud comes with new secu- of the joint table. rity risks. Insiders at the cloud service provider, attackers seeking Our construction requires the use of a new cryptographic tech- high-profit targets or international legislators may exploit access nique – function-hiding inner product encryption – compared to to the cloud infrastructure. Encryption where the key is held at previous approaches. Our construction is efficient with crypto- the client provides an additional layer of security countering these graphic operations requiring only a few milliseconds and the ability threats. However, regular data management operations such as to run hash-based joins with expected time complexity $ ¹=º. Our joins cannot be simply performed over encrypted data. Hence, spe- construction works for arbitrary equi-joins. As a comparison, the cialized encryption schemes for performing joins over encrypted state-of-the-art encryption scheme by Hahn et al. [16] requires data have been developed [9, 16, 23, 29, 32, 33, 36]. nested-loop joins (with $ ¹=2º time complexity), and it only works In this paper we consider only equi-joins, since their security is for primary key, foreign key joins. We implemented our encryp- particularly challenging. On the one hand, a database management tion scheme and evaluated encrypted joins over a dataset from the system (DBMS) cannot hide the equality of join attribute values, TPC-H benchmark. since the cross product of two tables of size = each, is of size =2 In summary, our contributions are as follows: arXiv:2103.05792v1 [cs.CR] 10 Mar 2021 which is prohibitively large for subsequent operations. Hence, the DBMS needs to select a subset of the cross product using the equality • We provide a new encryption schemes for non-interactive condition. On the other hand, revealing, the equality condition leaks equi-joins over encrypted data where a series of queries only the frequency of items in a primary key, foreign key join. This is leaks the transitive closure of the union of the leakage of critical, since primary key, foreign key joins are a very common each query, i.e., without super-additive leakage. operation and it has been demonstrated that frequency information • We analyze the security of our scheme using a formal secu- is very powerful in cryptanalysis [26, 31]. The encryption scheme rity proof. (for joins) by CryptDB [33] has been effectively broken using this • We evaluate the performance of a DBMS using our encryp- frequency information [31]. Consequently, the challenge for any tion scheme over a database from the TPC-H benchmark. encryption scheme for joins is to allow selecting from the cross- product, yet reveal as few equality conditions as possible. A state-of-the-art encryption scheme for joins by Hahn et al. [16] The remainder of the paper is structured as follows: Section 2 de- further reduces the leakage from deterministic encryption [15] and scribes the system model and problem in detail. Section 3 provides onion encryption [33, 35] by only leaking equality condition for the necessary cryptographic background and Section 4 describes our join encryption scheme. We presents its security proof in Sec- Key Name tion 5 and its performance evaluation in Section 6. Section 7 surveys 1 Web Application related work and Section 8 summarizes our conclusions. 2 Database Table 1: Teams 2 SYSTEM MODEL In outsourced data management, a client stores their [sensitive] data on a database server under the control of a DBMS service Record Employee Role Team provider [14]. Later, the client can access the outsourced data 1 Hans Programmer 1 through an online query interface provided by the server. Clients 2 Kaily Tester 1 desire to allow the server to process data queries while maintaining 3 John Programmer 2 the confidentiality of the data. For this purpose, they encrypt data 4 Sally Tester 2 before outsourcing. However, encrypted data is hard to process. Table 2: Employees Therefore, to allow for more expressive server-side data processing, the client will provide certain “unlocking” information (tokens) for a set of specific (equi-join) predicates. The clients expects the 1 2 3 4 server to behave semi-honestly and perform exactly the consid- ¹10,10º, ¹10,10º only from Table )퐵 need to be included in order ered query while trying to find out any additional information. to complete the transitive closure. We consider a relational model, where the client outsources their We also emphasize that the uniqueness of the join attribute val- data in a number of (at least two) tables each consisting of several ues in 퐴0 is a feature of Example 2.1, not a general requirement, data columns (e.g., relational attributes). In this work we focus since our scheme is not limited to joins between primary key, for- on performing equi-join over two outsourced tables )퐴 and )퐵. eign key joins. Without loss of generality, we assume both tables have = rows We consider three database operations (queries) at times C0 < and < attributes, with each attribute taking its values from a do- C1 < C2, i.e. C0 is the point in time after encrypted database upload, main of size ℓ, to simplify the notations. The equi-join result on C1 is the point in time after the first query, but before the second the two join columns of the table-pair ¹)퐴,)퐵º, is a subset of the query and C2 is the point in time after the first and the second query. cross-product of rows from the two tables that contain equal val- C0: Encrypted database upload. ues in their join columns [16]. Assume table )퐴 with j)퐴 j = = C1: SELECT ¢ FROM Employees JOIN Teams ON Team = Key records, has schema ¹퐴0, 퐴1, ··· , 퐴<º with join key 퐴0 that iden- WHERE Name = “Web Application” AND Role = “Tester” tifies the join column and other attributes 퐴1, ··· , 퐴<. Each at- C2: SELECT ¢ FROM Employees JOIN Teams ON Team = Key tribute 퐴8 has a domain -8 . We denote by G8,9 , 8 2 »<¼ and 9 2 »ℓ¼ , WHERE Name = “Database” AND Role = “Programmer” Cℎ the 9 domain value in -8 . We show the rows in )퐴 by tuples of 1 1 = = variables: ¹00, ··· , 0<º, ··· , ¹00, ··· , 0<º. Similarly,)퐵 has schema Record Employee Role T.Key T.Name ¹퐵0, 퐵1, ··· , 퐵=º, with domain .8 for each 퐵8 . We denote by ~8,9 ,8 2 2 Kaily Tester 1 Web Application » ¼ 2 » ¼ Cℎ j j = < and 9 ℓ , the 9 value in .8 . )퐵 has )퐵 = rows shown by Table 3: The result of equi-join query at C1 1 1 = = ¹10, ··· ,1<º, ··· , ¹10, ··· ,1<º. The equi-join with join attributes 1 퐴0 and 퐵0 is an operation on tables)퐴 and)퐵, denoted by )퐴 ⊲⊳ )퐵. The result of)퐴 ⊲⊳ )퐵 has schema ¹Θ, 퐴1, ··· , 퐴<, 퐵1, ··· , 퐵<º, and 0 0 0 consists of records ¹\A,A , 0A , ··· , 0A ,1A , ··· ,1A º. The attribute Θ 1 < 1 < Record Employee Role T.Key T.Name takes its values from all 퐴0’s and 퐵0’s that match, in other words: 0 0 0 3 John Programmer 2 Database \A,A = 0A = 1A , for all A 2 »=¼ , A 0 2 »=¼ where 0A = 1A holds. 0 > 0 0 Table 4: The result of equi-join query at C There is a further filtering based on additional filtering-predicates 2 chosen from f퐴1, ··· , 퐴< g and f퐵1, ··· , 퐵< g.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    15 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us