当差异隐私遇到查询控制:实用范围查询泄漏量化和缓解的混合框架

IF 5.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS
Xinyan Li;Yuefeng Du;Cong Wang
{"title":"当差异隐私遇到查询控制:实用范围查询泄漏量化和缓解的混合框架","authors":"Xinyan Li;Yuefeng Du;Cong Wang","doi":"10.1109/TSC.2024.3517316","DOIUrl":null,"url":null,"abstract":"Encrypted range schemes are becoming increasingly attractive for commercial databases, as they allow for confidential query service on encrypted databases hosted on remote servers. These schemes, by design, leak specific patterns such as access, volume, and search patterns. However, they are vulnerable to leakage-abuse attacks (LAAs) that exploit these patterns to reconstruct the plaintext databases. In response, the query control paradigms have emerged, with our preceding framework, <italic>RangeQC</i>, being a notable example. These paradigms probe deeper into the intricacies of granular user query access control, advancing beyond past scheme-level efforts and acting as sentinels against the inadvertent leakage of delicate data patterns. While <italic>RangeQC</i> aimed to regulate high-leakage queries through query control, it encountered usability impediments. Acknowledging that query control alone might be insufficient, we introduce an additional layer of protection in our evolved framework, <italic>RangeQC+</i>. This fusion model combines query control with differential privacy-based data perturbation, a proactive strategy to muddle query responses and yield obfuscated leakage patterns. Complementing this approach, <italic>RangeQC+</i> incorporates refined, noise-resistant leakage metrics for accurate pattern analysis. Through comprehensive assessments and comparative analysis, <italic>RangeQC+</i> consistently showcases a balanced blend of enhanced performance, robust privacy, and user-friendly functionality.","PeriodicalId":13255,"journal":{"name":"IEEE Transactions on Services Computing","volume":"18 2","pages":"1137-1151"},"PeriodicalIF":5.8000,"publicationDate":"2024-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"When Differential Privacy Meets Query Control: A Hybrid Framework for Practical Range Query Leakage Quantification and Mitigation\",\"authors\":\"Xinyan Li;Yuefeng Du;Cong Wang\",\"doi\":\"10.1109/TSC.2024.3517316\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Encrypted range schemes are becoming increasingly attractive for commercial databases, as they allow for confidential query service on encrypted databases hosted on remote servers. These schemes, by design, leak specific patterns such as access, volume, and search patterns. However, they are vulnerable to leakage-abuse attacks (LAAs) that exploit these patterns to reconstruct the plaintext databases. In response, the query control paradigms have emerged, with our preceding framework, <italic>RangeQC</i>, being a notable example. These paradigms probe deeper into the intricacies of granular user query access control, advancing beyond past scheme-level efforts and acting as sentinels against the inadvertent leakage of delicate data patterns. While <italic>RangeQC</i> aimed to regulate high-leakage queries through query control, it encountered usability impediments. Acknowledging that query control alone might be insufficient, we introduce an additional layer of protection in our evolved framework, <italic>RangeQC+</i>. This fusion model combines query control with differential privacy-based data perturbation, a proactive strategy to muddle query responses and yield obfuscated leakage patterns. Complementing this approach, <italic>RangeQC+</i> incorporates refined, noise-resistant leakage metrics for accurate pattern analysis. Through comprehensive assessments and comparative analysis, <italic>RangeQC+</i> consistently showcases a balanced blend of enhanced performance, robust privacy, and user-friendly functionality.\",\"PeriodicalId\":13255,\"journal\":{\"name\":\"IEEE Transactions on Services Computing\",\"volume\":\"18 2\",\"pages\":\"1137-1151\"},\"PeriodicalIF\":5.8000,\"publicationDate\":\"2024-12-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Transactions on Services Computing\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10797696/\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Services Computing","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10797696/","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

摘要

加密范围方案对商业数据库越来越有吸引力,因为它们允许在远程服务器上托管的加密数据库上提供机密查询服务。按照设计,这些模式会泄漏特定的模式,如访问、容量和搜索模式。然而,它们很容易受到利用这些模式重构明文数据库的泄漏滥用攻击(LAAs)的攻击。作为回应,查询控制范例已经出现,我们前面的框架RangeQC就是一个值得注意的例子。这些范例更深入地探究了粒度用户查询访问控制的复杂性,超越了过去的模式级工作,充当了防止微妙数据模式无意中泄露的哨兵。虽然RangeQC旨在通过查询控制来调节高泄漏查询,但它遇到了可用性障碍。考虑到仅使用查询控制可能是不够的,我们在我们的进化框架中引入了一个额外的保护层,RangeQC+。该融合模型将查询控制与基于隐私的差异数据扰动相结合,这是一种混淆查询响应并产生混淆泄漏模式的主动策略。作为这种方法的补充,RangeQC+结合了精细的、抗噪声的泄漏指标,用于精确的模式分析。通过全面的评估和比较分析,RangeQC+始终如一地展示了增强的性能,强大的隐私和用户友好功能的平衡混合。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
When Differential Privacy Meets Query Control: A Hybrid Framework for Practical Range Query Leakage Quantification and Mitigation
Encrypted range schemes are becoming increasingly attractive for commercial databases, as they allow for confidential query service on encrypted databases hosted on remote servers. These schemes, by design, leak specific patterns such as access, volume, and search patterns. However, they are vulnerable to leakage-abuse attacks (LAAs) that exploit these patterns to reconstruct the plaintext databases. In response, the query control paradigms have emerged, with our preceding framework, RangeQC, being a notable example. These paradigms probe deeper into the intricacies of granular user query access control, advancing beyond past scheme-level efforts and acting as sentinels against the inadvertent leakage of delicate data patterns. While RangeQC aimed to regulate high-leakage queries through query control, it encountered usability impediments. Acknowledging that query control alone might be insufficient, we introduce an additional layer of protection in our evolved framework, RangeQC+. This fusion model combines query control with differential privacy-based data perturbation, a proactive strategy to muddle query responses and yield obfuscated leakage patterns. Complementing this approach, RangeQC+ incorporates refined, noise-resistant leakage metrics for accurate pattern analysis. Through comprehensive assessments and comparative analysis, RangeQC+ consistently showcases a balanced blend of enhanced performance, robust privacy, and user-friendly functionality.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
IEEE Transactions on Services Computing
IEEE Transactions on Services Computing COMPUTER SCIENCE, INFORMATION SYSTEMS-COMPUTER SCIENCE, SOFTWARE ENGINEERING
CiteScore
11.50
自引率
6.20%
发文量
278
审稿时长
>12 weeks
期刊介绍: IEEE Transactions on Services Computing encompasses the computing and software aspects of the science and technology of services innovation research and development. It places emphasis on algorithmic, mathematical, statistical, and computational methods central to services computing. Topics covered include Service Oriented Architecture, Web Services, Business Process Integration, Solution Performance Management, and Services Operations and Management. The transactions address mathematical foundations, security, privacy, agreement, contract, discovery, negotiation, collaboration, and quality of service for web services. It also covers areas like composite web service creation, business and scientific applications, standards, utility models, business process modeling, integration, collaboration, and more in the realm of Services Computing.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信