When Differential Privacy Meets Query Control: A Hybrid Framework for Practical Range Query Leakage Quantification and Mitigation

IF 5.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS IEEE Transactions on Services Computing Pub Date : 2024-12-13 DOI:10.1109/TSC.2024.3517316
Xinyan Li;Yuefeng Du;Cong Wang
{"title":"When Differential Privacy Meets Query Control: A Hybrid Framework for Practical Range Query Leakage Quantification and Mitigation","authors":"Xinyan Li;Yuefeng Du;Cong Wang","doi":"10.1109/TSC.2024.3517316","DOIUrl":null,"url":null,"abstract":"Encrypted range schemes are becoming increasingly attractive for commercial databases, as they allow for confidential query service on encrypted databases hosted on remote servers. These schemes, by design, leak specific patterns such as access, volume, and search patterns. However, they are vulnerable to leakage-abuse attacks (LAAs) that exploit these patterns to reconstruct the plaintext databases. In response, the query control paradigms have emerged, with our preceding framework, <italic>RangeQC</i>, being a notable example. These paradigms probe deeper into the intricacies of granular user query access control, advancing beyond past scheme-level efforts and acting as sentinels against the inadvertent leakage of delicate data patterns. While <italic>RangeQC</i> aimed to regulate high-leakage queries through query control, it encountered usability impediments. Acknowledging that query control alone might be insufficient, we introduce an additional layer of protection in our evolved framework, <italic>RangeQC+</i>. This fusion model combines query control with differential privacy-based data perturbation, a proactive strategy to muddle query responses and yield obfuscated leakage patterns. Complementing this approach, <italic>RangeQC+</i> incorporates refined, noise-resistant leakage metrics for accurate pattern analysis. Through comprehensive assessments and comparative analysis, <italic>RangeQC+</i> consistently showcases a balanced blend of enhanced performance, robust privacy, and user-friendly functionality.","PeriodicalId":13255,"journal":{"name":"IEEE Transactions on Services Computing","volume":"18 2","pages":"1137-1151"},"PeriodicalIF":5.8000,"publicationDate":"2024-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Services Computing","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10797696/","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

Encrypted range schemes are becoming increasingly attractive for commercial databases, as they allow for confidential query service on encrypted databases hosted on remote servers. These schemes, by design, leak specific patterns such as access, volume, and search patterns. However, they are vulnerable to leakage-abuse attacks (LAAs) that exploit these patterns to reconstruct the plaintext databases. In response, the query control paradigms have emerged, with our preceding framework, RangeQC, being a notable example. These paradigms probe deeper into the intricacies of granular user query access control, advancing beyond past scheme-level efforts and acting as sentinels against the inadvertent leakage of delicate data patterns. While RangeQC aimed to regulate high-leakage queries through query control, it encountered usability impediments. Acknowledging that query control alone might be insufficient, we introduce an additional layer of protection in our evolved framework, RangeQC+. This fusion model combines query control with differential privacy-based data perturbation, a proactive strategy to muddle query responses and yield obfuscated leakage patterns. Complementing this approach, RangeQC+ incorporates refined, noise-resistant leakage metrics for accurate pattern analysis. Through comprehensive assessments and comparative analysis, RangeQC+ consistently showcases a balanced blend of enhanced performance, robust privacy, and user-friendly functionality.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
当差异隐私遇到查询控制:实用范围查询泄漏量化和缓解的混合框架
加密范围方案对商业数据库越来越有吸引力,因为它们允许在远程服务器上托管的加密数据库上提供机密查询服务。按照设计,这些模式会泄漏特定的模式,如访问、容量和搜索模式。然而,它们很容易受到利用这些模式重构明文数据库的泄漏滥用攻击(LAAs)的攻击。作为回应,查询控制范例已经出现,我们前面的框架RangeQC就是一个值得注意的例子。这些范例更深入地探究了粒度用户查询访问控制的复杂性,超越了过去的模式级工作,充当了防止微妙数据模式无意中泄露的哨兵。虽然RangeQC旨在通过查询控制来调节高泄漏查询,但它遇到了可用性障碍。考虑到仅使用查询控制可能是不够的,我们在我们的进化框架中引入了一个额外的保护层,RangeQC+。该融合模型将查询控制与基于隐私的差异数据扰动相结合,这是一种混淆查询响应并产生混淆泄漏模式的主动策略。作为这种方法的补充,RangeQC+结合了精细的、抗噪声的泄漏指标,用于精确的模式分析。通过全面的评估和比较分析,RangeQC+始终如一地展示了增强的性能,强大的隐私和用户友好功能的平衡混合。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
IEEE Transactions on Services Computing
IEEE Transactions on Services Computing COMPUTER SCIENCE, INFORMATION SYSTEMS-COMPUTER SCIENCE, SOFTWARE ENGINEERING
CiteScore
11.50
自引率
6.20%
发文量
278
审稿时长
>12 weeks
期刊介绍: IEEE Transactions on Services Computing encompasses the computing and software aspects of the science and technology of services innovation research and development. It places emphasis on algorithmic, mathematical, statistical, and computational methods central to services computing. Topics covered include Service Oriented Architecture, Web Services, Business Process Integration, Solution Performance Management, and Services Operations and Management. The transactions address mathematical foundations, security, privacy, agreement, contract, discovery, negotiation, collaboration, and quality of service for web services. It also covers areas like composite web service creation, business and scientific applications, standards, utility models, business process modeling, integration, collaboration, and more in the realm of Services Computing.
期刊最新文献
Interactive Fast Computation Offloading and Resource Allocation: A Joint Optimization Approach for Metaverse Applications BFCS: a Secure and Efficient Service Framework for Bribery-Free Crowdsourcing TMTA: a Truthful Multi-Task Allocation Scheme for Enhancing Service Quality in Sparse Mobile Crowdsensing SeFA: Seed-Filter Adaptation of Robust CNN Services for IoT Devices FastPSC: A Fast and Maliciously Secure Set Computation Service for Multi-Owner Set Data
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1