Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Shuffle index: efficient and private access to outsourced data
De Capitani Di Vimercati S., Foresti S., Paraboschi S., Pelosi G., Samarati P. ACM Transactions on Storage11 (4):1-55,2015.Type:Article
Date Reviewed: Jan 20 2016

There exists “a clear need to provide proper confidentiality protection” to outsourced data where the data itself and access to that data is “not under the control of the data owner.” Content protection through encryption alone is not sufficient confidentiality protection. Even if the data is encrypted, an external server can observe every access to physical data blocks. With possible limited other knowledge, confidentiality can be breached; for example, it is possible to “establish correlation of accesses aimed at the same item,” such as different transactions on a particular stock. Not only that, but observing patterns of access to specific blocks of data could, in some cases, even “infer the plaintext order on the encrypted content of the blocks.”

The authors propose a solution to data confidentiality protection that addresses not only content, but also access and pattern confidentiality. That solution employs a shuffle index where the logical data “structure is dynamically reorganized at every access.” Shuffling includes cover searches, which are fake searches that are executed in conjunction with the actual target. The authors feel that the performance overhead generated, which obviously depends upon specific configurations, is acceptable.

The paper goes into great depth in discussing such topics as the correctness and complexity of shuffle index management, execution of range queries, and performance management. All in all, given the increased recognition of and need for true confidentiality protection, this paper should receive strong attention and review by experts in the field.

Reviewer:  David G. Hill Review #: CR144110 (1604-0265)
Bookmark and Share
  Featured Reviewer  
 
Relational Databases (H.2.4 ... )
 
 
Indexing Methods (H.3.1 ... )
 
 
Query Processing (H.2.4 ... )
 
 
Search Process (H.3.3 ... )
 
 
Content Analysis And Indexing (H.3.1 )
 
Would you recommend this review?
yes
no
Other reviews under "Relational Databases": Date
A sound and sometimes complete query evaluation algorithm for relational databases with null values
Reiter R. Journal of the ACM 33(2): 349-370, 1986. Type: Article
Nov 1 1986
Sort sets in the relational model
Ginsburg S., Hull R. Journal of the ACM 33(3): 465-488, 1986. Type: Article
Nov 1 1986
Foundation for object/relational databases
Date C., Darwen H., Addison Wesley Longman Publishing Co., Inc., Redwood City, CA, 1998. Type: Book (9780201309782)
Nov 1 1998
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy