Title :
On a security model for a retrieval system over encrypted database
Author :
Park, Hyun-A ; Byun, Jin Wook ; Park, Jae Hyun ; Lee, Dong Hoon
Author_Institution :
Grad. Sch. of Inf. Manage. & Security, Korea Univ., Seoul, South Korea
fDate :
Nov. 29 2011-Dec. 1 2011
Abstract :
Although most proposed security schemes have scrutinized their own security models for protecting different types of threats and attacks, this naturally causes a problem as follows - if a security analysis tool would fit a certain scheme, it may not be proper to other schemes. In order to address this problem, this paper analyzes how security requirements of each paper could be different by comparing with two schemes: Agrawal et al.´s scheme OPES (Order Preserving Encryption Scheme) and Zdonik et al.´s FCE (Fast Comparison Encryption) Zdonik et al. have formally disproved the security of Agrawal et al.´s scheme OPES. Thereafter, some scholars have wondered whether the OPES can guarantee its applicability in a real world for its insecurity or not. However, the analysis by Zdonik et al. does not have valid objectivity because they used the security model INFO-CPA-DB for their scheme FCE to analyze Agrawal et al.´s scheme OPES, in spite of the differences between two schemes. In order to analyze any scheme correctly and apply it to a real world properly, the analysis tool should be comprehensively standardized. We re-analyze Zdonik et al.´s analysis for OPES and then propose general formalizations of security and privacy for all of the encrypted retrieval systems. Finally, we recommend the minimum level of security requirements under our formal definitions. Additional considerations should be also supplemented in accordance with the conditions of each system.
Keywords :
cryptography; data privacy; database management systems; information retrieval; FCE; INFO-CPA-DB security model; OPES; attack protection; encrypted database; encrypted retrieval system; fast comparison encryption; insecurity; order preserving encryption scheme; privacy; security requirement; threat protection; Access control; Authentication; Databases; Encryption; Servers;
Conference_Titel :
Advanced Information Management and Service (ICIPM), 2011 7th International Conference on
Conference_Location :
Jeju
Print_ISBN :
978-1-4577-0471-0