Towards practical private processing of database queries over public data

  • Authors:
  • Shiyuan Wang;Divyakant Agrawal;Amr El Abbadi

  • Affiliations:
  • Department of Computer Science, University of California at Santa Barbara, Santa Barbara, USA;Department of Computer Science, University of California at Santa Barbara, Santa Barbara, USA;Department of Computer Science, University of California at Santa Barbara, Santa Barbara, USA

  • Venue:
  • Distributed and Parallel Databases
  • Year:
  • 2014

Quantified Score

Hi-index 0.00

Visualization

Abstract

Privacy is a major concern when users query public online data services. The privacy of millions of people has been jeopardized in numerous user data leakage incidents in many popular online applications. To address the critical problem of personal data leakage through queries, we enable private querying on public data services so that the contents of user queries and any user data are hidden and therefore not revealed to the online service providers. We propose two protocols for private processing of database queries, namely BHE and HHE. The two protocols provide strong query privacy by using Paillier's homomorphic encryption, and support common database queries such as range and join queries by relying on the bucketization of public data. In contrast to traditional Private Information Retrieval proposals, BHE and HHE only incur one round of client server communication for processing a single query. BHE is a basic private query processing protocol that provides complete query privacy but still incurs expensive computation and communication costs. Built upon BHE, HHE is a hybrid protocol that applies ciphertext computation and communication on a subset of the data, such that this subset not only covers the actual requested data but also resembles some frequent query patterns of common users, thus achieving practical query performance while ensuring adequate privacy levels. By using frequent query patterns and data specific privacy protection, HHE is not vulnerable to the traditional attacks on k-Anonymity that exploit data similarity and skewness. Moreover, HHE consistently protects user query privacy for a sequence of queries in a single query session.