Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3514221.3517868acmconferencesArticle/Chapter ViewAbstractPublication PagesmodConference Proceedingsconference-collections
research-article

Towards Practical Oblivious Join

Published: 11 June 2022 Publication History

Abstract

Many individuals and companies choose the public cloud as their data and IT infrastructure platform. But remote accesses over the data inevitably bring the issue of trust. Despite strong encryption schemes, adversaries can still learn sensitive information from encrypted data by observing data access patterns. Oblivious RAMs (ORAMs) are proposed to protect against access pattern attacks. However, directly deploying ORAM constructions in an encrypted database brings large computational overhead.
In this work, we focus on oblivious joins over a cloud database. Existing studies in the literature are restricted to either primary-foreign key joins or binary equi-joins. Our major contribution is to support general binary and multiway equi-joins. We integrate B-tree indices into ORAMs for each input table and retrieve blocks through the indices in join processing. The key points are to address the security issue (i.e., leaking the number of accesses to any index) in the extended existing solutions and bound the total number of block accesses. Our index nested-loop join algorithm can also support some types of band joins obliviously. The effectiveness and efficiency of our algorithms are demonstrated through extensive evaluations over real-world datasets. Our method shows orders of magnitude speedup for oblivious multiway equi-joins in comparison with baseline algorithms.

Supplemental Material

MP4 File
Many companies choose the cloud as their data and IT infrastructure platform. However, the remote access brings security and privacy issues in public cloud. Although encryption is necessary to ensure the data security and privacy, adversaries can still learn sensitive information by observing data access patterns. ORAM is proposed to protect against access pattern attacks. However, directly deploying ORAMs in an encrypted database brings large computational overhead. In this work, we focus on oblivious join processing. Existing studies are restricted to either foreign key joins or binary equi-joins. Our major contribution is to support general binary and multiway equi-joins. We integrate B-tree indices into ORAMs for each input table and retrieve blocks through the indices in join processing. We ensure the obliviousness in join processing and also bound the total number of tuple retrievals. The experimental evaluation shows the effectiveness and efficiency of our algorithms over real-world datasets.

References

[1]
2014. Big Data Benchmark. https://amplab.cs.berkeley.edu/benchmark/. (2014).
[2]
2016. SEAL-ORAM. https://github.com/InitialDLab/SEAL-ORAM. (2016).
[3]
2020. Oblivious Database Join Algorithm. https://git.uwaterloo.ca/skrastni/obliv-join-impl. (2020).
[4]
2021. Towards Practical Oblivious Join. https://anonymous.4open.science/r/ Towards-Practical-Oblivious-Join-3477/ojoin.pdf. (2021).
[5]
Rakesh Agrawal, Dmitri Asonov, Murat Kantarcioglu, and Yaping Li. 2006. Sovereign Joins. In ICDE. 26.
[6]
Rakesh Agrawal, Alexandre V. Evfimievski, and Ramakrishnan Srikant. 2003. Information Sharing Across Private Databases. In SIGMOD. 86--97.
[7]
Miklós Ajtai, János Komlós, and Endre Szemerédi. 1983. Sorting Network. In STOC. 1--9.
[8]
Arvind Arasu, Spyros Blanas, Ken Eguro, Manas Joglekar, Raghav Kaushik, Donald Kossmann, Ravishankar Ramamurthy, Prasang Upadhyaya, and Ramarathnam Venkatesan. 2013. Secure database-as-a-service with Cipherbase. In SIGMOD. 1033--1036.
[9]
Arvind Arasu, Ken Eguro, Manas Joglekar, Raghav Kaushik, Donald Kossmann, and Ravi Ramamurthy. 2015. Transaction processing on confidential data using Cipherbase. In ICDE. 435--446.
[10]
Arvind Arasu, Ken Eguro, Raghav Kaushik, and Ravishankar Ramamurthy. 2014. Querying encrypted data. In SIGMOD. 1259--1261.
[11]
Arvind Arasu and Raghav Kaushik. 2014. Oblivious Query Processing. In ICDT. 26--37.
[12]
Gilad Asharov, T.-H. Hubert Chan, Kartik Nayak, Rafael Pass, Ling Ren, and Elaine Shi. 2019. Locality-Preserving Oblivious RAM. In EUROCRYPT, Part II. 214--243.
[13]
Gilad Asharov, Ilan Komargodski, Wei-Kai Lin, Kartik Nayak, Enoch Peserico, and Elaine Shi. 2020. OptORAMa: Optimal Oblivious RAM. In EUROCRYPT, Part II. 403--432.
[14]
Sumeet Bajaj and Radu Sion. 2014. TrustedDB: A Trusted Hardware-Based Database with Privacy and Data Confidentiality. TKDE 26, 3 (2014), 752--765.
[15]
Kenneth E. Batcher. 1968. Sorting Networks and Their Applications. In AFIPS Spring Joint Computing Conference. 307--314.
[16]
Johes Bater, Gregory Elliott, Craig Eggen, Satyender Goel, Abel N. Kho, and Jennie Rogers. 2017. SMCQL: Secure Query Processing for Private Data Networks. PVLDB 10, 6 (2017), 673--684.
[17]
Johes Bater, Xi He, William Ehrich, Ashwin Machanavajjhala, and Jennie Rogers. 2018. Shrinkwrap: Efficient SQL Query Processing in Differentially Private Data Federations. PVLDB 12, 3 (2018), 307--320.
[18]
Vincent Bindschaedler, Paul Grubbs, David Cash, Thomas Ristenpart, and Vitaly Shmatikov. 2018. The Tao of Inference in Privacy-Protected Databases. PVLDB 11, 11 (2018), 1715--1728.
[19]
Vincent Bindschaedler, Muhammad Naveed, Xiaorui Pan, XiaoFeng Wang, and Yan Huang. 2015. Practicing Oblivious Access on Cloud Storage: the Gap, the Fallacy, and the New Way Forward. In CCS. 837--849.
[20]
David Cash, Paul Grubbs, Jason Perry, and Thomas Ristenpart. 2015. Leakage-Abuse Attacks Against Searchable Encryption. In CCS. 668--679.
[21]
Meeyoung Cha, Hamed Haddadi, Fabrício Benevenuto, and P. Krishna Gummadi. 2010. Measuring User Influence in Twitter: The Million Follower Fallacy. In ICWSM.
[22]
Anrin Chakraborti, Adam J. Aviv, Seung Geol Choi, Travis Mayberry, Daniel S. Roche, and Radu Sion. 2019. rORAM: Efficient Range ORAM with O(log2 N ) Locality. In NDSS.
[23]
Zhao Chang, Dong Xie, and Feifei Li. 2016. Oblivious RAM: A Dissection and Experimental Evaluation. PVLDB 9, 12 (2016), 1113--1124.
[24]
Zhao Chang, Dong Xie, Feifei Li, Jeff M. Phillips, and Rajeev Balasubramonian. 2021. Efficient Oblivious Query Processing for Range and kNN Queries. IEEE TKDE (2021).
[25]
Hao Chen, Ilaria Chillotti, and Ling Ren. 2019. Onion Ring ORAM: Efficient Constant Bandwidth Oblivious RAM from (Leveled) TFHE. In CCS. 345--360.
[26]
Rui Chen, Haoran Li, A. K. Qin, Shiva Prasad Kasiviswanathan, and Hongxia Jin. 2016. Private spatial data aggregation in the local setting. In ICDE. 289--300.
[27]
Sanchuan Chen, Xiaokuan Zhang, Michael K. Reiter, and Yinqian Zhang. 2017. Detecting Privileged Side-Channel Attacks in Shielded Execution with Déjà Vu. In AsiaCCS. 7--18.
[28]
Benny Chor, Eyal Kushilevitz, Oded Goldreich, and Madhu Sudan. 1998. Private Information Retrieval. J. ACM 45, 6 (1998), 965--981.
[29]
Shumo Chu, Danyang Zhuo, Elaine Shi, and T.-H. Hubert Chan. 2021. Differentially Oblivious Database Joins: Overcoming the Worst-Case Curse of Fully Oblivious Algorithms. In ITC 2021. 19:1--19:24.
[30]
Graham Cormode, Somesh Jha, Tejas Kulkarni, Ninghui Li, Divesh Srivastava, and Tianhao Wang. 2018. Privacy at Scale: Local Differential Privacy in Practice. In SIGMOD. 1655--1658.
[31]
Victor Costan and Srinivas Devadas. 2016. Intel SGX Explained. IACR Cryptology ePrint Archive 2016 (2016), 86.
[32]
Natacha Crooks, Matthew Burke, Ethan Cecchetti, Sitar Harel, Rachit Agarwal, and Lorenzo Alvisi. 2018. Obladi: Oblivious Serializable Transactions in the Cloud. In OSDI. 727--743.
[33]
Ankur Dave, Chester Leung, Raluca Ada Popa, Joseph E. Gonzalez, and Ion Stoica. 2020. Oblivious coopetitive analytics using hardware enclaves. In EuroSys. 39:1--39:17.
[34]
Ioannis Demertzis, Dimitrios Papadopoulos, Charalampos Papamanthou, and Saurabh Shintre. 2020. SEAL: Attack Mitigation for Encrypted Databases via Adjustable Leakage. In USENIX Security.
[35]
Saba Eskandarian and Matei Zaharia. 2019. ObliDB: Oblivious Query Processing for Secure Databases. PVLDB 13, 2 (2019), 169--183.
[36]
Christopher W. Fletcher, Ling Ren, Xiangyao Yu, Marten van Dijk, Omer Khan, and Srinivas Devadas. 2014. Suppressing the Oblivious RAM timing channel while making information leakage and program efficiency trade-offs. In HPCA. 213--224.
[37]
Oded Goldreich. 1987. Towards a Theory of Software Protection and Simulation by Oblivious RAMs. In STOC. 182--194.
[38]
Oded Goldreich and Rafail Ostrovsky. 1996. Software Protection and Simulation on Oblivious RAMs. J. ACM 43, 3 (1996), 431--473.
[39]
Michael T. Goodrich. 2010. Randomized Shellsort: A Simple Oblivious Sorting Algorithm. In SODA. 1262--1277.
[40]
Michael T. Goodrich. 2014. Zig-zag sort: A simple deterministic data-oblivious sorting algorithm running in O(n log n) time. In STOC. 684--693.
[41]
Daniel Gruss, Julian Lettner, Felix Schuster, Olga Ohrimenko, István Haller, and Manuel Costa. 2017. Strong and Efficient Cache Side-Channel Protection using Hardware Transactional Memory. In USENIX Security. 217--233.
[42]
Hakan Hacigümüs, Balakrishna R. Iyer, Chen Li, and Sharad Mehrotra. 2002. Executing SQL over encrypted data in the database-service-provider model. In SIGMOD. 216--227.
[43]
Zhian He, Wai Kit Wong, Ben Kao, David Wai-Lok Cheung, Rongbin Li, Siu-Ming Yiu, and Eric Lo. 2015. SDB: A Secure Query Processing System with Data Interoperability. PVLDB 8, 12 (2015), 1876--1879.
[44]
Thang Hoang, Ceyhun D. Ozkaptan, Gabriel Hackebeil, and Attila A. Yavuz. 2018. Efficient Oblivious Data Structures for Database Services on the Cloud. IEEE Trans. Cloud Computing (2018).
[45]
Thang Hoang, Muslum Ozgur Ozmen, Yeongjin Jang, and Attila A. Yavuz. 2019. Hardware-Supported ORAM in Effect: Practical Oblivious Search and Update on Very Large Dataset. PoPETs 2019, 1 (2019), 172--191.
[46]
Mohammad Saiful Islam, Mehmet Kuzu, and Murat Kantarcioglu. 2012. Access Pattern disclosure on Searchable Encryption: Ramification, Attack and Mitigation. In NDSS.
[47]
Noah M. Johnson, Joseph P. Near, and Dawn Song. 2018. Towards Practical Differential Privacy for SQL Queries. PVLDB 11, 5 (2018), 526--539.
[48]
Georgios Kellaris, George Kollios, Kobbi Nissim, and Adam O'Neill. 2016. Generic Attacks on Secure Outsourced Databases. In CCS. 1329--1340.
[49]
Marcel Keller and Peter Scholl. 2014. Efficient, Oblivious Data Structures for MPC. In ASIACRYPT, Part II. 506--525.
[50]
Taesoo Kim, Zhiqiang Lin, and Chia-che Tsai. 2017. CCS'17 Tutorial Abstract: SGX Security and Privacy. In CCS. 2613--2614.
[51]
Tony Kontzer. 2004. Airlines and Hotels Face Customer Concerns Arising from Anti-Terrorism Efforts. https://www.informationweek.com/privacy-pressure/d/d-id/1023945 (2004).
[52]
Ios Kotsogiannis, Yuchao Tao, Xi He, Maryam Fanaeepour, Ashwin Machanavajjhala, Michael Hay, and Gerome Miklau. 2019. PrivateSQL: A Differentially Private SQL Query Engine. PVLDB 12, 11 (2019), 1371--1384.
[53]
Simeon Krastnikov, Florian Kerschbaum, and Douglas Stebila. 2020. Efficient Oblivious Database Joins. PVLDB 13, 11 (2020), 2132--2145.
[54]
Yaping Li and Minghua Chen. 2008. Privacy Preserving Joins. In ICDE. 1352--1354.
[55]
Chang Liu, Xiao Shaun Wang, Kartik Nayak, Yan Huang, and Elaine Shi. 2015. ObliVM: A Programming Framework for Secure Computation. In S&P. 359--376.
[56]
Jacob R. Lorch, Bryan Parno, James W. Mickens, Mariana Raykova, and Joshua Schiffman. 2013. Shroud: Ensuring private access to large-scale data in the data center. In FAST. 199--214.
[57]
Martin Maas, Eric Love, Emil Stefanov, Mohit Tiwari, Elaine Shi, Krste Asanovic, John Kubiatowicz, and Dawn Song. 2013. PHANTOM: Practical oblivious computation in a secure processor. In CCS. 311--324.
[58]
Pratyush Mishra, Rishabh Poddar, Jerry Chen, Alessandro Chiesa, and Raluca Ada Popa. 2018. Oblix: An Efficient Oblivious Search Index. In S&P. 279--296.
[59]
Muhammad Naveed, Seny Kamara, and Charles V. Wright. 2015. Inference Attacks on Property-Preserving Encrypted Databases. In CCS. 644--655.
[60]
Rafail Ostrovsky. 1990. Efficient Computation on Oblivious RAMs. In STOC. 514--523.
[61]
Benny Pinkas and Tzachy Reinman. 2010. Oblivious RAM Revisited. In CRYPTO. 502--519.
[62]
Raluca A. Popa, Catherine M. S. Redfield, Nickolai Zeldovich, and Hari Balakrishnan. 2011. CryptDB: Protecting confidentiality with encrypted query processing. In SOSP. 85--100.
[63]
Ling Ren, Christopher W. Fletcher, Albert Kwon, Emil Stefanov, Elaine Shi, Marten van Dijk, and Srinivas Devadas. 2015. Constants Count: Practical Improvements to Oblivious RAM. In USENIX Security. 415--430.
[64]
Cetin Sahin, Tristan Allard, Reza Akbarinia, Amr El Abbadi, and Esther Pacitti. 2018. A Differentially Private Index for Range Query Processing in Clouds. In ICDE. 857--868.
[65]
Cetin Sahin, Victor Zakhary, Amr El Abbadi, Huijia Lin, and Stefano Tessaro. 2016. TaoStore: Overcoming Asynchronicity in Oblivious Data Storage. In S&P. 198--217.
[66]
Sajin Sasy, Sergey Gorbunov, and Christopher W. Fletcher. 2018. ZeroTrace: Oblivious Memory Primitives from Intel SGX. In NDSS.
[67]
Elaine Shi. 2020. Path Oblivious Heap: Optimal and Practical Oblivious Priority Queue. In S&P. 842--858.
[68]
Emil Stefanov and Elaine Shi. 2013. ObliviStore: High Performance Oblivious Cloud Storage. In S&P. 253--267.
[69]
Emil Stefanov, Marten van Dijk, Elaine Shi, Christopher W. Fletcher, Ling Ren, Xiangyao Yu, and Srinivas Devadas. 2013. Path ORAM: An Extremely Simple Oblivious RAM Protocol. In CCS. 299--310.
[70]
Stephen Tu, M. Frans Kaashoek, Samuel Madden, and Nickolai Zeldovich. 2013. Processing Analytical Queries over Encrypted Data. PVLDB 6, 5 (2013), 289--300.
[71]
Nikolaj Volgushev, Malte Schwarzkopf, Ben Getchell, Mayank Varia, Andrei Lapets, and Azer Bestavros. 2019. Conclave: Secure multi-party computation on big data. In EuroSys. 3:1--3:18.
[72]
Ning Wang, Xiaokui Xiao, Yin Yang, Jun Zhao, Siu Cheung Hui, Hyejin Shin, Junbum Shin, and Ge Yu. 2019. Collecting and Analyzing Multidimensional Data with Local Differential Privacy. In ICDE. 638--649.
[73]
Tianhao Wang, Jeremiah Blocki, Ninghui Li, and Somesh Jha. 2017. Locally Differentially Private Protocols for Frequency Estimation. In USENIX Security. 729--745.
[74]
Tianhao Wang, Bolin Ding, Jingren Zhou, Cheng Hong, Zhicong Huang, Ninghui Li, and Somesh Jha. 2019. Answering Multi-Dimensional Analytical Queries under Local Differential Privacy. In SIGMOD. 159--176.
[75]
Xiao Shaun Wang, Yan Huang, T.-H. Hubert Chan, Abhi Shelat, and Elaine Shi. 2014. SCORAM: Oblivious RAM for Secure Computation. In CCS. 191--202.
[76]
Xiao Shaun Wang, Kartik Nayak, Chang Liu, T-H. Hubert Chan, Elaine Shi, Emil Stefanov, and Yan Huang. 2014. Oblivious Data Structures. In CCS. 215--226.
[77]
Yilei Wang and Ke Yi. 2021. Secure Yannakakis: Join-Aggregate Queries over Private Data. In SIGMOD.
[78]
Peter Williams and Radu Sion. 2008. Usable PIR. In NDSS.
[79]
Peter Williams, Radu Sion, and Alin Tomescu. 2012. PrivateFS: A parallel oblivious file system. In CCS. 977--988.
[80]
Wai Kit Wong, Ben Kao, David Wai-Lok Cheung, Rongbin Li, and Siu-Ming Yiu. 2014. Secure query processing with data interoperability in a cloud database environment. In SIGMOD. 1395--1406.
[81]
Dong Xie, Guanru Li, Bin Yao, Xuan Wei, Xiaokui Xiao, Yunjun Gao, and Minyi Guo. 2016. Practical Private Shortest Path Computation Based on Oblivious Storage. In ICDE. 361--372.
[82]
Jianyu Yang, Tianhao Wang, Ninghui Li, Xiang Cheng, and Sen Su. 2020. Answering Multi-Dimensional Range Queries under Local Differential Privacy. PVLDB 14, 3 (2020), 378--390.
[83]
Bin Yao, Feifei Li, and Xiaokui Xiao. 2013. Secure Nearest Neighbor Revisited. In ICDE. 733--744.
[84]
Qingqing Ye, Haibo Hu, Xiaofeng Meng, and Huadi Zheng. 2019. PrivKV: Key- Value Data Collection with Local Differential Privacy. In S&P. 317--331.
[85]
C. T. Yu and M. Z. Ozsoyoglu. 1979. An algorithm for tree-query membership of a distributed query. In COMPSAC. 306--312.
[86]
Zhuoyue Zhao, Robert Christensen, Feifei Li, Xiao Hu, and Ke Yi. 2018. Random Sampling over Joins Revisited. In SIGMOD. 1525--1539.
[87]
Wenting Zheng, Ankur Dave, Jethro G. Beekman, Raluca Ada Popa, Joseph E. Gonzalez, and Ion Stoica. 2017. Opaque: An Oblivious and Encrypted Distributed Analytics Platform. In NSDI. 283--298.

Cited By

View all
  • (2024)FedKNN: Secure Federated k-Nearest Neighbor SearchProceedings of the ACM on Management of Data10.1145/36392662:1(1-26)Online publication date: 26-Mar-2024
  • (2024)An Experimental Study on Federated Equi-JoinsIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2024.337502836:9(4443-4457)Online publication date: 12-Mar-2024
  • (2024)Bulkor: Enabling Bulk Loading for Path ORAM2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00103(4258-4276)Online publication date: 19-May-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
SIGMOD '22: Proceedings of the 2022 International Conference on Management of Data
June 2022
2597 pages
ISBN:9781450392495
DOI:10.1145/3514221
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 11 June 2022

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. binary join
  2. multiway join
  3. oblivious RAM
  4. oblivious index

Qualifiers

  • Research-article

Funding Sources

  • National Key R&D Program of China
  • National Natural Science Foundation of China

Conference

SIGMOD/PODS '22
Sponsor:

Acceptance Rates

Overall Acceptance Rate 785 of 4,003 submissions, 20%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)174
  • Downloads (Last 6 weeks)26
Reflects downloads up to 12 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)FedKNN: Secure Federated k-Nearest Neighbor SearchProceedings of the ACM on Management of Data10.1145/36392662:1(1-26)Online publication date: 26-Mar-2024
  • (2024)An Experimental Study on Federated Equi-JoinsIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2024.337502836:9(4443-4457)Online publication date: 12-Mar-2024
  • (2024)Bulkor: Enabling Bulk Loading for Path ORAM2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00103(4258-4276)Online publication date: 19-May-2024
  • (2024)Secure Normal Form: Mediation Among Cross Cryptographic Leakages in Encrypted Databases2024 IEEE 40th International Conference on Data Engineering (ICDE)10.1109/ICDE60146.2024.00444(5560-5573)Online publication date: 13-May-2024
  • (2024)Secure and Practical Functional Dependency Discovery in Outsourced Databases2024 IEEE 40th International Conference on Data Engineering (ICDE)10.1109/ICDE60146.2024.00134(1645-1658)Online publication date: 13-May-2024
  • (2023)Doquet: Differentially Oblivious Range and Join Queries with Private Data StructuresProceedings of the VLDB Endowment10.14778/3625054.362505516:13(4160-4173)Online publication date: 1-Sep-2023
  • (2023)SODA: A Set of Fast Oblivious Algorithms in Distributed Secure Data AnalyticsProceedings of the VLDB Endowment10.14778/3587136.358714216:7(1671-1684)Online publication date: 1-Mar-2023
  • (2023)Veil: A Storage and Communication Efficient Volume-Hiding AlgorithmProceedings of the ACM on Management of Data10.1145/36267591:4(1-27)Online publication date: 12-Dec-2023
  • (2023)Towards Practical Oblivious Join ProcessingIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2023.331003836:4(1829-1842)Online publication date: 1-Sep-2023

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media