Private data warehouse queries

Research output: Chapter in Book/Report/Conference proceedingChapters

1 Citation (Scopus)

Abstract

Publicly accessible data warehouses are an indispensable resource for data analysis. But they also pose a significant risk to the privacy of the clients, since a data warehouse operator may follow the client's queries and infer what the client is interested in. Private Information Retrieval (PIR) techniques allow the client to retrieve a cell from a data warehouse without revealing to the operator which cell is retrieved. However, PIR cannot be used to hide OLAP operations performed by the client, which may disclose the client's interest. This paper presents a solution for private data warehouse queries on the basis of the Boneh-Goh-Nissim cryptosystem which allows one to evaluate any multi-variate polynomial of total degree 2 on ciphertexts. By our solution, the client can perform OLAP operations on the data warehouse and retrieve one (or more) cell without revealing any information about which cell is selected. Furthermore, our solution supports some types of statistical analysis on data warehouse, such as regression and variance analysis, without revealing the client's interest. Our solution ensures both the server's security and the client's security. Copyright © 2013 ACM.

Original languageEnglish
Title of host publicationProceedings of the 18th ACM Symposium on Access Control Models and Technologies, SACMAT '13
Place of PublicationNew York
PublisherAssociation for Computing Machinery
Pages25-35
ISBN (Print)9781450319508
DOIs
Publication statusPublished - Jun 2013

Citation

Yi, X., Paulet, R., Bertino, E., & Xu, G. (2013). Private data warehouse queries. In Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, SACMAT '13 (pp. 25-35). Association for Computing Machinery. https://doi.org/10.1145/2462410.2462418

Keywords

  • Data warehouse
  • OLAP
  • Privacy
  • Homomorphic encryption

Fingerprint

Dive into the research topics of 'Private data warehouse queries'. Together they form a unique fingerprint.