Please use this identifier to cite or link to this item:
Title: Steganographic database management system
Authors: MA XI
Keywords: steganography, plausible deniability, pattern mining, traffic masking, untrusted host, database security.
Issue Date: 15-Sep-2005
Citation: MA XI (2005-09-15). Steganographic database management system. ScholarBank@NUS Repository.
Abstract: The database community is witnessing the emergence of two recent trends set on a collision course. On the one hand, the outsourcing of data management has become increasingly attractive for many organizations with the advances in the network technologies. On the other hand, escalating concerns about data privacy have sparked keen interest in enabling secure data storage and access. The two trends are indirectly conflict with each other. A client using an outsourced database service is required to trust the service provider with potentially sensitive data, leaving the door open for damaging leaks of private information. A steganographic database management system (StegDB) could support steganography in data storage and query. In particular, it grants access to a protected database partition only if the correct access key is supplied; without it, an adversary could get no information about whether the protected partition ever exists even if he understands the hardware and software completely.In this thesis, we present two different StegDB designs: 1) model 1 in which only the data storage is outsourced, and 2) model 2 in which the database server entirely expose to untrusted environment. This work is pioneering in the sense that it fills the gap between the high level security requirement and ubiquitous computing environment.
Appears in Collections:Master's Theses (Open)

Show full item record
Files in This Item:
File Description SizeFormatAccess SettingsVersion 
MaX.pdf841.07 kBAdobe PDF



Google ScholarTM


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.