Skip to main content
Erschienen in: Soft Computing 11/2016

18.07.2015 | Methodologies and Application

Efficient request-based comparable encryption scheme based on sliding window method

verfasst von: Peng Chen, Jun Ye, Xiaofeng Chen

Erschienen in: Soft Computing | Ausgabe 11/2016

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this paper, we present an efficient request-based comparable encryption, which is based on sliding window techniques. Recently, Furukawa (Computer security-ESORICS 2013, Springer, 129–146, 2013) introduced a new primitive called request-based comparable encryption (comparable encryption for short) which overcomes the problem that OPEs cannot solve. OPEs have the problem that when all the numbers in a certain domain are encrypted by an OPE, an attacker can easily obtain all the orders of the encrypted numbers and hence retrieve the original numbers. However, comparable encryption is not efficient enough both in storage and in computation workload. Comparable encryption based on sliding window method Koç in Comput Math Appl 30:17–24, 1995 can adaptively adjust the window size to achieve a high performance. We set the window size as a constant number to conveniently generate ciphertexts and compare with others. Besides, the proposed scheme allows the users to obtain a variable trade-off between security and efficiency through adaptively setting the window size.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Ada PR, Li FH, Nickolai Z (2013) An ideal-security protocol for order-preserving encoding. In: Security and privacy (SP), 2013 IEEE symposium. IEEE, pp 463–477 (2013) Ada PR, Li FH, Nickolai Z (2013) An ideal-security protocol for order-preserving encoding. In: Security and privacy (SP), 2013 IEEE symposium. IEEE, pp 463–477 (2013)
Zurück zum Zitat Agrawal R, Kiernan J, Srikant R, Xu Y (2004) Order preserving encryption for numeric data. In: Proceedings of the 2004 ACM SIGMOD international conference on management of data. ACM, pp 563–574 Agrawal R, Kiernan J, Srikant R, Xu Y (2004) Order preserving encryption for numeric data. In: Proceedings of the 2004 ACM SIGMOD international conference on management of data. ACM, pp 563–574
Zurück zum Zitat Alexandra B, Nathan C, Younho L, Adam O (2009) Order-preserving symmetric encryption. In: Advances in cryptology-EUROCRYPT 2009. Springer, pp 224–241 Alexandra B, Nathan C, Younho L, Adam O (2009) Order-preserving symmetric encryption. In: Advances in cryptology-EUROCRYPT 2009. Springer, pp 224–241
Zurück zum Zitat Alexandra B, Nathan C, Adam O (2011) Order-preserving encryption revisited: Improved security analysis and alternative solutions. In: Advances in cryptology-CRYPTO 2011. Springer, pp 578–595 Alexandra B, Nathan C, Adam O (2011) Order-preserving encryption revisited: Improved security analysis and alternative solutions. In: Advances in cryptology-CRYPTO 2011. Springer, pp 578–595
Zurück zum Zitat Boneh D, Brent W (2007) Conjunctive, subset, and range queries on encrypted data. In: Theory of cryptography. Springer, pp 535–554 Boneh D, Brent W (2007) Conjunctive, subset, and range queries on encrypted data. In: Theory of cryptography. Springer, pp 535–554
Zurück zum Zitat Castiglione A, Santis AD, Masucci B (2014b) Hierarchical and shared key assignment. In: 17th international conference on network-based information systems, NBIS 2014, IEEE. doi:10.1109/NBiS.2014.106 Castiglione A, Santis AD, Masucci B (2014b) Hierarchical and shared key assignment. In: 17th international conference on network-based information systems, NBIS 2014, IEEE. doi:10.​1109/​NBiS.​2014.​106
Zurück zum Zitat Castiglione A, Pizzolante R, Santis AD, Carpentieri B, Castiglione A, Palmieri F (2015a) Cloud-based adaptive compression and secure management services for 3d healthcare data. Future Gen Comput. Syst. 43–44:120–134. doi:10.1016/j.future.2014.07.001 CrossRef Castiglione A, Pizzolante R, Santis AD, Carpentieri B, Castiglione A, Palmieri F (2015a) Cloud-based adaptive compression and secure management services for 3d healthcare data. Future Gen Comput. Syst. 43–44:120–134. doi:10.​1016/​j.​future.​2014.​07.​001 CrossRef
Zurück zum Zitat Castiglione A, Santis AD, Masucci B (2015b) Key indistinguishability vs. strong key indistinguishability for hierarchical key assignment schemes. IEEE Trans. Dependable Sec. Comput. doi:10.1109/TDSC.2015.2413415 Castiglione A, Santis AD, Masucci B (2015b) Key indistinguishability vs. strong key indistinguishability for hierarchical key assignment schemes. IEEE Trans. Dependable Sec. Comput. doi:10.​1109/​TDSC.​2015.​2413415
Zurück zum Zitat Chen X, Li J, Ma J, Tang Q, Lou W (2014a) New algorithms for secure outsourcing of modular exponentiations. IEEE Trans Parallel Distrib Syst 25(9):2386–2396CrossRef Chen X, Li J, Ma J, Tang Q, Lou W (2014a) New algorithms for secure outsourcing of modular exponentiations. IEEE Trans Parallel Distrib Syst 25(9):2386–2396CrossRef
Zurück zum Zitat Chen X, Li J, Weng J, Ma J, Lou W (2014b) Verifiable computation over large database with incremental updates. In: European symposium on research in Computer Security 2014, LNCS 8712. Springer, pp 148–162 Chen X, Li J, Weng J, Ma J, Lou W (2014b) Verifiable computation over large database with incremental updates. In: European symposium on research in Computer Security 2014, LNCS 8712. Springer, pp 148–162
Zurück zum Zitat Chen X, Huang X, Li J, Ma J, Lou W (2015) New algorithms for secure outsourcing of large-scale systems of linear equations. IEEE Trans Inf Forensics Secur 10(1):69–78CrossRef Chen X, Huang X, Li J, Ma J, Lou W (2015) New algorithms for secure outsourcing of large-scale systems of linear equations. IEEE Trans Inf Forensics Secur 10(1):69–78CrossRef
Zurück zum Zitat Furukawa J (2013) Request-based comparable encryption.In: Computer security-ESORICS 2013. Springer, pp 129–146 Furukawa J (2013) Request-based comparable encryption.In: Computer security-ESORICS 2013. Springer, pp 129–146
Zurück zum Zitat Gao Y, Miao M, Wang J, Chen X (2014) Secure approximate nearest neighbor search over encrypted data. In: Broadband and wireless computing, communication and applications (BWCCA), 2014 ninth international conference. IEEE, pp 578–583 Gao Y, Miao M, Wang J, Chen X (2014) Secure approximate nearest neighbor search over encrypted data. In: Broadband and wireless computing, communication and applications (BWCCA), 2014 ninth international conference. IEEE, pp 578–583
Zurück zum Zitat Kadhem H, Amagasa T, Kitagawa H (2010) A secure and efficient order preserving encryption scheme for relational databases.In: KMIS 2010-Proceedings of the international conference on knowledge management and information sharing, Valencia, Spain, 25–28 Oct 2010, pp 25–35 Kadhem H, Amagasa T, Kitagawa H (2010) A secure and efficient order preserving encryption scheme for relational databases.In: KMIS 2010-Proceedings of the international conference on knowledge management and information sharing, Valencia, Spain, 25–28 Oct 2010, pp 25–35
Zurück zum Zitat Lee S, Park TJ, Lee D, Nam T, Kim S (2009) Chaotic order preserving encryption for efficient and secure queries on databases. IEICE Trans Inf Syst 92(11):2207–2217CrossRef Lee S, Park TJ, Lee D, Nam T, Kim S (2009) Chaotic order preserving encryption for efficient and secure queries on databases. IEICE Trans Inf Syst 92(11):2207–2217CrossRef
Zurück zum Zitat Li J, Wang Q, Wang C, Cao N, Ren K, Lou W (2010) Fuzzy keyword search over encrypted data in cloud computing. In: INFOCOM, 2010 Proceedings IEEE. IEEE, pp 1–5 Li J, Wang Q, Wang C, Cao N, Ren K, Lou W (2010) Fuzzy keyword search over encrypted data in cloud computing. In: INFOCOM, 2010 Proceedings IEEE. IEEE, pp 1–5
Zurück zum Zitat Liu D, Wang S (2012) Programmable order-preserving secure index for encrypted database query. In: 2012 IEEE 5th international conference on cloud computing (CLOUD). IEEE, pp 502–509 Liu D, Wang S (2012) Programmable order-preserving secure index for encrypted database query. In: 2012 IEEE 5th international conference on cloud computing (CLOUD). IEEE, pp 502–509
Zurück zum Zitat Liu D, Wang S (2013) Nonlinear order preserving index for encrypted database query in service cloud environments. Concurr Comput: Pract Exp 25(13):1967–1984CrossRef Liu D, Wang S (2013) Nonlinear order preserving index for encrypted database query in service cloud environments. Concurr Comput: Pract Exp 25(13):1967–1984CrossRef
Zurück zum Zitat Mihir B, Alexandra B, Lars K, Chanathip N (2001) Online ciphers and the hash-cbc construction. In: Advances in cryptology-CRYPTO 2001. Springer, pp 292–309 Mihir B, Alexandra B, Lars K, Chanathip N (2001) Online ciphers and the hash-cbc construction. In: Advances in cryptology-CRYPTO 2001. Springer, pp 292–309
Zurück zum Zitat Mihir B, Alexandra B, Adam O (2007) Deterministic and efficiently searchable encryption. In: Advances in cryptology-CRYPTO 2007. Springer, pp 535–552 Mihir B, Alexandra B, Adam O (2007) Deterministic and efficiently searchable encryption. In: Advances in cryptology-CRYPTO 2007. Springer, pp 535–552
Zurück zum Zitat Popa RA, Redfield CMS, Zeldovich N, Balakrishnan H (2011) Cryptdb:protecting confidentiality with encrypted query processing. In: Proceedings of the twenty-third ACM symposium on operating systems principles. ACM, pp 85–100 Popa RA, Redfield CMS, Zeldovich N, Balakrishnan H (2011) Cryptdb:protecting confidentiality with encrypted query processing. In: Proceedings of the twenty-third ACM symposium on operating systems principles. ACM, pp 85–100
Zurück zum Zitat Shi E, Bethencourt J, Hubert THC, Song D, Perrig A (2007) Multi-dimensional range query over encrypted data. In: Security and privacy, 2007. SP’07. IEEE symposium. IEEE, pp 350–364 Shi E, Bethencourt J, Hubert THC, Song D, Perrig A (2007) Multi-dimensional range query over encrypted data. In: Security and privacy, 2007. SP’07. IEEE symposium. IEEE, pp 350–364
Zurück zum Zitat Tang Q (2010) Privacy preserving mapping schemes supporting comparison.In: Proceedings of the 2010 ACM workshop on cloud computing security workshop. ACM, pp 53–58 Tang Q (2010) Privacy preserving mapping schemes supporting comparison.In: Proceedings of the 2010 ACM workshop on cloud computing security workshop. ACM, pp 53–58
Zurück zum Zitat Wang C, Cao N, Li J, Ren K, Lou W (2010) Secure ranked keyword search over encrypted cloud data. In: 2010 IEEE 30th international conference on distributed computing systems (ICDCS). IEEE, pp 253–262 Wang C, Cao N, Li J, Ren K, Lou W (2010) Secure ranked keyword search over encrypted cloud data. In: 2010 IEEE 30th international conference on distributed computing systems (ICDCS). IEEE, pp 253–262
Zurück zum Zitat Wang J, Ma H, Tang Q, Li J, Zhu H, Ma S, Chen X (2013) Efficient verifiable fuzzy keyword search over encrypted data in cloud computing. Comput Sci Inf Syst 10(2):667–684CrossRef Wang J, Ma H, Tang Q, Li J, Zhu H, Ma S, Chen X (2013) Efficient verifiable fuzzy keyword search over encrypted data in cloud computing. Comput Sci Inf Syst 10(2):667–684CrossRef
Zurück zum Zitat Yum DH, Kim DS, Jin SK, Lee PJ, Hong SJ (2012) Order-preserving encryption for non-uniformly distributed plaintexts. In: Information security applications. Springer, pp 84–97 Yum DH, Kim DS, Jin SK, Lee PJ, Hong SJ (2012) Order-preserving encryption for non-uniformly distributed plaintexts. In: Information security applications. Springer, pp 84–97
Zurück zum Zitat Yun D, Karsten K (2010) Model-driven application-level encryption for the privacy of e-health data. In: Availability, reliability, and security, 2010. ARES’10 international conference. IEEE, pp 341–346 Yun D, Karsten K (2010) Model-driven application-level encryption for the privacy of e-health data. In: Availability, reliability, and security, 2010. ARES’10 international conference. IEEE, pp 341–346
Metadaten
Titel
Efficient request-based comparable encryption scheme based on sliding window method
verfasst von
Peng Chen
Jun Ye
Xiaofeng Chen
Publikationsdatum
18.07.2015
Verlag
Springer Berlin Heidelberg
Erschienen in
Soft Computing / Ausgabe 11/2016
Print ISSN: 1432-7643
Elektronische ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-015-1766-6

Weitere Artikel der Ausgabe 11/2016

Soft Computing 11/2016 Zur Ausgabe