Skip to main content
Top

2020 | OriginalPaper | Chapter

Designing a Bit-Based Model to Accelerate Query Processing Over Encrypted Databases in Cloud

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Database users have started moving toward the use of cloud computing as a service because it provides computation and storage needs at affordable prices. However, for most of the users, the concern of privacy plays a major role as they cannot control data access once their data are outsourced, especially if the cloud provider is curious about their data. Data encryption is an effective way to solve privacy concerns, but executing queries over encrypted data is a problem that needs attention. In this research, we introduce a bit-based model to execute different relational algebra operators over encrypted databases at the cloud without decrypting the data. To encrypt data, we use the randomized encryption algorithm (AES-CBC) to provide the maximum-security level. The idea is based on classifying attributes as sensitive and non-sensitive, where only sensitive attributes are encrypted. For each sensitive attribute, the table’s owner predefines the possible partition domains on which the tuples will be encoded into bit vectors before the encryption. We store the bit vectors in an additional column in the encrypted table in the cloud. We use those bits to retrieve only part of encrypted records that are candidates for a specific query. We implemented and evaluated our model and found that the proposed model is practical and success to minimize the range of the retrieved encrypted records to less than 30% of the whole set of encrypted records in a table.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Almakdi, S., Panda, B.: Secure and efficient query processing technique for encrypted databases in cloud. In: 2019 2nd International Conference on Data Intelligence and Security (ICDIS). IEEE (2019) Almakdi, S., Panda, B.: Secure and efficient query processing technique for encrypted databases in cloud. In: 2019 2nd International Conference on Data Intelligence and Security (ICDIS). IEEE (2019)
2.
go back to reference Alsirhani, A., Bodorik, P., Sampalli, S.: Improving database security in cloud computing by fragmentation of data. In: 2017 International Conference on Computer and Applications (ICCA). IEEE (2017) Alsirhani, A., Bodorik, P., Sampalli, S.: Improving database security in cloud computing by fragmentation of data. In: 2017 International Conference on Computer and Applications (ICCA). IEEE (2017)
3.
go back to reference Cui, S., Asghar, M.R., Galbraith, S.D., Russello, G.: P-McDb: privacy-preserving search using multi-cloud encrypted databases. In: 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), pp. 334–341. IEEE, June 2017 Cui, S., Asghar, M.R., Galbraith, S.D., Russello, G.: P-McDb: privacy-preserving search using multi-cloud encrypted databases. In: 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), pp. 334–341. IEEE, June 2017
4.
go back to reference Cash, D., et al.: Dynamic searchable encryption in very-large databases: data structures and implementation. In: NDSS 2014. The Internet Society (2014) Cash, D., et al.: Dynamic searchable encryption in very-large databases: data structures and implementation. In: NDSS 2014. The Internet Society (2014)
5.
go back to reference Cash, D., Grubbs, P., Perry, J., Ristenpart, T.: Leakage-abuse attacks against searchable encryption. In: Ray, I., Li, N., Kruegel, C. (eds.) SIGSAC 2015, pp. 668–679. ACM (2015) Cash, D., Grubbs, P., Perry, J., Ristenpart, T.: Leakage-abuse attacks against searchable encryption. In: Ray, I., Li, N., Kruegel, C. (eds.) SIGSAC 2015, pp. 668–679. ACM (2015)
6.
go back to reference Stefanov, E., Papamanthou, C., Shi, E.: Practical dynamic searchable encryption with small leakage. In: NDSS 2013, vol. 71, pp. 72–75 (2014) Stefanov, E., Papamanthou, C., Shi, E.: Practical dynamic searchable encryption with small leakage. In: NDSS 2013, vol. 71, pp. 72–75 (2014)
7.
go back to reference Gentry, C.: Fully homomorphic encryption using ideal lattices. In: STOC, vol. 9, no. 2009, pp. 169–178, May 2009 Gentry, C.: Fully homomorphic encryption using ideal lattices. In: STOC, vol. 9, no. 2009, pp. 169–178, May 2009
9.
go back to reference Hacigümüş, H., Iyer, B., Li, C., Mehrotra, S.: Executing SQL over encrypted data in the database-service-provider model. In: Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data, pp. 216–227. ACM (2002) Hacigümüş, H., Iyer, B., Li, C., Mehrotra, S.: Executing SQL over encrypted data in the database-service-provider model. In: Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data, pp. 216–227. ACM (2002)
10.
go back to reference Hacigumus, V.H., Raghavendra Iyer, B., Mehrotra, S.: Query optimization in encrypted database systems. U.S. Patent No. 7,685,437, 23 Mar 2010 Hacigumus, V.H., Raghavendra Iyer, B., Mehrotra, S.: Query optimization in encrypted database systems. U.S. Patent No. 7,685,437, 23 Mar 2010
11.
go back to reference Hore, B., et al.: Secure multidimensional range queries over outsourced data. VLDB J. 21(3), 333–358 (2012)CrossRef Hore, B., et al.: Secure multidimensional range queries over outsourced data. VLDB J. 21(3), 333–358 (2012)CrossRef
12.
go back to reference Hore, B., Mehrotra, S., Tsudik, G.: A privacy-preserving index for range queries. In: Proceedings of the Thirtieth International Conference on Very Large Data Bases-Volume 30. VLDB Endowment (2004) Hore, B., Mehrotra, S., Tsudik, G.: A privacy-preserving index for range queries. In: Proceedings of the Thirtieth International Conference on Very Large Data Bases-Volume 30. VLDB Endowment (2004)
13.
go back to reference Li, K., Zhang, W., Yang, C., Yu, N.: Security analysis on one-to-many order preserving encryption-based cloud data search. IEEE Trans. Inf. Forensics Secur. 10(9), 1918–1926 (2015)CrossRef Li, K., Zhang, W., Yang, C., Yu, N.: Security analysis on one-to-many order preserving encryption-based cloud data search. IEEE Trans. Inf. Forensics Secur. 10(9), 1918–1926 (2015)CrossRef
15.
go back to reference Li, J., Liu, Z., Chen, X., Xhafa, F., Tan, X., Wong, D.S.: L-EncDB: a lightweight framework for privacy-preserving data queries in cloud computing. Knowl.-Based Syst. 79, 18–26 (2015)CrossRef Li, J., Liu, Z., Chen, X., Xhafa, F., Tan, X., Wong, D.S.: L-EncDB: a lightweight framework for privacy-preserving data queries in cloud computing. Knowl.-Based Syst. 79, 18–26 (2015)CrossRef
16.
go back to reference Liu, D., Wang, S.: Nonlinear order preserving index for encrypted database query in service cloud environments. Concurrency Comput. Pract. Exp. 25(13), 1967–1984 (2013)CrossRef Liu, D., Wang, S.: Nonlinear order preserving index for encrypted database query in service cloud environments. Concurrency Comput. Pract. Exp. 25(13), 1967–1984 (2013)CrossRef
17.
go back to reference Liu, G., Yang, G., Wang, H., Xiang, Y., Dai, H.: A novel secure scheme for supporting complex SQL queries over encrypted databases in cloud computing. Secur. Commun. Netw. 2018, 15 (2018) Liu, G., Yang, G., Wang, H., Xiang, Y., Dai, H.: A novel secure scheme for supporting complex SQL queries over encrypted databases in cloud computing. Secur. Commun. Netw. 2018, 15 (2018)
18.
go back to reference Liu, X., Choo, K.K.R., Deng, R.H., Lu, R., Weng, J.: Efficient and privacy-preserving outsourced calculation of rational numbers. IEEE Trans. Dependable Secure Comput. 15(1), 27–39 (2018)CrossRef Liu, X., Choo, K.K.R., Deng, R.H., Lu, R., Weng, J.: Efficient and privacy-preserving outsourced calculation of rational numbers. IEEE Trans. Dependable Secure Comput. 15(1), 27–39 (2018)CrossRef
19.
go back to reference Liu, Z., Chen, X., Yang, J., Jia, C., You, I.: New order preserving encryption model for outsourced databases in cloud environments. J. Netw. Comput. Appl. 59, 198–207 (2016)CrossRef Liu, Z., Chen, X., Yang, J., Jia, C., You, I.: New order preserving encryption model for outsourced databases in cloud environments. J. Netw. Comput. Appl. 59, 198–207 (2016)CrossRef
20.
go back to reference Asghar, M.R., Russello, G., Crispo, B., Ion, M.: Supporting complex queries and access policies for multi-user encrypted databases. In: Juels, A., Parno, B. (eds.) CCSW 2013, pp. 77–88. ACM (2013) Asghar, M.R., Russello, G., Crispo, B., Ion, M.: Supporting complex queries and access policies for multi-user encrypted databases. In: Juels, A., Parno, B. (eds.) CCSW 2013, pp. 77–88. ACM (2013)
21.
go back to reference Omran, O.M.: Data partitioning methods to process queries on encrypted databases on the cloud. Theses and Dissertations. 1580 (2016) Omran, O.M.: Data partitioning methods to process queries on encrypted databases on the cloud. Theses and Dissertations. 1580 (2016)
22.
go back to reference Poddar, R., Boelter, T., Popa, R.A.: Arx: A strongly encrypted database system. IACR Cryptology ePrint Archive 2016, 591 (2016) Poddar, R., Boelter, T., Popa, R.A.: Arx: A strongly encrypted database system. IACR Cryptology ePrint Archive 2016, 591 (2016)
23.
go back to reference Popa, R.A., et al.: CryptDB: processing queries on an encrypted database. Commun. ACM 55(9), 103–111 (2012)CrossRef Popa, R.A., et al.: CryptDB: processing queries on an encrypted database. Commun. ACM 55(9), 103–111 (2012)CrossRef
24.
go back to reference Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.R.: Order preserving encryption for numeric data. In: Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD 2004), Paris, France, June 2004, pp. 563–574. ACM (2004) Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.R.: Order preserving encryption for numeric data. In: Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD 2004), Paris, France, June 2004, pp. 563–574. ACM (2004)
26.
go back to reference Raybourn, T.: Bucketization techniques for encrypted databases: quantifying the impact of query distributions. Dissertation, Bowling Green State University (2013) Raybourn, T.: Bucketization techniques for encrypted databases: quantifying the impact of query distributions. Dissertation, Bowling Green State University (2013)
27.
go back to reference Shastri, S., Kresman, R., Lee, J.K.: An improved algorithm for querying encrypted data in the cloud. 2015 Fifth International Conference on Communication Systems and Network Technologies (CSNT). IEEE (2015) Shastri, S., Kresman, R., Lee, J.K.: An improved algorithm for querying encrypted data in the cloud. 2015 Fifth International Conference on Communication Systems and Network Technologies (CSNT). IEEE (2015)
28.
go back to reference Tu, S., et al.: Processing analytical queries over encrypted data. In: Proceedings of the VLDB Endowment. vol. 6. no. 5 (2013)CrossRef Tu, S., et al.: Processing analytical queries over encrypted data. In: Proceedings of the VLDB Endowment. vol. 6. no. 5 (2013)CrossRef
29.
go back to reference Wang, J., et al.: Bucket-based authentication for outsourced databases. Concurrency Comput. Pract. Exp. 22(9), 1160–1180 (2010) Wang, J., et al.: Bucket-based authentication for outsourced databases. Concurrency Comput. Pract. Exp. 22(9), 1160–1180 (2010)
30.
go back to reference Wang, W., Hu, Y., Chen, L., Huang, X., Sunar, B.: Exploring the feasibility of fully homomorphic encryption. IEEE Trans. Comput. 64(3), 698–706 (2015)MathSciNetCrossRef Wang, W., Hu, Y., Chen, L., Huang, X., Sunar, B.: Exploring the feasibility of fully homomorphic encryption. IEEE Trans. Comput. 64(3), 698–706 (2015)MathSciNetCrossRef
31.
go back to reference Wong, W.K., et al.: Secure query processing with data interoperability in a cloud database environment. In: Proceedings of the 2014 ACM SIGMOD international conference on Management of data. ACM (2014) Wong, W.K., et al.: Secure query processing with data interoperability in a cloud database environment. In: Proceedings of the 2014 ACM SIGMOD international conference on Management of data. ACM (2014)
32.
go back to reference Zhang, Y., Katz, J., Papamanthou, C.: All your queries are belong to us: the power of file-injection attacks on searchable encryption. In: USENIX Security 2016, pp. 707–720. USENIX Association (2016) Zhang, Y., Katz, J., Papamanthou, C.: All your queries are belong to us: the power of file-injection attacks on searchable encryption. In: USENIX Security 2016, pp. 707–720. USENIX Association (2016)
33.
go back to reference Harkins, D.: Synthetic initialization vector (siv) authenticated encryption using the advanced encryption standard (aes) (2008) Harkins, D.: Synthetic initialization vector (siv) authenticated encryption using the advanced encryption standard (aes) (2008)
Metadata
Title
Designing a Bit-Based Model to Accelerate Query Processing Over Encrypted Databases in Cloud
Authors
Sultan Almakdi
Brajendra Panda
Copyright Year
2020
DOI
https://doi.org/10.1007/978-3-030-48513-9_40

Premium Partner