Skip to main content
Top

2015 | OriginalPaper | Chapter

Partial Order Preserving Encryption Search Trees

Authors : Kyriakos Ispoglou, Christos Makris, Yannis C. Stamatiou, Elias C. Stavropoulos, Athanasios K. Tsakalidis, Vasileios Iosifidis

Published in: Database and Expert Systems Applications

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

As Internet services expand and proliferate, service users’ data show an increase in volume as well as geographical dispersion mainly due to the large number of personalized services that users often access today on a daily basis. This fact, however, presents a user privacy and user data security challenge for service providers: how to protect theirs users’ data from unauthorized access. In this paper we present a new tree-based data structure for storing encrypted information in order to support fast search, update, and delete operations on the encrypted data. The data structure relies on exposing limited ordering information of the data in order to locate them fast. After showing that a totally order preserving encryption scheme is not secure, we describe a new tree data structure and assess its security and efficiency.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
The Duplicates problem: The same plaintext values are always encrypted to the same ciphertext values. Thus an adversary can get meaningful information when the total number of possible plaintext values is small (e.g. Votes in an election). If we use a randomized encryption function, then same data item will appear in many different encrypted forms, thus preventing us from performing fast data operations.
 
Literature
1.
go back to reference Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Order preserving encryption for numeric data. In: Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data (SIGMOD 2004), pp. 563–574, ACM (2014) Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Order preserving encryption for numeric data. In: Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data (SIGMOD 2004), pp. 563–574, ACM (2014)
2.
go back to reference Bjones, R., Krontiris, I., Paillier, P., Rannenberg, K.: Integrating anonymous credentials with eIDs for privacy-respecting online authentication. In: Preneel, B., Ikonomou, D. (eds.) APF 2012. LNCS, vol. 8319, pp. 111–124. Springer, Heidelberg (2014) Bjones, R., Krontiris, I., Paillier, P., Rannenberg, K.: Integrating anonymous credentials with eIDs for privacy-respecting online authentication. In: Preneel, B., Ikonomou, D. (eds.) APF 2012. LNCS, vol. 8319, pp. 111–124. Springer, Heidelberg (2014)
3.
go back to reference Brands, S.: Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy, 1st edn. The MIT Press, Cambridge (2000) Brands, S.: Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy, 1st edn. The MIT Press, Cambridge (2000)
4.
go back to reference Camenisch, J., Groß, T.: Efficient attributes for anonymous credentials. In: Proceedings ACM Conference on Computer and Communications Security, pp. 345–356, ACM (2008) Camenisch, J., Groß, T.: Efficient attributes for anonymous credentials. In: Proceedings ACM Conference on Computer and Communications Security, pp. 345–356, ACM (2008)
5.
go back to reference Ozsoyoglu, S.C., Singer, D.: Anti-tamper databases: querying encrypted databases. In: Proceedings of the 17th Annual IFIP WG 11.3 Working Conference on Database and Applications Security (2003) Ozsoyoglu, S.C., Singer, D.: Anti-tamper databases: querying encrypted databases. In: Proceedings of the 17th Annual IFIP WG 11.3 Working Conference on Database and Applications Security (2003)
Metadata
Title
Partial Order Preserving Encryption Search Trees
Authors
Kyriakos Ispoglou
Christos Makris
Yannis C. Stamatiou
Elias C. Stavropoulos
Athanasios K. Tsakalidis
Vasileios Iosifidis
Copyright Year
2015
DOI
https://doi.org/10.1007/978-3-319-22852-5_5

Premium Partner