Skip to main content

2018 | OriginalPaper | Buchkapitel

TRQED: Secure and Fast Tree-Based Private Range Queries over Encrypted Cloud

verfasst von : Wei Yang, Yang Xu, Yiwen Nie, Yao Shen, Liusheng Huang

Erschienen in: Database Systems for Advanced Applications

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With the prevalence of cloud computing, data owners are motivated to outsource their databases to the cloud. However, sensitive information has to be encrypted to preserve the privacy, which inevitably makes effective data utilization a challenging task. Existing work either focuses on keyword searches, or suffers from inadequate security guarantees or inefficiency. In this paper, we focus on the problem of multi-dimensional range queries over dynamic encrypted cloud data. We propose a Tree-based private Range Query scheme over dynamic Encrypted cloud Data (TRQED), which enables faster-than-linear range queries and supports data dynamics while preserving the query privacy and single-dimensional privacy simultaneously. TRQED achieves provable security against semi-honest adversaries under known background model. Extensive experiments on real-world datasets show that the overhead of TRQED is desirable, and TRQED is more efficient compared with existing work.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceedings of IEEE S&P, pp. 44–55 (2000) Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceedings of IEEE S&P, pp. 44–55 (2000)
2.
Zurück zum Zitat Li, M., et al.: Authorized private keyword search over encrypted data in cloud computing. In: Proceedings of IEEE ICDCS, pp. 383–392 (2011) Li, M., et al.: Authorized private keyword search over encrypted data in cloud computing. In: Proceedings of IEEE ICDCS, pp. 383–392 (2011)
3.
Zurück zum Zitat Cao, N., et al.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. In: Proceedings of IEEE INFOCOM, pp. 829–837 (2011) Cao, N., et al.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. In: Proceedings of IEEE INFOCOM, pp. 829–837 (2011)
4.
Zurück zum Zitat Wang, B., et al.: Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud. In: Proceedings of IEEE INFOCOM, pp. 2112–2120 (2014) Wang, B., et al.: Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud. In: Proceedings of IEEE INFOCOM, pp. 2112–2120 (2014)
7.
Zurück zum Zitat Lu, Y.: Privacy-preserving Logarithmic-time search on encrypted data in cloud. In: Proceedings of NDSS (2012) Lu, Y.: Privacy-preserving Logarithmic-time search on encrypted data in cloud. In: Proceedings of NDSS (2012)
8.
Zurück zum Zitat Wang, P., Ravishankar, C.V.: Secure and efficient range queries on outsourced databases using \(\widehat{R}\)-trees. In: Proceedings of IEEE ICDE, pp. 314–325 (2013) Wang, P., Ravishankar, C.V.: Secure and efficient range queries on outsourced databases using \(\widehat{R}\)-trees. In: Proceedings of IEEE ICDE, pp. 314–325 (2013)
9.
Zurück zum Zitat Wang, B., et al.: Maple: scalable multi-dimensional range search over encrypted cloud data with tree-based index. In: Proceedings of ACM ASIACCS, pp. 111–122 (2014) Wang, B., et al.: Maple: scalable multi-dimensional range search over encrypted cloud data with tree-based index. In: Proceedings of ACM ASIACCS, pp. 111–122 (2014)
10.
Zurück zum Zitat Guttman, A.: R-trees: a dynamic index structure for spatial searching. ACM (1984) Guttman, A.: R-trees: a dynamic index structure for spatial searching. ACM (1984)
11.
Zurück zum Zitat Goldreich, O.: Foundations of Cryptography: Basic Applications, vol. 2. Cambridge University Press, Cambridge (2009)MATH Goldreich, O.: Foundations of Cryptography: Basic Applications, vol. 2. Cambridge University Press, Cambridge (2009)MATH
12.
Zurück zum Zitat Wang, C., et al.: Secure ranked keyword search over encrypted cloud data. In: Proceedings of ICDCS, pp. 253–262 (2011) Wang, C., et al.: Secure ranked keyword search over encrypted cloud data. In: Proceedings of ICDCS, pp. 253–262 (2011)
13.
Zurück zum Zitat Li, R., et al.: Fast and scalable range query processing with strong privacy protection for cloud computing. IEEE/ACM Trans. Netw. 24(4), 2305–2318 (2016)CrossRef Li, R., et al.: Fast and scalable range query processing with strong privacy protection for cloud computing. IEEE/ACM Trans. Netw. 24(4), 2305–2318 (2016)CrossRef
14.
Zurück zum Zitat Chi, J., et al.: Fast multi-dimensional range queries on encrypted cloud databases. In: Proceedings of DASFAA, pp. 559–575 (2017) Chi, J., et al.: Fast multi-dimensional range queries on encrypted cloud databases. In: Proceedings of DASFAA, pp. 559–575 (2017)
15.
Zurück zum Zitat Stefanov, E., et al.: Path ORAM: an extremely simple oblivious RAM protocol. In: Proceedings of ACM CCS, pp. 299–310 (2013) Stefanov, E., et al.: Path ORAM: an extremely simple oblivious RAM protocol. In: Proceedings of ACM CCS, pp. 299–310 (2013)
16.
Zurück zum Zitat Curtmola, R., et al.: Searchable symmetric encryption: improved definitions and efficient constructions. J. Comput. Secur. 19(5), 895–934 (2011)CrossRef Curtmola, R., et al.: Searchable symmetric encryption: improved definitions and efficient constructions. J. Comput. Secur. 19(5), 895–934 (2011)CrossRef
19.
Zurück zum Zitat Wong, W.K., et al.: Secure kNN computation on encrypted databases. In: Proceedings of ACM SIGMOD, pp. 139–152 (2009) Wong, W.K., et al.: Secure kNN computation on encrypted databases. In: Proceedings of ACM SIGMOD, pp. 139–152 (2009)
20.
Zurück zum Zitat Sun, W., et al.: Catch you if you lie to me: efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data. In: Proceedings of IEEE INFOCOM, pp. 2110–2118 (2015) Sun, W., et al.: Catch you if you lie to me: efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data. In: Proceedings of IEEE INFOCOM, pp. 2110–2118 (2015)
21.
Zurück zum Zitat Papadopoulos, D., Papadopoulos, S., Triandopoulos, N.: Taking authenticated range queries to arbitrary dimensions. In: Proceedings of ACM CCS, pp. 819–830 (2014) Papadopoulos, D., Papadopoulos, S., Triandopoulos, N.: Taking authenticated range queries to arbitrary dimensions. In: Proceedings of ACM CCS, pp. 819–830 (2014)
22.
Zurück zum Zitat Kawamoto, J., Yoshikawa, M.: Private range query by perturbation and matrix based encryption. In: Proceedings of ICDIM, pp. 211–216 (2011) Kawamoto, J., Yoshikawa, M.: Private range query by perturbation and matrix based encryption. In: Proceedings of ICDIM, pp. 211–216 (2011)
Metadaten
Titel
TRQED: Secure and Fast Tree-Based Private Range Queries over Encrypted Cloud
verfasst von
Wei Yang
Yang Xu
Yiwen Nie
Yao Shen
Liusheng Huang
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-91458-9_8