Skip to main content

2018 | OriginalPaper | Buchkapitel

Secure Range Query over Encrypted Data in Outsourced Environments

verfasst von : Ningning Cui, Xiaochun Yang, Leixia Wang, Bin Wang, Jianxin Li

Erschienen in: Database Systems for Advanced Applications

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With the rapid development of cloud computing paradigm, data owners have the opportunity to outsource their databases and management tasks to the cloud. Due to the privacy concerns, it is required for them to encrypt the databases before outsourcing. However, there is no existing techniques handling range queries in a fully secure way. Therefore, in this paper we focus exactly on secure processing of range queries over outsourced encrypted databases. To efficiently process secure range queries, the extraordinarily challenging task is how to perform fully secure range queries over encrypted data without the cloud ever decrypting the data. To address the challenge, we first propose a basic secure range queries algorithm which is not absolutely secure (i.e., leaking the privacy of access patterns and path patterns). To meet a better security, we present a fully secure algorithm that preserves the privacy of the data, query, result, access patterns and path patterns. At last, we empirically analyze and conduct a comprehensive performance evaluation using real dataset to validate our ideas and the proposed secure algorithms.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
[z] denotes the standard binary conversion (e.g., for m = 8, [6] = ‘00000110’, where m represents the domain size in bits).
 
2
\((M)_{Min}^{Max}\) denotes the point with the minimum and the point with the maximum coordinate values in each dimension, respectively.
 
Literatur
1.
Zurück zum Zitat Elmehdwi, Y., Samanthula, B.K., Jiang, W.: Secure k-nearest neighbor query over encrypted data in outsourced environments. In: ICDE, pp. 664–675. IEEE, Chicago (2014) Elmehdwi, Y., Samanthula, B.K., Jiang, W.: Secure k-nearest neighbor query over encrypted data in outsourced environments. In: ICDE, pp. 664–675. IEEE, Chicago (2014)
2.
Zurück zum Zitat Li, S.P., Wong, M.H.: Privacy-preserving queries over outsourced data with access pattern protection. In: IEEE International Conference on Data Mining Workshop, pp. 581–588. IEEE, Shenzhen (2014) Li, S.P., Wong, M.H.: Privacy-preserving queries over outsourced data with access pattern protection. In: IEEE International Conference on Data Mining Workshop, pp. 581–588. IEEE, Shenzhen (2014)
3.
Zurück zum Zitat Liu, J., Yang, J., Xiong, L., et al.: Secure skyline queries on cloud platform. In: International Conference on Data Engineering, pp. 633–645. IEEE, San Diego (2017) Liu, J., Yang, J., Xiong, L., et al.: Secure skyline queries on cloud platform. In: International Conference on Data Engineering, pp. 633–645. IEEE, San Diego (2017)
4.
Zurück zum Zitat Liu, A., Kai, Z., Lu, L., et al.: Efficient secure similarity computation on encrypted trajectory data. In: International Conference on Data Engineering, pp. 66–77. IEEE, Seoul (2015) Liu, A., Kai, Z., Lu, L., et al.: Efficient secure similarity computation on encrypted trajectory data. In: International Conference on Data Engineering, pp. 66–77. IEEE, Seoul (2015)
5.
Zurück zum Zitat Hore, B., Mehrotra, S., Tsudik, G.: A privacy-preserving index for range queries. In: Thirtieth International Conference on Very Large Data Bases VLDB Endowment, pp. 720–731. ACM, Toronto (2004) Hore, B., Mehrotra, S., Tsudik, G.: A privacy-preserving index for range queries. In: Thirtieth International Conference on Very Large Data Bases VLDB Endowment, pp. 720–731. ACM, Toronto (2004)
6.
Zurück zum Zitat Hore, B., Mehrotra, S., Canim, M., Kantarcioglu, M.: Secure multidimensional range queries over outsourced data. VLDB J. 21(3), 333–358 (2012)CrossRef Hore, B., Mehrotra, S., Canim, M., Kantarcioglu, M.: Secure multidimensional range queries over outsourced data. VLDB J. 21(3), 333–358 (2012)CrossRef
7.
Zurück zum Zitat Chi, J., Hong, C., Zhang, M., Zhang, Z.: Privacy-enhancing range query processing over encrypted cloud databases. In: WISE, pp. 63–77 (2015) Chi, J., Hong, C., Zhang, M., Zhang, Z.: Privacy-enhancing range query processing over encrypted cloud databases. In: WISE, pp. 63–77 (2015)
8.
Zurück zum Zitat Shi, E., Bethencourt, J., Chan, T.H., et al.: Multi-dimensional range query over encrypted data. In: Security and Privacy, pp. 350–364. IEEE (2007) Shi, E., Bethencourt, J., Chan, T.H., et al.: Multi-dimensional range query over encrypted data. In: Security and Privacy, pp. 350–364. IEEE (2007)
9.
Zurück zum Zitat Wang, P., Ravishankar, C.V.: Secure and efficient range queries on outsourced databases using \(\widehat{R}\)-trees. In: IEEE International Conference on Data Engineering, pp. 314–325. IEEE, Brisbane (2013) Wang, P., Ravishankar, C.V.: Secure and efficient range queries on outsourced databases using \(\widehat{R}\)-trees. In: IEEE International Conference on Data Engineering, pp. 314–325. IEEE, Brisbane (2013)
11.
Zurück zum Zitat Wang, B., Li, M., Wang, H.: Geometric range search on encrypted spatial data. IEEE Trans. Inf. Forensics Secur. 11(4), 704–719 (2016) Wang, B., Li, M., Wang, H.: Geometric range search on encrypted spatial data. IEEE Trans. Inf. Forensics Secur. 11(4), 704–719 (2016)
12.
Zurück zum Zitat Wang, B., Hou, Y., Li, M., Wang, H., Li, H.: Maple: scalable multi-dimensional range search over encrypted cloud data with tree-based index. In: ASIA CCS, pp. 111–122. ACM, Kyoto (2014) Wang, B., Hou, Y., Li, M., Wang, H., Li, H.: Maple: scalable multi-dimensional range search over encrypted cloud data with tree-based index. In: ASIA CCS, pp. 111–122. ACM, Kyoto (2014)
13.
Zurück zum Zitat Li, R., Liu, A.X., Wang, A.L., et al.: Fast and scalable range query processing with strong privacy protection for cloud computing. IEEE/ACM Trans. Netw. 24(4), 2305–2318 (2016)CrossRef Li, R., Liu, A.X., Wang, A.L., et al.: Fast and scalable range query processing with strong privacy protection for cloud computing. IEEE/ACM Trans. Netw. 24(4), 2305–2318 (2016)CrossRef
16.
Zurück zum Zitat Samanthula, B.K.K., Hu, C., Jiang, W.: An efficient and probabilistic secure bit-decomposition. In: ASIA CCS, pp. 541–546. ACM, Hangzhou (2013) Samanthula, B.K.K., Hu, C., Jiang, W.: An efficient and probabilistic secure bit-decomposition. In: ASIA CCS, pp. 541–546. ACM, Hangzhou (2013)
Metadaten
Titel
Secure Range Query over Encrypted Data in Outsourced Environments
verfasst von
Ningning Cui
Xiaochun Yang
Leixia Wang
Bin Wang
Jianxin Li
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-91458-9_7