[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Secure Query Processing over Encrypted Data Using a Distributed Index Structure for Outsourcing Sensitive Data

  • Conference paper
  • First Online:
Economics of Grids, Clouds, Systems, and Services (GECON 2018)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 11113))

  • 751 Accesses

Abstract

As the outsourcing of sensitive data has been spotlighted, data encryption schemes are required to protect the data. Accordingly, it is necessary to develop not only a distributed index structure to efficiently manage the large amount of encrypted data, but also a query processing scheme over the encrypted data. Meanwhile, the existing query processing schemes over the encrypted data cannot support top-k query processing algorithm which aim to quickly retrieve k number of the highest ranking tuples. To solve the problems, in this paper, we propose a secure query processing scheme over the encrypted data using a distributed index structure. The proposed distributed index structure guarantees data privacy preservation and performance improvement for the various types of queries. Finally, we show from our performance analysis that our proposed index structure and secure query processing scheme are suitable for protecting the data privacy of the sensitive data.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 35.99
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 44.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    https://451research.com/report-short?entityId=78105&referrer=marketing.

References

  1. https://research.fb.com/facebook-s-top-open-data-problems/

  2. Advanced Encryption Standard (AES): NIST-Federal Information Processing Standards Publication 197 (2001)

    Google Scholar 

  3. RSA Laboratories.: RSAREF: A Cryptographic Toolkit Version 2.0 (1994). Homepage. https://www.rsa.com/en-us. Accessed 29 June 2017

  4. Popa, R.A., Redfield, C.M.S., Zeldovich, N., Balakrishnan, H.: CryptDB: protecting confidentiality with encrypted query processing. In: Proceedings of the 23rd ACM Symposium on Operating Systems Principles, pp. 85–100. ACM (2011)

    Google Scholar 

  5. Dasgupta, S., Freund, Y.: Random projection trees and low dimensional manifolds. In: Proceedings of the Fortieth Annual ACM Symposium on Theory of Computing, pp. 537–546. ACM (2008)

    Google Scholar 

  6. Yazdani, N., Min, P.S.: Prefix trees: new efficient data structures for matching strings of different lengths. In: 2001 International Symposium on Database Engineering and Applications. IEEE (2001)

    Google Scholar 

  7. Xie, M., Lakshmanan, L.V., Wood, P.T.: Efficient top-k query answering using cached views. In: Proceedings of the 16th International Conference on Extending Database Technology, pp. 489–500. ACM (2013)

    Google Scholar 

  8. Noiumkar, P., Chomsiri, T.: A comparison the level of security on top 5 open source NoSQL databases. In: The 9th International Conference on Information Technology and Applications (ICITA) (2014)

    Google Scholar 

  9. http://cassandra.apache.org/

  10. https://www.mongodb.com/

  11. Poddar, R., Boelter, T., Popa, R.A.: Arx: a strongly encrypted database system. In: International Association for Cryptologic Research (IACR) Cryptology ePrint Archive (2016)

    Google Scholar 

  12. Ge, T., Zdonik, S.: Answering aggregation queries in a secure system model. In: Proceedings of the 33rd International Conference on Vary Large Data Bases, VLDB, pp. 519–530 (2007)

    Google Scholar 

  13. Corena, J., Ohtsuki, T.: Secure and fast aggregation of financial data in cloud based expense tracking applications. J. Netw. Syst. Manag. 20(4), 534–560 (2012)

    Article  Google Scholar 

  14. Thompson, B., Haber, S., Horne, W.G., Sander, T., Yao, D.: Privacy-preserving computation and verification of aggregate queries on outsourced databases. In: Goldberg, I., Atallah, M.J. (eds.) PETS 2009. LNCS, vol. 5672, pp. 185–201. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-03168-7_11

    Chapter  Google Scholar 

Download references

Acknowledgment

This work was partly supported by Institute for Information & communications Technology Promotion (IITP) grant funded by the Korea government (MSIP) (NO. R0113-16-0005, Development of an Unified Data Engineering Technology for Large-scale Transaction Processing and Real-time Complex Analytics). This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (grant number 2016R1D1A3B03935298).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jae-Woo Chang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Lee, H., Ma, H., Song, Y., Chang, JW. (2019). Secure Query Processing over Encrypted Data Using a Distributed Index Structure for Outsourcing Sensitive Data. In: Coppola, M., Carlini, E., D’Agostino, D., Altmann, J., Bañares, J. (eds) Economics of Grids, Clouds, Systems, and Services. GECON 2018. Lecture Notes in Computer Science(), vol 11113. Springer, Cham. https://doi.org/10.1007/978-3-030-13342-9_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-13342-9_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-13341-2

  • Online ISBN: 978-3-030-13342-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics