[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3151759.3151786acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiiwasConference Proceedingsconference-collections
research-article

An index-based secure query processing scheme for outsourced databases

Published: 04 December 2017 Publication History

Abstract

This paper proposes an index-based approach for secure query processing. Due to the rapid proliferation of cloud computing services in diverse applications, such as database as a service (DBaaS), and encrypted database systems (EDBSs) have been gaining much attentions as a way to construct secure databases in DBaaS. However, most of the existing works suffer from poor performance when dealing with large data. Some works proposed index-based query processing schemes, but they have a privacy problem that the order of attribute values may be revealed from the index structure on the server. To this problem, we propose a novel secure index-based query processing scheme where the order of attribute values is not disclosed. In the scheme, the index is maintained in such a way that the structural information regarding the index and the values (or index entries) are maintained separately, and only the latter is stored in a cloud server. When searching, a client uses the structural information (without entries) to traverse the index by cooperating with cloud servers, thereby securing the order among the index entries. We prove that, in our scheme, the order among the index entries would not be disclosed even though the data and the query log are disclosed. In addition, our experimental results show that the proposed scheme significantly outperforms existing state-of-the-art schemes.

References

[1]
R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu. 2004. Order-Preserving Encryption for Numeric Data. In Proceedings of the ACM SIGMOD International Conference on Management of Data, Paris, France, June 13--18, 2004. 563--574.
[2]
I. F. Blake and V. Kolesnikov. 2004. Strong Conditional Oblivious Transfer and Computing on Intervals. In Advances in Cryptology - ASIACRYPT 2004, 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5--9, 2004, Proceedings. 515--529.
[3]
Alexandra Boldyreva, Nathan Chenette, Younho Lee, and Adam O'Neill. 2009. Order-Preserving Symmetric Encryption. In Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26--30, 2009. Proceedings. 224--241.
[4]
D. Boneh, G. D. Crescenzo, R. Ostrovsky, and G. Persiano. 2004. Public Key Encryption with Keyword Search. In Advances in Cryptology - EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2--6, 2004, Proceedings. 506--522.
[5]
T. ElGamal. 1985. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Information Theory 31, 4 (1985), 469--472.
[6]
T. Ge and S. B. Zdonik. 2007. Answering Aggregation Queries in a Secure System Model. In Proceedings of the 33rd International Conference on VLDB, University of Vienna, Austria, September 23--27, 2007. 519--530. http://www.vldb.org/conf/2007/papers/research/p519-ge.pdf
[7]
C. Gentry. 2009. Fully homomorphic encryption using ideal lattices. In Proceedings of the 41st Annual ACM Symposium on Theory of Computing, STOC 2009, Bethesda, MD, USA, May 31 - June 2, 2009. 169--178.
[8]
H. Hacigümüs, B. R. Iyer, C. Li, and S. Mehrotra. 2002. Executing SQL over encrypted data in the database-service-provider model. In Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data, Madison, Wisconsin, June 3--6, 2002. 216--227.
[9]
B. Hore, S. Mehrotra, and G. Tsudik. 2004. A Privacy-Preserving Index for Range Queries. In (e)Proceedings of the Thirtieth International Conference on VLDB, Toronto, Canada, August 31 - September 3 2004. 720--731. http://www.vldb.org/conf/2004/RS19P2.PDF
[10]
H. Hu, J. Xu, X. Xu, K. Pei, B. Choi, and S. Zhou. 2014. Private search on key-value stores with hierarchical indexes. In IEEE 30th International Conference on Data Engineering, Chicago, ICDE 2014, IL, USA, March 31 - April 4, 2014. 628--639.
[11]
Hasan Kadhem, Toshiyuki Amagasa, and Hiroyuki Kitagawa. 2010. MV-OPES: Multivalued-Order Preserving Encryption Scheme: A Novel Scheme for Encrypting Integer Value to Many Different Values. IEICE Transactions 93-D, 9 (2010), 2520--2533. http://search.ieice.org/bin/summary.php?id=e93-d_9_2520
[12]
M. Kuzu, M. S. Islam, and M. Kantarcioglu. 2012. Efficient Similarity Search over Encrypted Data. In Proceedings of the 2012 IEEE 28th International Conference on Data Engineering (ICDE '12). IEEE Computer Society, Washington, DC, USA, 1156--1167.
[13]
S. Lee, T. J. Park, D. Lee, T. Nam, and S. Kim. 2009. Chaotic Order Preserving Encryption for Efficient and Secure Queries on Databases. IEICE Transactions 92-D, 11 (2009), 2207--2217. http://search.ieice.org/bin/summary.php?id=e92-d_11_2207
[14]
E. Mykletun and G. Tsudik. 2006. Aggregation Queries in the Database-As-a-Service Model. In Data and Applications Security XX, 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006, Proceedings. 89--103.
[15]
P. Paillier. 1999. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In Advances in Cryptology - EUROCRYPT '99. 223--238.
[16]
R. A. Popa, C. M. S. Redfield, N. Zeldovich, and H. Balakrishnan. 2012. CryptDB: processing queries on an encrypted database. CACM, 2012 55, 9 (2012), 103--111.
[17]
S. Tu, M. F. Kaashoek, S. Madden, and N. Zeldovich. 2013. Processing Analytical Queries over Encrypted Data. PVLDB 6, 5 (2013), 289--300. http://www.vldb.org/pvldb/vol6/p289-tu.pdf
[18]
Hui Wang and Laks V. S. Lakshmanan. 2006. Efficient Secure Query Evaluation over Encrypted XML Databases. In Proceedings of the 32Nd International Conference on Very Large Data Bases (VLDB 06). VLDB Endowment, 127--138. http://dl.acm.org/citation.cfm?id=1182635.1164140
[19]
Peng Wang and Chinya V. Ravishankar. 2013. Secure and Efficient Range Queries on Outsourced Databases Using Rp-trees. In Proceedings of the 2013 IEEE International Conference on Data Engineering (ICDE 2013) (ICDE 13). IEEE Computer Society, Washington, DC, USA, 314--325.
[20]
W. K. Wong, B. Kao, D. W. L. Cheung, R. Li, and S. M. Yiu. 2014. Secure query processing with data interoperability in a cloud database environment. In International Conference on Management of Data, SIGMOD 2014, Snowbird, UT, USA, June 22--27, 2014. 1395--1406.

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
iiWAS '17: Proceedings of the 19th International Conference on Information Integration and Web-based Applications & Services
December 2017
609 pages
ISBN:9781450352994
DOI:10.1145/3151759
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 04 December 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. database as a service
  2. encrypted database system
  3. privacy preservation

Qualifiers

  • Research-article

Funding Sources

  • JSPS KAKENHI

Conference

iiWAS2017

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 86
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Dec 2024

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media