[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1109/ICDE.2013.6544835guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Secure and efficient range queries on outsourced databases using Rp-trees

Published: 08 April 2013 Publication History

Abstract

We show how to execute range queries securely and efficiently on encrypted databases in the cloud. Current methods provide either security or efficiency, but not both. Many schemes even reveal the ordering of encrypted tuples, which, as we show, allows adversaries to estimate plaintext values accurately. We present the Rp-tree, a hierarchical encrypted index that may be securely placed in the cloud, and searched efficiently. It is based on a mechanism we design for encrypted halfspace range queries in Rd, using Asymmetric Scalar-product Preserving Encryption. Data owners can tune the Rp-tree parameters to achieve desired security-efficiency tradeoffs. We also present extensive experiments to evaluate Rp-tree performance. Our results show that Rp-tree queries are efficient on encrypted databases, and reveal far less information than competing methods.

Cited By

View all
  • (2023)Secure Cloud Storage and Retrieval of Personal Health Data From Smart Wearable Devices With Privacy-Preserving TechniquesInternational Journal of Web Services Research10.4018/IJWSR.33138820:1(1-18)Online publication date: 5-Oct-2023
  • (2019)Secure search service based on word2vec in the public cloudInternational Journal of Computational Science and Engineering10.5555/3337494.333750518:3(305-313)Online publication date: 1-Jan-2019
  • (2018)Privacy and availability in cloud data warehouseProceedings of the 10th International Conference on Education Technology and Computers10.1145/3290511.3290580(388-391)Online publication date: 26-Oct-2018
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
ICDE '13: Proceedings of the 2013 IEEE International Conference on Data Engineering (ICDE 2013)
April 2013
1595 pages
ISBN:9781467349093

Publisher

IEEE Computer Society

United States

Publication History

Published: 08 April 2013

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 03 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2023)Secure Cloud Storage and Retrieval of Personal Health Data From Smart Wearable Devices With Privacy-Preserving TechniquesInternational Journal of Web Services Research10.4018/IJWSR.33138820:1(1-18)Online publication date: 5-Oct-2023
  • (2019)Secure search service based on word2vec in the public cloudInternational Journal of Computational Science and Engineering10.5555/3337494.333750518:3(305-313)Online publication date: 1-Jan-2019
  • (2018)Privacy and availability in cloud data warehouseProceedings of the 10th International Conference on Education Technology and Computers10.1145/3290511.3290580(388-391)Online publication date: 26-Oct-2018
  • (2017)Dynamic spatial index for efficient query processing on the cloudJournal of Cloud Computing: Advances, Systems and Applications10.1186/s13677-017-0077-06:1(1-16)Online publication date: 1-Dec-2017
  • (2017)An index-based secure query processing scheme for outsourced databasesProceedings of the 19th International Conference on Information Integration and Web-based Applications & Services10.1145/3151759.3151786(215-223)Online publication date: 4-Dec-2017
  • (2017)Secure Range Query Processing over Untrustworthy Cloud ServicesProceedings of the 21st International Database Engineering & Applications Symposium10.1145/3105831.3105872(108-117)Online publication date: 12-Jul-2017
  • (2016)Poly-Logarithmic Range Queries on Encrypted Data with Small LeakageProceedings of the 2016 ACM on Cloud Computing Security Workshop10.1145/2996429.2996437(23-34)Online publication date: 28-Oct-2016
  • (2015)Enabling secure and efficient kNN query processing over encrypted spatial data in the cloudSecurity and Communication Networks10.1002/sec.12458:17(3205-3218)Online publication date: 25-Nov-2015
  • (2014)MapleProceedings of the 9th ACM symposium on Information, computer and communications security10.1145/2590296.2590305(111-122)Online publication date: 4-Jun-2014

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media