[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1109/SP.2007.29guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Multi-Dimensional Range Query over Encrypted Data

Published: 20 May 2007 Publication History

Abstract

We design an encryption scheme called Multi-dimensional Range Query over Encrypted Data (MRQED), to address the privacy concerns related to the sharing of network audit logs and various other applications. Our scheme allows a network gateway to encrypt summaries of network flows before submitting them to an untrusted repository. When network intrusions are suspected, an authority can release a key to an auditor, allowing the auditor to decrypt flows whose attributes (e.g., source and destination addresses, port numbers, etc.) fall within specific ranges. However, the privacy of all irrelevant flows are still preserved. We formally define the security for MRQED and prove the security of our construction under the decision bilinear Diffie-Hellman and decision linear assumptions in certain bilinear groups. We study the practical performance of our construction in the context of network audit logs. Apart from network audit logs, our scheme also has interesting applications for financial audit logs, medical privacy, untrusted remote storage, etc. In particular, we show that MRQED implies a solution to its dual problem, which enables investors to trade stocks through a broker in a privacypreserving manner.

Cited By

View all
  • (2024)A Secure and Fast Range Query Scheme for Encrypted Multi-Dimensional DataInternational Journal of Web Services Research10.4018/IJWSR.34039121:1(1-17)Online publication date: 9-Apr-2024
  • (2024)Reconstructing with Even Less: Amplifying Leakage and Drawing GraphsProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3670313(4777-4791)Online publication date: 2-Dec-2024
  • (2024)Multi-client Attribute-Based and Predicate Encryption from Standard AssumptionsTheory of Cryptography10.1007/978-3-031-78020-2_2(31-64)Online publication date: 2-Dec-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
SP '07: Proceedings of the 2007 IEEE Symposium on Security and Privacy
May 2007
362 pages
ISBN:0769528481

Publisher

IEEE Computer Society

United States

Publication History

Published: 20 May 2007

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 02 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)A Secure and Fast Range Query Scheme for Encrypted Multi-Dimensional DataInternational Journal of Web Services Research10.4018/IJWSR.34039121:1(1-17)Online publication date: 9-Apr-2024
  • (2024)Reconstructing with Even Less: Amplifying Leakage and Drawing GraphsProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3670313(4777-4791)Online publication date: 2-Dec-2024
  • (2024)Multi-client Attribute-Based and Predicate Encryption from Standard AssumptionsTheory of Cryptography10.1007/978-3-031-78020-2_2(31-64)Online publication date: 2-Dec-2024
  • (2024)Faster Private Decision Tree Evaluation for Batched Input from Homomorphic EncryptionSecurity and Cryptography for Networks10.1007/978-3-031-71073-5_1(3-23)Online publication date: 11-Sep-2024
  • (2023)Longshot: Indexing Growing Databases Using MPC and Differential PrivacyProceedings of the VLDB Endowment10.14778/3594512.359452916:8(2005-2018)Online publication date: 1-Apr-2023
  • (2023)Level Up: Private Non-Interactive Decision Tree Evaluation using Levelled Homomorphic EncryptionProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3623095(2945-2958)Online publication date: 15-Nov-2023
  • (2022)IncShrink: Architecting Efficient Outsourced Databases using Incremental MPC and Differential PrivacyProceedings of the 2022 International Conference on Management of Data10.1145/3514221.3526151(818-832)Online publication date: 10-Jun-2022
  • (2021)A Privacy-Preserving Attribute-Based Encryption System for Data Sharing in Smart CitiesWireless Communications & Mobile Computing10.1155/2021/66866752021Online publication date: 8-Oct-2021
  • (2021)A Blockchain-Based Medical Data Sharing Mechanism with Attribute-Based Access Control and Privacy ProtectionWireless Communications & Mobile Computing10.1155/2021/66857622021Online publication date: 1-Jan-2021
  • (2021)Reconstructing with Less: Leakage Abuse Attacks in Two DimensionsProceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security10.1145/3460120.3484552(2243-2261)Online publication date: 12-Nov-2021
  • Show More Cited By

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media