TY - GEN
T1 - Secure range query over encrypted data in outsourced environments
AU - Cui, Ningning
AU - Yang, Xiaochun
AU - Wang, Leixia
AU - Wang, Bin
AU - Li, Jianxin
PY - 2018/1/1
Y1 - 2018/1/1
N2 - With the rapid development of cloud computing paradigm, data owners have the opportunity to outsource their databases and management tasks to the cloud. Due to the privacy concerns, it is required for them to encrypt the databases before outsourcing. However, there is no existing techniques handling range queries in a fully secure way. Therefore, in this paper we focus exactly on secure processing of range queries over outsourced encrypted databases. To efficiently process secure range queries, the extraordinarily challenging task is how to perform fully secure range queries over encrypted data without the cloud ever decrypting the data. To address the challenge, we first propose a basic secure range queries algorithm which is not absolutely secure (i.e., leaking the privacy of access patterns and path patterns). To meet a better security, we present a fully secure algorithm that preserves the privacy of the data, query, result, access patterns and path patterns. At last, we empirically analyze and conduct a comprehensive performance evaluation using real dataset to validate our ideas and the proposed secure algorithms.
AB - With the rapid development of cloud computing paradigm, data owners have the opportunity to outsource their databases and management tasks to the cloud. Due to the privacy concerns, it is required for them to encrypt the databases before outsourcing. However, there is no existing techniques handling range queries in a fully secure way. Therefore, in this paper we focus exactly on secure processing of range queries over outsourced encrypted databases. To efficiently process secure range queries, the extraordinarily challenging task is how to perform fully secure range queries over encrypted data without the cloud ever decrypting the data. To address the challenge, we first propose a basic secure range queries algorithm which is not absolutely secure (i.e., leaking the privacy of access patterns and path patterns). To meet a better security, we present a fully secure algorithm that preserves the privacy of the data, query, result, access patterns and path patterns. At last, we empirically analyze and conduct a comprehensive performance evaluation using real dataset to validate our ideas and the proposed secure algorithms.
KW - Database outsourcing
KW - Encrypted index
KW - Secure range query
UR - http://www.scopus.com/inward/record.url?scp=85048981098&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-91458-9_7
DO - 10.1007/978-3-319-91458-9_7
M3 - Conference paper
AN - SCOPUS:85048981098
SN - 9783319914572
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 112
EP - 129
BT - Database Systems for Advanced Applications - 23rd International Conference, DASFAA 2018, Proceedings
PB - Springer-Verlag London Ltd.
T2 - 23rd International Conference on Database Systems for Advanced Applications, DASFAA 2018
Y2 - 21 May 2018 through 24 May 2018
ER -