A Secure Order-Preserving Encryption Scheme Based on Encrypted Index

被引:1
|
作者
Chen, Haobin [1 ]
Liang, Ji [1 ]
Qin, Xiaolin [1 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Nanjing, Peoples R China
来源
基金
中国国家自然科学基金;
关键词
Encrypted database; Encrypted index; Secure query; Cloud database; Privacy protection; QUERY; CLOUD;
D O I
10.1007/978-3-031-25201-3_19
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the development of cloud computing, data owners usually choose to store data in the cloud. But cloud servers may not be fully trusted. Due to privacy concerns, data owners need to encrypt the data before storing it in the cloud. There is still a lack of solutions that satisfy both safety and efficiency. To perform secure queries on encrypted data, we propose a scheme. The scheme includes an encrypted index based on B+ tree, which can hide the order information of sensitive data. It also includes a secure search algorithm based on the encrypted index, which is implemented through the interaction protocol between the client and the server. We analyze the scheme's security and prove that the scheme can protect the privacy of data, queries, results, and access patterns. At last, we perform experiments on five datasets to verify that the scheme is effective.
引用
收藏
页码:247 / 261
页数:15
相关论文
共 50 条
  • [1] A Group Order-Preserving Encryption Scheme based on Periodic Functions for Efficient Query Processing on Encrypted Data
    Lee, Hyunjo
    Choi, MunChol
    Chang, Jae-Woo
    2015 IEEE 17TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2015 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CYBERSPACE SAFETY AND SECURITY, AND 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS), 2015, : 923 - 923
  • [2] Secure Database Using Order-Preserving Encryption Scheme Based on Arithmetic Coding and Noise Function
    Krendelev, Sergey
    Yakovlev, Mikhail
    Usoltseva, Maria
    INFORMATION AND COMMUNICATION TECHNOLOGY, 2015, 9357 : 193 - 202
  • [3] A Novel Dynamic Order-Preserving Encryption Scheme
    Reddy, K. Srinvasa
    Ramachandram, Sirandas
    2014 FIRST INTERNATIONAL CONFERENCE ON NETWORKS & SOFT COMPUTING (ICNSC), 2014, : 92 - 96
  • [4] An order-preserving encryption method operating the encrypted data directly
    Li, Yanqiu
    Duan, YouXiang
    ICMS2009: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON MODELLING AND SIMULATION, VOL 5, 2009, : 181 - 187
  • [5] An efficient and secure order-preserving encryption in cloud computing
    Hu, Dongping
    BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2019, 125 : 183 - 183
  • [6] GOPES: Group Order-Preserving Encryption Scheme Supporting Query Processing over Encrypted Data
    Lee, Hyunjo
    Song, Youngho
    Chang, Jae-Woo
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2018, 14 (05): : 1087 - 1101
  • [7] Order-Preserving Encryption Secure Beyond One-Wayness
    Teranishi, Isamu
    Yung, Moti
    Malkin, Tal
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2014, PT II, 2014, 8874 : 42 - 61
  • [8] A Secure Order-Preserving Indexing Scheme for Outsourced Data
    Moghadam, Somayeh Sobati
    Gavin, Gerald
    Darmont, Jerome
    2016 IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2016, : 298 - 304
  • [9] Order-Preserving Symmetric Encryption
    Boldyreva, Alexandra
    Chenette, Nathan
    Lee, Younho
    O'Neill, Adam
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2009, 2009, 5479 : 224 - 241
  • [10] New Construction of Order-Preserving Encryption Based on Order-Revealing Encryption
    Kim, Kee Sung
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2019, 15 (05): : 1211 - 1217