A Secure Order-Preserving Encryption Scheme Based on Encrypted Index

被引:1
|
作者
Chen, Haobin [1 ]
Liang, Ji [1 ]
Qin, Xiaolin [1 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Nanjing, Peoples R China
来源
基金
中国国家自然科学基金;
关键词
Encrypted database; Encrypted index; Secure query; Cloud database; Privacy protection; QUERY; CLOUD;
D O I
10.1007/978-3-031-25201-3_19
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the development of cloud computing, data owners usually choose to store data in the cloud. But cloud servers may not be fully trusted. Due to privacy concerns, data owners need to encrypt the data before storing it in the cloud. There is still a lack of solutions that satisfy both safety and efficiency. To perform secure queries on encrypted data, we propose a scheme. The scheme includes an encrypted index based on B+ tree, which can hide the order information of sensitive data. It also includes a secure search algorithm based on the encrypted index, which is implemented through the interaction protocol between the client and the server. We analyze the scheme's security and prove that the scheme can protect the privacy of data, queries, results, and access patterns. At last, we perform experiments on five datasets to verify that the scheme is effective.
引用
收藏
页码:247 / 261
页数:15
相关论文
共 50 条
  • [41] Efficient Construction of Order-Preserving Encryption Using Pseudo Random Function
    Jho, Nam-Su
    Chang, Ku-Young
    Hong, Do-Won
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2015, E98B (07) : 1276 - 1283
  • [42] Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions
    Boldyreva, Alexandra
    Chenette, Nathan
    O'Neill, Adam
    ADVANCES IN CRYPTOLOGY - CRYPTO 2011, 2011, 6841 : 578 - 595
  • [43] Frequency-Hiding Order-Preserving Encryption with Small Client Storage
    Li, Dongjie
    Lv, Siyi
    Huang, Yanyu
    Liu, Yijing
    Li, Tong
    Liu, Zheli
    Guo, Liang
    PROCEEDINGS OF THE VLDB ENDOWMENT, 2021, 14 (13): : 3295 - 3307
  • [44] Practical Frequency-Hiding Order-Preserving Encryption with Improved Update
    Yang, JiHye
    Kim, Kee Sung
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [45] Ensuring Query Completeness In Outsourced Database using Order-Preserving Encryption
    Shen, Ning
    Yeh, Jyh-haw
    Chen, Chien-Ming
    Chen, Yeh-Cheng
    Zhang, Yunpeng
    2019 IEEE INTL CONF ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, BIG DATA & CLOUD COMPUTING, SUSTAINABLE COMPUTING & COMMUNICATIONS, SOCIAL COMPUTING & NETWORKING (ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM 2019), 2019, : 776 - 783
  • [46] Practical Frequency-Hiding Order-Preserving Encryption with Improved Update
    Yang, JiHye
    Kim, Kee Sung
    Security and Communication Networks, 2021, 2021
  • [47] On order-preserving representations
    Ben Simon, G.
    Burger, M.
    Hartnick, T.
    Iozzi, A.
    Wienhard, A.
    JOURNAL OF THE LONDON MATHEMATICAL SOCIETY-SECOND SERIES, 2016, 94 : 525 - 544
  • [48] ORDER-PRESERVING ASSIGNMENTS
    PADBERG, M
    ALEVRAS, D
    NAVAL RESEARCH LOGISTICS, 1994, 41 (03) : 395 - 421
  • [49] Order-preserving matching
    Kim, Jinil
    Eades, Peter
    Fleischer, Rudolf
    Hong, Seok-Hee
    Iliopoulos, Costas S.
    Park, Kunsoo
    Puglisi, Simon J.
    Tokuyama, Takeshi
    THEORETICAL COMPUTER SCIENCE, 2014, 525 : 68 - 79
  • [50] A New Mapped WENO Scheme Using Order-Preserving Mapping
    Li, Ruo
    Zhong, Wei
    COMMUNICATIONS IN COMPUTATIONAL PHYSICS, 2022, 31 (02) : 548 - 592