Privacy-preserving SQL database driven by searchable encryption

被引:0
|
作者
Lu, Hai [1 ]
Xue, Xianbin [2 ]
Zhu, Yan [1 ]
Chen, Cecilia E. [1 ]
Han, Haoting [1 ]
Meng, Shutong [1 ]
Lin, Hongjie [1 ]
机构
[1] School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing,100083, China
[2] North Navigation Control Technology Co. Ltd., Beijing,102600, China
关键词
Query languages;
D O I
10.13374/j.issn2095-9389.2024.02.07.004
中图分类号
学科分类号
摘要
In the era of national big data strategies and burgeoning data markets, privacy-preserving databases play a crucial role in establishing an environment that is open, shared, and governed. Central to the construction of such databases is searchable encryption (SE), a fundamental cryptographic technology that enables efficient searching within encrypted data without the need for decryption. Among various SE schemes, attribute-based SE (ABSE) provides advantages in access control, data authenticity, and retrieval efficiency. However, a substantial limitation of most current ABSE implementations is their inability to support flexible SQL query methods in relational databases, as well as more granular query policies. Moreover, the reliance on traditional algebraic structures, such as bilinear pairing, renders these systems susceptible to quantum computing attacks. To address these challenges, this study presents a novel architecture for privacy-preserving databases that accommodates the SQL query language used in relational databases. This architecture is divided into two parts: clients and cloud outsourcing services. Within this framework, all data are in a ciphertext form outside of client access, and the data table in the cloud-based privacy-preserving database comprises four types of fields: public, encrypted index, encrypted data, and confidential fields. Upon receiving an SQL query from a user, the privacy-preserving SQL engine translates it into a private SQL language. This enables cryptographic retrieval of the encrypted index fields by converting the SQL query policy into several query credentials linked with the policy. These credentials facilitate the retrieval of encrypted data fields from the database, matching their index with the policy. The retrieved encrypted data fields can then be decrypted using the user’s private key at the client’s end for confirming the user’s identity. To provide cryptographic support for this privacy-preserving database architecture, we propose a retrieval-policy ABSE (RP-ABSE) scheme built upon a key-policy attribute-based encryption framework. The security of RP-ABSE is underpinned by a hard problem over an ideal lattice, particularly short integer solutions and learning with error problems. A notable advancement in this scheme is the binding of the secure query policy to the query credentials rather than the encrypted index fields. This binding ensures that encrypted data can be cryptographically retrieved by different query policies, eliminating the need for updating the encrypted data when query policies change. Simultaneously, we introduce a small policy matrix to optimize the generation of secure query policies and mitigate cumulative errors during the index matching process. Ultimately, this study proves that the query credential satisfies unforgeability under chosen policy attacks and that the RP-ABSE scheme achieves semantic security under chosen plaintext attacks involving policy and identity queries. Therefore, the proposed privacy-preserving database architecture offers crucial technique support for the development of data market mechanisms and data governance systems. © 2024 Science Press. All rights reserved.
引用
收藏
页码:2085 / 2098
相关论文
共 50 条
  • [1] Address Permutation for Privacy-Preserving Searchable Symmetric Encryption
    Choi, Daeseon
    Kim, Seung-Hyun
    Lee, Younho
    ETRI JOURNAL, 2012, 34 (01) : 66 - 75
  • [2] Privacy-preserving searchable encryption in the intelligent edge computing
    Chen, Qi
    Fan, Kai
    Zhang, Kuan
    Wang, Haoyang
    Li, Hui
    Yang, Yingtang
    COMPUTER COMMUNICATIONS, 2020, 164 : 31 - 41
  • [3] Privacy-preserving Dynamic Symmetric Searchable Encryption with Controllable Leakage
    Cui, Shujie
    Song, Xiangfu
    Asghar, Muhammad Rizwan
    Galbraith, Steven D.
    Russello, Giovanni
    ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2021, 24 (03)
  • [4] Privacy-Preserving Searchable Encryption Framework for Permissioned Blockchain Networks
    Tahir, Shahzaib
    Rajarajan, Muttukrishnan
    IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY, 2018, : 1628 - 1633
  • [5] Privacy-Preserving Multi-Keyword Searchable Encryption for Distributed Systems
    Liu, Xueqiao
    Yang, Guomin
    Susilo, Willy
    Tonien, Joseph
    Liu, Ximeng
    Shen, Jian
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2021, 32 (03) : 561 - 574
  • [6] Privacy-Preserving Searchable Encryption Scheme Based on Public and Private Blockchains
    Du, Ruizhong
    Ma, Caixia
    Li, Mingyue
    TSINGHUA SCIENCE AND TECHNOLOGY, 2023, 28 (01): : 13 - 26
  • [7] Geometric Searchable Encryption for Privacy-Preserving Location-Based Services
    Chen, Zhenhua
    Nie, Jingjing
    Li, Zhanli
    Susilo, Willy
    Ge, Chunpeng
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (04) : 2672 - 2684
  • [8] PERiMETER - pseudonymization and personal metadata encryption for privacy-preserving searchable documents
    Heurix, Johannes
    Karlinger, Michael
    Neubauer, Thomas
    HEALTH SYSTEMS, 2012, 1 (01) : 46 - 57
  • [9] Flexible privacy-preserving machine learning: When searchable encryption meets homomorphic encryption
    Jia, Haixin
    Aldeen, Mohammed S.
    Zhao, Chuan
    Jing, Shan
    Chen, Zhenxiang
    INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 37 (11) : 9173 - 9191
  • [10] Research on Privacy Preserving of Searchable Encryption
    Feng, Tao
    He, Weiyou
    PROCEEDINGS OF THE 2018 2ND HIGH PERFORMANCE COMPUTING AND CLUSTER TECHNOLOGIES CONFERENCE (HPCCT 2018), 2018, : 58 - 68