Privacy-preserving SQL database driven by searchable encryption

被引:0
|
作者
Lu, Hai [1 ]
Xue, Xianbin [2 ]
Zhu, Yan [1 ]
Chen, Cecilia E. [1 ]
Han, Haoting [1 ]
Meng, Shutong [1 ]
Lin, Hongjie [1 ]
机构
[1] School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing,100083, China
[2] North Navigation Control Technology Co. Ltd., Beijing,102600, China
关键词
Query languages;
D O I
10.13374/j.issn2095-9389.2024.02.07.004
中图分类号
学科分类号
摘要
In the era of national big data strategies and burgeoning data markets, privacy-preserving databases play a crucial role in establishing an environment that is open, shared, and governed. Central to the construction of such databases is searchable encryption (SE), a fundamental cryptographic technology that enables efficient searching within encrypted data without the need for decryption. Among various SE schemes, attribute-based SE (ABSE) provides advantages in access control, data authenticity, and retrieval efficiency. However, a substantial limitation of most current ABSE implementations is their inability to support flexible SQL query methods in relational databases, as well as more granular query policies. Moreover, the reliance on traditional algebraic structures, such as bilinear pairing, renders these systems susceptible to quantum computing attacks. To address these challenges, this study presents a novel architecture for privacy-preserving databases that accommodates the SQL query language used in relational databases. This architecture is divided into two parts: clients and cloud outsourcing services. Within this framework, all data are in a ciphertext form outside of client access, and the data table in the cloud-based privacy-preserving database comprises four types of fields: public, encrypted index, encrypted data, and confidential fields. Upon receiving an SQL query from a user, the privacy-preserving SQL engine translates it into a private SQL language. This enables cryptographic retrieval of the encrypted index fields by converting the SQL query policy into several query credentials linked with the policy. These credentials facilitate the retrieval of encrypted data fields from the database, matching their index with the policy. The retrieved encrypted data fields can then be decrypted using the user’s private key at the client’s end for confirming the user’s identity. To provide cryptographic support for this privacy-preserving database architecture, we propose a retrieval-policy ABSE (RP-ABSE) scheme built upon a key-policy attribute-based encryption framework. The security of RP-ABSE is underpinned by a hard problem over an ideal lattice, particularly short integer solutions and learning with error problems. A notable advancement in this scheme is the binding of the secure query policy to the query credentials rather than the encrypted index fields. This binding ensures that encrypted data can be cryptographically retrieved by different query policies, eliminating the need for updating the encrypted data when query policies change. Simultaneously, we introduce a small policy matrix to optimize the generation of secure query policies and mitigate cumulative errors during the index matching process. Ultimately, this study proves that the query credential satisfies unforgeability under chosen policy attacks and that the RP-ABSE scheme achieves semantic security under chosen plaintext attacks involving policy and identity queries. Therefore, the proposed privacy-preserving database architecture offers crucial technique support for the development of data market mechanisms and data governance systems. © 2024 Science Press. All rights reserved.
引用
收藏
页码:2085 / 2098
相关论文
共 50 条
  • [41] Privacy-preserving genotype imputation with fully homomorphic encryption
    Gursoy, Gamze
    Chielle, Eduardo
    Brannon, Charlotte M.
    Maniatakos, Michail
    Gerstein, Mark
    CELL SYSTEMS, 2022, 13 (02) : 173 - +
  • [42] Privacy-preserving cancer type prediction with homomorphic encryption
    Esha Sarkar
    Eduardo Chielle
    Gamze Gursoy
    Leo Chen
    Mark Gerstein
    Michail Maniatakos
    Scientific Reports, 13
  • [43] Privacy-preserving Surveillance Methods using Homomorphic Encryption
    Bowditch, William
    Abramson, Will
    Buchanan, William J.
    Pitropakis, Nikolaos
    Hall, Adam J.
    ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, : 240 - 248
  • [44] Efficient homomorphic encryption framework for privacy-preserving regression
    Junyoung Byun
    Saerom Park
    Yujin Choi
    Jaewook Lee
    Applied Intelligence, 2023, 53 : 10114 - 10129
  • [45] Privacy-Preserving Federated Learning Using Homomorphic Encryption
    Park, Jaehyoung
    Lim, Hyuk
    APPLIED SCIENCES-BASEL, 2022, 12 (02):
  • [46] On Fully Homomorphic Encryption for Privacy-Preserving Deep Learning
    Hernandez Marcano, Nestor J.
    Moller, Mads
    Hansen, Soren
    Jacobsen, Rune Hylsberg
    2019 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2019,
  • [47] Pairing-Free Certificate-Based Searchable Encryption Supporting Privacy-Preserving Keyword Search Function for IIoTs
    Lu, Yang
    Li, Jiguo
    Wang, Fen
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (04) : 2696 - 2706
  • [48] Privacy-Preserving Decentralized Functional Encryption for Inner Product
    Han, Jinguang
    Chen, Liqun
    Hu, Aiqun
    Chen, Liquan
    Li, Jiguo
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 1680 - 1694
  • [49] A Privacy-Preserving Homomorphic Encryption Scheme for the Internet of Things
    Zouari, Jaweher
    Hamdi, Mohamed
    Kim, Tai-Hoon
    2017 13TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2017, : 1939 - 1944
  • [50] Complementary set encryption for privacy-preserving data consolidation
    Li, Ni
    Chen, Zhenhua
    Nie, Jingjing
    Fu, Xingbing
    Jia, Xingxing
    INFORMATION SCIENCES, 2022, 593 : 271 - 288