Non-order-preserving Index for Encrypted Database Management System

被引:2
|
作者
Wong, Wai-Kit [1 ]
Wong, Kwok-Wai [1 ]
Yue, Ho-Yin [1 ]
Cheung, David W. [1 ]
机构
[1] Univ Hong Kong, Hang Seng Management Coll, Hong Kong, Hong Kong, Peoples R China
关键词
D O I
10.1007/978-3-319-64471-4_16
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data confidentiality is concerned in Database-as-a-Service (DBaaS) model. Encrypted database management system (EDBMS) addresses this concern by the data owner (DO) encrypting its private data before storing them in the database hosted by a third party service provider (SP). Indexing at SP over encrypted data is not straightforward. Most existing indexing methods are either order-preserving, or requiring DO to involve in query computation. Order-preserving index is vulnerable to inference analysis. Having DO to compute query beats the purpose of DBaaS model which is to delegate the database works of DO to SP. We developed a non-order-preserving indexing method that does not require DO's involvement in query processing at SP. Our empirical study shows that our indexing method can reduce selection processing cost by an order of magnitude compared to the case without the index.
引用
收藏
页码:190 / 198
页数:9
相关论文
共 50 条
  • [21] A method of bucket index over encrypted character data in database
    Zhang, Yong
    Li, Wei-xin
    Niu, Xia-mu
    [J]. 2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL 1, PROCEEDINGS, 2007, : 186 - +
  • [22] Secure cipher index over encrypted character data in database
    Zhang, Yong
    Li, Wei-Xin
    Niu, Xia-Mu
    [J]. PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2008, : 1111 - +
  • [23] BOPE: Boundary Order-Preserving Encryption Scheme in Relational Database System
    Chen, Si
    Li, Lin
    Zhang, Wenyu
    Chang, Xiaolin
    Han, Zhen
    [J]. IEEE ACCESS, 2021, 9 : 30124 - 30134
  • [24] An order-preserving encryption method operating the encrypted data directly
    Li, Yanqiu
    Duan, YouXiang
    [J]. ICMS2009: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON MODELLING AND SIMULATION, VOL 5, 2009, : 181 - 187
  • [25] Inference Attacks on Encrypted Databases Based on Order Preserving Assignment Problem
    Onozawa, Sota
    Kunihiro, Noboru
    Yoshino, Masayuki
    Naganuma, Ken
    [J]. ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2018, 2018, 11049 : 35 - 47
  • [26] A Privacy-aware Query Authentication Index for Encrypted Database in Cloud
    Jang, Miyoung
    Jo, Ara
    Chang, Jae-Woo
    [J]. 2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2013, : 126 - 131
  • [27] GraphSE2: An Encrypted Graph Database for Privacy-Preserving Social Search
    Lai, Shangqi
    Yuan, Xingliang
    Sun, Shi-Feng
    Liu, Joseph K.
    Liu, Yuhong
    Liu, Dongxi
    [J]. PROCEEDINGS OF THE 2019 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS '19), 2019, : 41 - 54
  • [28] A kNN Query Processing Algorithm using a Tree Index Structure on the Encrypted Database
    Kim, Hyeong-Il
    Kim, Hyeong-Jin
    Chang, Jae-Woo
    [J]. 2016 INTERNATIONAL CONFERENCE ON BIG DATA AND SMART COMPUTING (BIGCOMP), 2016, : 93 - 100
  • [29] Additive Order Preserving Encryption Based Encrypted Documents Ranking in Secure Cloud Storage
    Zhang, Jiuling
    Deng, Beixing
    Li, Xing
    [J]. ADVANCES IN SWARM INTELLIGENCE, ICSI 2012, PT II, 2012, 7332 : 58 - 65
  • [30] Lossless Database Watermarking Based on Order-preserving Encryption
    Yan, Song
    Zheng, Shuli
    Ling, Baohong
    Hu, Donghui
    [J]. PROCEEDINGS OF ACM TURING AWARD CELEBRATION CONFERENCE, ACM TURC 2021, 2021, : 216 - 223