Secure range query over encrypted data in outsourced environments

被引:0
|
作者
Ningning Cui
Xiaochun Yang
Bin Wang
Jing Geng
Jianxin Li
机构
[1] Northeastern University,School of Computer Science and Engineering
[2] Beijing Institute of Technology,School of Computer Science and Technology
[3] Deakin University,School of Computer Science and Engineering
来源
World Wide Web | 2020年 / 23卷
关键词
Database outsourcing; Encrypted index; Secure range query;
D O I
暂无
中图分类号
学科分类号
摘要
With the rapid development of cloud computing paradigm, data owners have the opportunity to outsource their databases and management tasks to the cloud. Due to privacy concerns, it is required for them to encrypt the databases prior to outsourcing. However, there are no existing techniques handling range queries in a fully secure way. Therefore, in this paper, we focus exactly on the secure processing of range queries over outsourced encrypted databases. To efficiently process secure range queries, the extraordinarily challenging task is how to perform fully secure range queries over encrypted data without the cloud ever decrypting the data. To address the challenge, we first propose a basic secure range queries algorithm which is not absolutely secure (i.e., leaking the privacy of access patterns and path patterns). To meet better security, we present a fully secure algorithm that preserves the privacy of the data, query, result, access patterns and path patterns. To improve the performance further, we also propose two schemes to accelerate query speed. At last, we empirically analyze and conduct a comprehensive performance evaluation using the real dataset to validate our ideas and the proposed secure algorithms.
引用
收藏
页码:491 / 517
页数:26
相关论文
共 50 条
  • [21] A Provably Secure and Efficient Range Query Scheme for Outsourced Encrypted Uncertain Data From Cloud-Based Internet of Things Systems
    Guo, Cheng
    Su, Shenghao
    Choo, Kim-Kwang Raymond
    Tian, Pengxu
    Tang, Xinyu
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (03): : 1848 - 1860
  • [22] Adaptive Secure Nearest Neighbor Query Processing Over Encrypted Data
    Li, Rui
    Liu, Alex X.
    Xu, Huanle
    Liu, Ying
    Yuan, Huaqiang
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (01) : 91 - 106
  • [23] Secure and flexible keyword search over encrypted data with outsourced decryption in Internet of things
    Yinghui Zhang
    Axin Wu
    Tiantian Zhang
    Dong Zheng
    Annals of Telecommunications, 2019, 74 : 413 - 421
  • [24] Secure and flexible keyword search over encrypted data with outsourced decryption in Internet of things
    Zhang, Yinghui
    Wu, Axin
    Zhang, Tiantian
    Zheng, Dong
    ANNALS OF TELECOMMUNICATIONS, 2019, 74 (7-8) : 413 - 421
  • [25] A Secure and Fast Range Query Scheme for Encrypted Multi-Dimensional Data
    Mei, Zhuolin
    Zou, Huilai
    Huang, Jinzhou
    Zhang, Caicai
    Wu, Bin
    Shi, Jiaoli
    Cheng, Zhengxiang
    INTERNATIONAL JOURNAL OF WEB SERVICES RESEARCH, 2024, 21 (01)
  • [26] SEMKC: Secure and Efficient Computation over Outsourced Data Encrypted under Multiple Keys
    Nayak, Sanjeet Kumar
    Tripathy, Somanath
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2021, 9 (01) : 414 - 428
  • [27] Verifiable outsourced computation over encrypted data
    Yu, Xixun
    Yan, Zheng
    Zhang, Rui
    INFORMATION SCIENCES, 2019, 479 : 372 - 385
  • [28] Selective Sharing of Outsourced Encrypted Data in Cloud Environments
    Sifah, Emmanuel Boateng
    Xia, Qi
    Xia, Hu
    Agyekum, Kwame Opuni-Boachie Obour
    Acheampong, Kingsley Nketia
    Cobblah, Christian Nii Aflah
    Gao, Jianbin
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (18) : 14141 - 14155
  • [29] Secure Count Query on Encrypted Heterogeneous Data
    Mahdi, Md Safiur Rahman
    Sadat, Md Nazmus
    Mohammed, Noman
    Jiang, Xiaoqian
    2020 IEEE INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, INTL CONF ON CLOUD AND BIG DATA COMPUTING, INTL CONF ON CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/CBDCOM/CYBERSCITECH), 2020, : 548 - 555
  • [30] Order-Hiding Range Query Over Encrypted Cloud Data
    Kwon, Hyunsoo
    Hur, Junbeom
    Hahn, Changhee
    IEEE ACCESS, 2022, 10 : 75604 - 75618