Securing multi-client range queries over encrypted data

被引:0
|
作者
Park, Jae Hwan [1 ]
Rezaeifar, Zeinab [2 ]
Hahn, Changhee [1 ]
机构
[1] Seoul Natl Univ Sci & Technol, Seoul, South Korea
[2] Univ West England, Bristol, England
关键词
Order-revealing encryption; Property-preserving hash; Secure query; Multi-client searchable encryption;
D O I
10.1007/s10586-024-04472-w
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Order-revealing encryption (ORE) allows secure range query processing over encrypted databases through a publicly accessible comparison function, while keeping other details concealed. Since parameter-hiding ORE (ASIACRYPT 2018) demonstrated improved privacy preservation at the cost of O(n2)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathcal {O}(n<^>2)$$\end{document} comparison operations, where n is the bit length of plaintexts, Lv et al. (ESORICS 2021) introduced an efficient ORE scheme that reduced the comparison operations to O(n)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathcal {O}(n)$$\end{document}, all while accommodating multiple clients. In this paper, we identify a vulnerability in Lv et al.'s ORE scheme, which we refer to as "Query Reusability." Exploiting this vulnerability, we develop an optimal query recovery attack. According to our experiment on the real-world datasets, our attack can recover a 64-bit plaintext query within a mere 83ms. We then propose msq-ORE, a multi-client secure range query ORE scheme that effectively mitigates the vulnerability while maintaining computational costs comparable to the state-of-the-art ORE scheme. Lastly, our performance analysis results show that the proposed scheme achieves efficacy.
引用
收藏
页码:9679 / 9692
页数:14
相关论文
共 50 条
  • [31] Landmark graphics opens multi-client data hosting center in Calgary
    不详
    JOURNAL OF CANADIAN PETROLEUM TECHNOLOGY, 2002, 41 (06): : 15 - 16
  • [32] Fast Multi-dimensional Range Queries on Encrypted Cloud Databases
    Chi, Jialin
    Hong, Cheng
    Zhang, Min
    Zhang, Zhenfeng
    DATABASE SYSTEMS FOR ADVANCED APPLICATIONS (DASFAA 2017), PT I, 2017, 10177 : 559 - 575
  • [33] Insecurity and Hardness of Nearest Neighbor Queries over Encrypted Data
    Li, Rui
    Liu, Alex X.
    Liu, Ying
    Xu, Huanle
    Yuan, Huaqiang
    2019 IEEE 35TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2019), 2019, : 1614 - 1617
  • [34] Equi-Joins over Encrypted Data for Series of Queries
    Shafieinejad, Masoumeh
    Gupta, Suraj
    Liu, Jin Yang
    Karabina, Koray
    Kerschbaum, Florian
    2022 IEEE 38TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2022), 2022, : 1635 - 1648
  • [35] Experiments with queries over encrypted data using secret sharing
    Brinkman, R
    Schoenmakers, B
    Doumen, J
    Jonker, W
    SECURE DATA MANAGEMENT, PROCEEDINGS, 2005, 3674 : 33 - 46
  • [36] Protocol for browsing in continuous data for cooperative multi-server and multi-client applications
    Helbig, T
    Schreyer, O
    INTERACTIVE DISTRIBUTED MULTIMEDIA SYSTEMS AND TELECOMMUNICATION SERVICES, 1998, 1483 : 231 - 236
  • [37] Fast and private multi-dimensional range search over encrypted data
    Kermanshahi, Shabnam Kasra
    Steinfeld, Ron
    Yi, Xun
    Liu, Joseph K.
    Nepal, Surya
    Lou, Junwei
    INFORMATION SCIENCES, 2024, 652
  • [38] Playout Buffer Aware Adaptation Scheme over Multi-client LTE networks
    Chen, Yuchen
    Liu, Guizhong
    Wang, Qinli
    EAI ENDORSED TRANSACTIONS ON SCALABLE INFORMATION SYSTEMS, 2015, 2 (06):
  • [39] Poly-Logarithmic Range Queries on Encrypted Data with Small Leakage
    Hahn, Florian
    Kerschbaum, Florian
    CCSW'16: PROCEEDINGS OF THE 2016 ACM CLOUD COMPUTING SECURITY WORKSHOP, 2016, : 23 - 34
  • [40] Multi-Client Searchable Encryption over Distributed Key-Value Stores
    Lin, Wanyu
    Yuan, Xu
    Li, Baochun
    Wang, Cong
    2017 IEEE INTERNATIONAL CONFERENCE ON SMART COMPUTING (SMARTCOMP), 2017, : 72 - 78