VPRQ: Verifiable and privacy-preserving range query over cloud data

被引:0
|
作者
Nie, Xueli [1 ]
Zhang, Aiqing [1 ]
Wang, Yong [1 ]
Wang, Weiqi [2 ]
Yu, Shui [2 ]
机构
[1] Anhui Normal Univ, Sch Phys & Elect Informat, Wuhu, Peoples R China
[2] Univ Technol Sydney, Sch Comp Sci, Sydney, NSW 2007, Australia
基金
中国国家自然科学基金;
关键词
Cloud data; Range query; Verification; Privacy preservation; EFFICIENT; ENCRYPTION; SEARCH; SCHEME;
D O I
10.1016/j.compeleceng.2024.109367
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud has scalable storage and massive computing power, attracting data owners to outsource their data. However, owing to privacy concerns, data is typically encrypted prior to outsourcing, which inevitably presents challenges for querying the data effectively. Although encrypted range query is one of the most prevalent types and has been widely studied, existing schemes still have some problems. They inadvertently disclose the order relationship between the upper/lower bound of a range query and the encrypted index, leading to vulnerability inference attack. Moreover, the cloud server cannot be fully trusted, which may return incorrect and incomplete query results. To deal with these issues, we present a novel verifiable and privacy -preserving range query scheme (VPRQ). The VPRQ scheme utilizes 0/1 technique to transform range comparisons into set intersections. By doing so, it effectively hides the relationship between the upper/lower bound and the encrypted index. On this basis, we design an encrypted garbled bloom filter to securely and effectively achieve range query. This ensures that VPRQ scheme effectively resists inference attack. Additionally, point -value polynomial function technology is integrated into the VPRQ protocol to provide lightweight verification for the query results. Comprehensive security analysis and proof demonstrate its effectiveness in achieving the intended design objectives. Performance evaluations illustrate the feasibility and scalability of the proposed scheme, highlighting its practical applicability.
引用
收藏
页数:15
相关论文
共 50 条
  • [41] Achieve privacy-preserving simplicial depth query over collaborative cloud servers
    Mahdikhani, Hassan
    Shahsavarifar, Rasoul
    Lu, Rongxing
    Bremner, David
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2020, 13 (01) : 412 - 423
  • [42] Achieving Efficient and Privacy-Preserving (α, β)-Core Query Over Bipartite Graphs in Cloud
    Guan, Yunguo
    Lu, Rongxing
    Zheng, Yandong
    Zhang, Songnian
    Shao, Jun
    Wei, Guiyi
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (03) : 1979 - 1993
  • [43] Achieve privacy-preserving simplicial depth query over collaborative cloud servers
    Hassan Mahdikhani
    Rasoul Shahsavarifar
    Rongxing Lu
    David Bremner
    Peer-to-Peer Networking and Applications, 2020, 13 : 412 - 423
  • [44] Privacy-preserving and verifiable protocols for scientific computation outsourcing to the cloud
    Chen, Fei
    Xiang, Tao
    Yang, Yuanyuan
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2014, 74 (03) : 2141 - 2151
  • [45] VPPFL: Verifiable Privacy-Preserving Federated Learning in Cloud Environment
    Wang, Huiyong
    Yang, Tengfei
    Ding, Yong
    Tang, Shijie
    Wang, Yujue
    IEEE ACCESS, 2024, 12 : 151998 - 152008
  • [46] Verifiable Strong Privacy-Preserving Any-Hop Reachability Query on Blockchain-Assisted Cloud
    Yu, Jingjuan
    Duan, Yuwei
    Luo, Ping
    Li, Shundong
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (24): : 39637 - 39650
  • [47] EPPVChain: An Efficient Privacy-Preserving Verifiable Query Scheme for Blockchain Databases
    Cheng, Jingxian
    Qi, Saiyu
    Qi, Yong
    Wang, Jianfeng
    Jiang, Qin
    Wu, Di
    2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023, 2024, : 1306 - 1311
  • [48] Privacy-Preserving Verifiable CNNs
    Attrapadung, Nuttapong
    Hanaoaka, Goichiro
    Hiromasa, Ryo
    Koseki, Yoshihiro
    Matsuda, Takahiro
    Nishida, Yutaro
    Sakai, Yusuke
    Schuldt, Jacob C. N.
    Yasuda, Satoshi
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2024, PT II, 2024, 14584 : 373 - 402
  • [49] Highly Efficient Indexing for Privacy-Preserving Multi-keyword Query over Encrypted Cloud Data
    Cheng, Fangquan
    Wang, Qian
    Zhang, Qianwen
    Peng, Zhiyong
    WEB-AGE INFORMATION MANAGEMENT, WAIM 2014, 2014, 8485 : 348 - 359
  • [50] Achieving Practical and Privacy-Preserving kNN Query Over Encrypted Data
    Zheng, Yandong
    Lu, Rongxing
    Zhang, Songnian
    Shao, Jun
    Zhu, Hui
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (06) : 5479 - 5492