A privacy-preserving bucket partition mechanism in cloud

被引:0
作者
Zhang H. [1 ]
Huang T. [1 ]
Liu S.-Y. [1 ]
Wang L.-N. [2 ]
机构
[1] National Engineering Research Center for E-Learning (Central China Normal University), Wuhan
[2] School of Computer, Wuhan University, Wuhan
来源
Huang, Tao (tmht@mail.ccnu.edu.cn) | 1600年 / Science Press卷 / 39期
基金
中国国家自然科学基金;
关键词
Bucket partition; Ciphertext query; Cloud computing; Genetic algorithms; Privacy indicators;
D O I
10.11897/SP.J.1016.2016.00429
中图分类号
学科分类号
摘要
A large number of organizations and institutions have been attracted to the cloud platform for its features, such as convenient management. Thus, the security of the outsourced data become more and more important. Encryption is a useful approach to protecting the data, while the features of the encrypted data are vanished. To manage the data effectively, the efficient and secure ciphertext query approach is urgent. However, the existing ciphertext query technology fails to provide a deep analysis in privacy leakage under attack. To solve this problem, we propose a privacy-preserving bucket partition mechanism in Database as a Service (DAAS) model in cloud. First, this paper proposed a generation algorithm (GA) based bucked partition mechanism according to the query efficiency. Then this paper built a privacy index system for information disclosure during the query and combined the privacy index system with the query efficiency. Finally, this paper optimized the proposed model based on the GA to balance the privacy and the accuracy during the query. The algorithm maximized the query accuracy and efficiency, reduced the information leakage during the query, and consequently enhances the availability and privacy of sensitive data in cloud. To verify the effectiveness of the proposed mechanism, the comparison experiments of our proposed mechanism and other bucket partition mechanisms were done. The result shows that the proposed mechanism is superior to others. © 2016, Science Press. All right reserved.
引用
收藏
页码:429 / 440
页数:11
相关论文
共 15 条
  • [1] Abadi D.J., Data management in the cloud: Limitations and opportunities, Data Engineering Bulletin Issues, 32, 1, pp. 3-12, (2009)
  • [2] Qi Y.-N., Atallah M.J., Efficient privacy-preserving k-nearest neighbor search, Proceedings of the International Conference on Distributed Computing System (ICDCS), pp. 311-319, (2009)
  • [3] Agrawal R., Kirenan J., Srikant R., Xu Y.-R., Order-preserving encryption for numeric data, Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD), pp. 563-574, (2004)
  • [4] Ozsoyoglu G., Singer D.A., Chung S.S., Anti-tamper databases: Querying encrypted databases, Proceedings of the 17th Annual IFIP WG 11.3 Working Conference on Database and Application Security, pp. 133-146, (2003)
  • [5] Gentry C., Fully homomorphic encryption using ideal lattices, Proceedings of the 41st Annual ACM Symposium on Theory of Computing (STOC), pp. 169-178, (2009)
  • [6] Hacigumus H., Bala L., Li C., Et al., Executing SQL over encrypted data in the database-service-provider model, Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD), pp. 216-227, (2002)
  • [7] Wang H.-C., Du X.-Y., Wang J.-P., Yang P.-P., STBucket: A self-turning bucket index in DAS paradigm, Proceedings of the 4th ChinaGrid Annual Conference, pp. 102-109, (2009)
  • [8] Song W., Peng Z.-Y., Cheng F.-Q., Et al., A service-oriented adaptive search method over encrypted data in trusted database, Chinese Journal of Computers, 33, 8, pp. 1324-1338, (2010)
  • [9] Hore B., Mehrotra S., Tsudik G., A privacy-preserving index for range queries, Proceedings of the 30th International Conference on Very Large Databases (VLDB), pp. 720-731, (2004)
  • [10] Ciriani V., de Capitani di Vimercati S., Foresti S., Et al., Fragmentation design for efficient query execution over sensitive distributed databases, Proceedings of the ICDCS'09, pp. 29-32, (2009)