An Index-based Secure Query Processing Scheme for Outsourced Databases

被引:0
作者
Akiyama, Kento [1 ]
Shinozuka, Chisato [1 ]
Watanabe, Chiemi [2 ]
Amagasa, Toshiyuki [3 ]
Kitagawa, Hiroyuki [3 ]
机构
[1] Univ Tsukuba, Grad Sch Syst & Informat Engn, Tsukuba, Ibaraki, Japan
[2] Adv Inst Ind Technol, Grad Sch Ind Technol, Shinagawa, Japan
[3] Univ Tsukuba, Ctr Computat Sci, Tsukuba, Ibaraki, Japan
来源
19TH INTERNATIONAL CONFERENCE ON INFORMATION INTEGRATION AND WEB-BASED APPLICATIONS & SERVICES (IIWAS2017) | 2017年
关键词
Privacy preservation; encrypted database system; Database as a Service; ORDER PRESERVING ENCRYPTION; KEY; EFFICIENT;
D O I
10.1145/3151759.3151786
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This paper proposes an index-based approach for secure query processing. Due to the rapid proliferation of cloud computing services in diverse applications, such as database as a service (DBaaS), and encrypted database systems (EDBSs) have been gaining much attentions as a way to construct secure databases in DBaaS. However, most of the existing works suffer from poor performance when dealing with large data. Some works proposed index-based query processing schemes, but they have a privacy problem that the order of attribute values may be revealed from the index structure on the server. To this problem, we propose a novel secure index-based query processing scheme where the order of attribute values is not disclosed. In the scheme, the index is maintained in such a way that the structural information regarding the index and the values (or index entries) are maintained separately, and only the latter is stored in a cloud server. When searching, a client uses the structural information (without entries) to traverse the index by cooperating with cloud servers, thereby securing the order among the index entries. We prove that, in our scheme, the order among the index entries would not be disclosed even though the data and the query log are disclosed. In addition, our experimental results show that the proposed scheme significantly outperforms existing state-of-the-art schemes.
引用
收藏
页码:215 / 223
页数:9
相关论文
共 20 条
[11]   MV-OPES: Multivalued-Order Preserving Encryption Scheme: A Novel Scheme for Encrypting Integer Value to Many Different Values [J].
Kadhem, Hasan ;
Amagasa, Toshiyuki ;
Kitagawa, Hiroyuki .
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2010, E93D (09) :2520-2533
[12]   Efficient Similarity Search over Encrypted Data [J].
Kuzu, Mehmet ;
Islam, Mohammad Saiful ;
Kantarcioglu, Murat .
2012 IEEE 28TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE), 2012, :1156-1167
[13]   Chaotic Order Preserving Encryption for Efficient and Secure Queries on Databases [J].
Lee, Seungmin ;
Park, The-Jun ;
Lee, Donghyeok ;
Nam, Taekyong ;
Kim, Sehun .
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2009, E92D (11) :2207-2217
[14]  
Mykletun E, 2006, LECT NOTES COMPUT SC, V4127, P89
[15]  
Paillier P, 1999, LECT NOTES COMPUT SC, V1592, P223
[16]   CryptDB: Processing Queries on an Encrypted Database [J].
Popa, Raluca Ada ;
Redfield, Catherine M. S. ;
Zeldovich, Nickolai ;
Balakrishnan, Hari .
COMMUNICATIONS OF THE ACM, 2012, 55 (09) :103-111
[17]  
Tu S, 2013, PROC VLDB ENDOW, V6, P289
[18]  
Wang P, 2013, PROC INT CONF DATA, P314
[19]  
Wang W.H., 2006, VLDB, P127
[20]   Secure Query Processing with Data Interoperability in a Cloud Database Environment [J].
Wong, Wai Kit ;
Kao, Ben ;
Cheung, David Wai Lok ;
Li, Rongbin ;
Yiu, Siu Ming .
SIGMOD'14: PROCEEDINGS OF THE 2014 ACM SIGMOD INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA, 2014, :1395-1406