Efficient and non-interactive ciphertext range query based on differential privacy

被引:0
作者
Feng, Peirou [1 ]
Sheng, Qitian [1 ]
Wang, Jianfeng [2 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian, Peoples R China
[2] Xidian Univ, State Key Lab Integrated Serv Networks ISN, Xian, Peoples R China
关键词
range query; differential privacy; short comparable encryption; SECURITY;
D O I
10.1504/IJCSE.2022.10051196
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Differentially private range query schemes satisfy differential privacy by adding or deleting records during the process of creating index which suffers from the weakness of data loss in query results due to the negative noise. Recently, Sahin et al. (2018) proposed a differentially private index with overflow arrays in ICDE 2018, which ensures the integrity of query results. However, this scheme suffers from two drawbacks: 1) some private information (e.g., query requests or frequency) may be leaked because of querying over plaintext index; 2) the overflow arrays bring extra storage overhead. To this end, we present a non-interactive ciphertext range query based on differential privacy and comparable encryption. Our scheme can protect the query privacy since the query is performed over ciphertext based on comparable encryption. Besides, the experiment results show that our proposed scheme can save the storage overhead.
引用
收藏
页码:490 / 503
页数:15
相关论文
共 27 条
  • [1] Bellare M., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P292
  • [2] A privacy-preserving cloud-based data management system with efficient revocation scheme
    Chang, Shih-Chien
    Wu, Ja-Ling
    [J]. INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2019, 20 (02) : 190 - 199
  • [3] Minimizing Minimality and Maximizing Utility: Analyzing Method-based attacks on Anonymized Data
    Cormode, Graham
    Srivastava, Divesh
    Li, Ninghui
    Li, Tiancheng
    [J]. PROCEEDINGS OF THE VLDB ENDOWMENT, 2010, 3 (01): : 1045 - 1056
  • [4] Differentially Private Spatial Decompositions
    Cormode, Graham
    Procopiuc, Cecilia
    Srivastava, Divesh
    Shen, Entong
    Yu, Ting
    [J]. 2012 IEEE 28TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE), 2012, : 20 - 31
  • [5] Differential privacy: A survey of results
    Dwork, Cynthia
    [J]. THEORY AND APPLICATIONS OF MODELS OF COMPUTATION, PROCEEDINGS, 2008, 4978 : 1 - 19
  • [6] Deploying parallelised ciphertext-policy attributed-based encryption in clouds
    Fan, Wenjie
    Li, Lifeng
    Chen, Xiaowan
    Jiang, Hai
    Li, Zhongwen
    Li, Kuan-Ching
    [J]. INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2018, 16 (03) : 321 - 333
  • [7] Furukawa Jun, 2013, Computer Security - ESORICS 2013. 18th European Symposium on Research in Computer Security. Proceedings: LNCS 8134, P129, DOI 10.1007/978-3-642-40203-6_8
  • [8] Furukawa J, 2014, LECT NOTES COMPUT SC, V8813, P337, DOI 10.1007/978-3-319-12280-9_22
  • [9] Ganta S.R., 2008, P 14 ACM SIGKDD INT, P265, DOI [DOI 10.1145/1401890.1401926, 10.1145/1401890.1401926]
  • [10] Introduction and Preliminaries
    不详
    [J]. FOUNDATIONS AND TRENDS IN THEORETICAL COMPUTER SCIENCE, 2005, 1 (01): : 1 - 124