Private Search on Key-Value Stores with Hierarchical Indexes

被引:0
|
作者
Hu, Haibo [1 ]
Xu, Jianliang [1 ]
Xu, Xizhong [1 ]
Pei, Kexin [1 ]
Choi, Byron [1 ]
Zhou, Shuigeng [2 ]
机构
[1] Hong Kong Baptist Univ, Dept Comp Sci, Hong Kong, Hong Kong, Peoples R China
[2] Fudan Univ, Sch Comp Sci, Shanghai, Peoples R China
来源
2014 IEEE 30TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE) | 2014年
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Query processing that preserves both the query privacy at the client and the data privacy at the server is a new research problem. It has many practical applications, especially when the queries are about the sensitive attributes of records. However, most existing studies, including those originating from data outsourcing, address the data privacy and query privacy separately. Although secure multiparty computation (SMC) is a suitable computing paradigm for this problem, it has significant computation and communication overheads, thus unable to scale up to large datasets. Fortunately, recent advances in cryptography bring us two relevant tools - conditional oblivious transfer and homomorphic encryption. In this paper, we integrate database indexing techniques with these tools in the context of private search on key- value stores. We first present an oblivious index traversal framework, in which the server cannot trace the index traversal path of a query during evaluation. The framework is generic and can support a wide range of query types with a suitable homomorphic encryption algorithm in place. Based on this framework, we devise secure protocols for classic key search queries on B+-tree and R-tree indexes. Our approach is verified by both security analysis and performance study.
引用
收藏
页码:628 / 639
页数:12
相关论文
共 50 条
  • [1] Oblivious Key-Value Stores and Amplification for Private Set Intersection
    Garimella, Gayathri
    Pinkas, Benny
    Rosulek, Mike
    Ni Trieu
    Yanai, Avishay
    ADVANCES IN CRYPTOLOGY - CRYPTO 2021, PT II, 2021, 12826 : 395 - 425
  • [2] Encrypted Key-Value Stores
    Agarwal, Archita
    Kamara, Seny
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2020, 2020, 12578 : 62 - 85
  • [3] Scalable Versioning for Key-Value Stores
    Haeusler, Martin
    DATA: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON DATA MANAGEMENT TECHNOLOGIES AND APPLICATIONS, 2016, : 79 - 86
  • [4] Fast Scans on Key-Value Stores
    Pilman, Markus
    Bocksrocker, Kevin
    Braun, Lucas
    Marroquin, Renato
    Kossmann, Donald
    PROCEEDINGS OF THE VLDB ENDOWMENT, 2017, 10 (11): : 1526 - 1537
  • [5] TraSS: Efficient Trajectory Similarity Search Based on Key-Value Data Stores
    He, Huajun
    Li, Ruiyuan
    Ruan, Sijie
    He, Tianfu
    Bao, Jie
    Li, Tianrui
    Zheng, Yu
    2022 IEEE 38TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2022), 2022, : 2306 - 2318
  • [6] Parallax: Hybrid Key-Value Placement in LSM-based Key-Value Stores
    Xanthakis, Giorgos
    Saloustros, Giorgos
    Batsaras, Nikos
    Papagiannis, Anastasios
    Bilas, Angelos
    PROCEEDINGS OF THE 2021 ACM SYMPOSIUM ON CLOUD COMPUTING (SOCC '21), 2021, : 305 - 318
  • [7] Towards Elastic Key-value Stores on IaaS
    Li, Han
    2013 IEEE 29TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING WORKSHOPS (ICDEW), 2013, : 302 - 305
  • [8] A Design for Scalable and Secure Key-value Stores
    Chen, Longbin
    Dai, Wenyun
    Qiu, Meikang
    Jiang, Ning
    2017 IEEE INTERNATIONAL CONFERENCE ON SMART CLOUD (SMARTCLOUD), 2017, : 216 - 221
  • [9] Integrity Verification in Cloud Key-Value Stores
    Weintraub, Grisha
    Rise, Leonid
    Kadosh, Alon
    PROCEEDINGS OF THE 15TH ACM INTERNATIONAL CONFERENCE ON SYSTEMS AND STORAGE, SYSTOR 2022, 2022, : 140 - 140
  • [10] Robust Data Sharing with Key-Value Stores
    Basescu, Cristina
    Cachin, Christian
    Eyal, Ittay
    Haas, Robert
    Sorniotti, Alessandro
    Vukolic, Marko
    Zachevsky, Ido
    2012 42ND ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN), 2012,