Range Search over Encrypted Multi-Attribute Data

被引:4
作者
Falzon, Francesca [1 ,2 ]
Markatou, Evangelia Anna [1 ]
Espiritu, Zachary [1 ]
Tamassia, Roberto [1 ]
机构
[1] Brown Univ, Providence, RI 02912 USA
[2] Univ Chicago, Chicago, IL 60637 USA
来源
PROCEEDINGS OF THE VLDB ENDOWMENT | 2022年 / 16卷 / 04期
基金
美国国家科学基金会;
关键词
STRUCTURED ENCRYPTION; PROTECTION; QUERIES;
D O I
10.14778/3574245.3574247
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This work addresses expressive queries over encrypted data by presenting the first systematic study of multi-attribute range search on a symmetrically encrypted database outsourced to an honest-but-curious server. Prior work includes a thorough analysis of single-attribute range search schemes (e.g. Demertzis et al. 2016) and a proposed high-level approach for multi-attribute schemes (De Capitani di Vimercati et al. 2021). We first introduce a flexible framework for building secure range search schemes over multiple attributes (dimensions) by adapting a broad class of geometric search data structures to operate on encrypted data. Our framework encompasses widely used data structures such as multi-dimensional range trees and quadtrees, and has strong security properties that we formally prove. We then develop six concrete highly parallelizable range search schemes within our framework that offer a sliding scale of efficiency and security tradeoffs to suit the needs of the application. We evaluate our schemes with a formal complexity and security analysis, a prototype implementation, and an experimental evaluation on real-world datasets.
引用
收藏
页码:587 / 600
页数:14
相关论文
共 77 条
[1]  
Agrawal R., 2004, ACM SIGMOD INT C MAN, P563
[2]  
[Anonymous], 2011, P 17 ACM SIGKDD INT, DOI DOI 10.1145/2020408.2020579
[3]  
Arge Lars, 2004, P ACM SIGMOD INT C M, P347, DOI DOI 10.1145/1007568
[4]  
BECKMANN N, 1990, SIGMOD REC, V19, P322, DOI 10.1145/93605.98741
[5]  
BENTLEY JL, 1979, COMPUT SURV, V11, P397, DOI 10.1145/356789.356797
[6]   The Tao of Inference in Privacy-Protected Databases [J].
Bindschaedler, Vincent ;
Grubbs, Paul ;
Cash, David ;
Ristenpart, Thomas ;
Shmatikov, Vitaly .
PROCEEDINGS OF THE VLDB ENDOWMENT, 2018, 11 (11) :1715-1728
[7]   Epsolute: Efficiently Querying Databases While Providing Differential Privacy [J].
Bogatov, Dmytro ;
Kellaris, Georgios ;
Kollios, George ;
Nissim, Kobbi ;
O'Neill, Adam .
CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, :2262-2276
[8]   A Comparative Evaluation of Order-Revealing Encryption Schemes and Secure Range-Query Protocols [J].
Bogatov, Dmytro ;
Kollios, George ;
Reyzin, Leonid .
PROCEEDINGS OF THE VLDB ENDOWMENT, 2019, 12 (08) :933-947
[9]  
Boldyreva A, 2009, LECT NOTES COMPUT SC, V5479, P224, DOI 10.1007/978-3-642-01001-9_13
[10]   Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives [J].
Bost, Raphael ;
Minaud, Brice ;
Ohrimenko, Olga .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :1465-1482