Range Search over Encrypted Multi-Attribute Data

被引:4
作者
Falzon, Francesca [1 ,2 ]
Markatou, Evangelia Anna [1 ]
Espiritu, Zachary [1 ]
Tamassia, Roberto [1 ]
机构
[1] Brown Univ, Providence, RI 02912 USA
[2] Univ Chicago, Chicago, IL 60637 USA
来源
PROCEEDINGS OF THE VLDB ENDOWMENT | 2022年 / 16卷 / 04期
基金
美国国家科学基金会;
关键词
STRUCTURED ENCRYPTION; PROTECTION; QUERIES;
D O I
10.14778/3574245.3574247
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This work addresses expressive queries over encrypted data by presenting the first systematic study of multi-attribute range search on a symmetrically encrypted database outsourced to an honest-but-curious server. Prior work includes a thorough analysis of single-attribute range search schemes (e.g. Demertzis et al. 2016) and a proposed high-level approach for multi-attribute schemes (De Capitani di Vimercati et al. 2021). We first introduce a flexible framework for building secure range search schemes over multiple attributes (dimensions) by adapting a broad class of geometric search data structures to operate on encrypted data. Our framework encompasses widely used data structures such as multi-dimensional range trees and quadtrees, and has strong security properties that we formally prove. We then develop six concrete highly parallelizable range search schemes within our framework that offer a sliding scale of efficiency and security tradeoffs to suit the needs of the application. We evaluate our schemes with a formal complexity and security analysis, a prototype implementation, and an experimental evaluation on real-world datasets.
引用
收藏
页码:587 / 600
页数:14
相关论文
共 77 条
[51]  
Kiayias A., 2013, P 2013 ACM SIGSAC C, P669
[52]  
Kornaropoulos Evgenios M., 2022, CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, P1829, DOI 10.1145/3548606.3560593
[53]   The State of the Uniform: Attacks on Encrypted Databases Beyond the Uniform Query Distribution [J].
Kornaropoulos, Evgenios M. ;
Papamanthou, Charalampos ;
Tamassia, Roberto .
2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020), 2020, :1223-1240
[54]  
Kornaropoulos Evgenios M., 2021, PROC IEEE S SECURITY
[55]   The Case for Learned Index Structures [J].
Kraska, Tim ;
Beutel, Alex ;
Chi, Ed H. ;
Dean, Jeffrey ;
Polyzotis, Neoklis .
SIGMOD'18: PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA, 2018, :489-504
[56]   Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage [J].
Lacharite, Marie-Sarah ;
Minaud, Brice ;
Paterson, Kenneth G. .
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2018, :297-314
[57]   Order-Revealing Encryption: New Constructions, Applications, and Lower Bounds [J].
Lewi, Kevin ;
Wu, David J. .
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :1167-1178
[58]  
Li FF, 2005, LECT NOTES COMPUT SC, V3633, P273
[59]  
Malte Spitz, 2011, CRAWDAD DAT SPITZ CE
[60]   Benchmarking Learned Indexes [J].
Marcus, Ryan ;
Kipf, Andreas ;
van Renen, Alexander ;
Stoian, Mihail ;
Misra, Sanchit ;
Kemper, Alfons ;
Neumann, Thomas ;
Kraska, Tim .
PROCEEDINGS OF THE VLDB ENDOWMENT, 2020, 14 (01) :1-13