Order-Hiding Range Query Over Encrypted Cloud Data

نویسندگان

چکیده

Range query on encrypted data has been widely studied to achieve fast processing while keeping and queries secret. Prior work hides even the ordering information of data, but sacrifices accuracy (e.g., false positives) efficiency exponential complexity in domain size) as a trade-off. Moreover, hiding order alone is not sufficient prevent recent database reconstruction attacks range abusing access pattern volume leakage. Several countermeasures such leakage incur practically unacceptable storage or computational overhead due fake records embedded re-encryption procedures. In this paper, we first propose scheme RevealRE, which highly efficient, reveals information. We then extend RevealRE construct HideRE, that does leak accurate (i.e., no positives/negatives) efficient logarithmic search time). HideRE can mitigate by introducing deceptive queries, are indistinguishable from regular obfuscating queried ranges. experimentally confirm our construction under various distribution models, demonstrating practicality. Resilience order-hiding formally proved.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Private Key based query on encrypted data

Nowadays, users of information systems have inclination to use a central server to decrease data transferring and maintenance costs. Since such a system is not so trustworthy, users' data usually upkeeps encrypted. However, encryption is not a nostrum for security problems and cannot guarantee the data security. In other words, there are some techniques that can endanger security of encrypted d...

متن کامل

Privacy Preserving Range Query Search over Encrypted Numeric Data in Cloud

In cloud computing, to protect privacy when outsourcing database management systems, confidential data (e.g., bank account balance) has to be encrypted which however renders traditional query processing methods (e.g., the B-tree index) inapplicable. In this thesis, we consider processing range query search (e.g., retrieving all records with a bank account balance being less than some threshold)...

متن کامل

Data Mining Over Encrypted Data on Cloud

Data Mining has wide applications in many areas such as medicine, scientific, banking, research and among government agencies. For the past decade, due to the rise of various privacy issues, many theoretical and practical solutions to the classification problem have been proposed under different security models. Classification is one of the commonly used tasks in data mining applications Howeve...

متن کامل

Secure Data Hiding in Image over Encrypted Domain

Steganography is a concept of hiding or concealing data in a cover object while the sender and receiver are able to communicate within themselves. The security of data has been prime concern for the people from past and many research works are still going to find out convenient methods to safeguard the communication between people. Intruder can easily detect the information in the links as inte...

متن کامل

Efficient multi-keyword ranked query over encrypted data in cloud computing

Cloud computing infrastructure is a promising new technology and greatly accelerates the development of large scale data storage, processing and distribution. However, security and privacy become major concerns when data owners outsource their private data onto public cloud servers that are not within their trusted management domains. To avoid information leakage, sensitive data have to be encr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2022

ISSN: ['2169-3536']

DOI: https://doi.org/10.1109/access.2022.3192421