Order-Hiding Range Query Over Encrypted Cloud Data
نویسندگان
چکیده
Range query on encrypted data has been widely studied to achieve fast processing while keeping and queries secret. Prior work hides even the ordering information of data, but sacrifices accuracy (e.g., false positives) efficiency exponential complexity in domain size) as a trade-off. Moreover, hiding order alone is not sufficient prevent recent database reconstruction attacks range abusing access pattern volume leakage. Several countermeasures such leakage incur practically unacceptable storage or computational overhead due fake records embedded re-encryption procedures. In this paper, we first propose scheme RevealRE, which highly efficient, reveals information. We then extend RevealRE construct HideRE, that does leak accurate (i.e., no positives/negatives) efficient logarithmic search time). HideRE can mitigate by introducing deceptive queries, are indistinguishable from regular obfuscating queried ranges. experimentally confirm our construction under various distribution models, demonstrating practicality. Resilience order-hiding formally proved.
منابع مشابه
Private Key based query on encrypted data
Nowadays, users of information systems have inclination to use a central server to decrease data transferring and maintenance costs. Since such a system is not so trustworthy, users' data usually upkeeps encrypted. However, encryption is not a nostrum for security problems and cannot guarantee the data security. In other words, there are some techniques that can endanger security of encrypted d...
متن کاملPrivacy Preserving Range Query Search over Encrypted Numeric Data in Cloud
In cloud computing, to protect privacy when outsourcing database management systems, confidential data (e.g., bank account balance) has to be encrypted which however renders traditional query processing methods (e.g., the B-tree index) inapplicable. In this thesis, we consider processing range query search (e.g., retrieving all records with a bank account balance being less than some threshold)...
متن کاملData Mining Over Encrypted Data on Cloud
Data Mining has wide applications in many areas such as medicine, scientific, banking, research and among government agencies. For the past decade, due to the rise of various privacy issues, many theoretical and practical solutions to the classification problem have been proposed under different security models. Classification is one of the commonly used tasks in data mining applications Howeve...
متن کاملSecure Data Hiding in Image over Encrypted Domain
Steganography is a concept of hiding or concealing data in a cover object while the sender and receiver are able to communicate within themselves. The security of data has been prime concern for the people from past and many research works are still going to find out convenient methods to safeguard the communication between people. Intruder can easily detect the information in the links as inte...
متن کاملEfficient multi-keyword ranked query over encrypted data in cloud computing
Cloud computing infrastructure is a promising new technology and greatly accelerates the development of large scale data storage, processing and distribution. However, security and privacy become major concerns when data owners outsource their private data onto public cloud servers that are not within their trusted management domains. To avoid information leakage, sensitive data have to be encr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2022
ISSN: ['2169-3536']
DOI: https://doi.org/10.1109/access.2022.3192421