A Synthetic Encryption Scheme on Attribute Granularity in the ODB Model

Article Preview

Abstract:

The improvement of cryptogram query hit rate and the reduction of redundant data in query results are the challenges in the outsourced database (ODB) model. A synthetic encryption scheme applied to the ODB is presented to solve the problem of precise query over the cryptogram. This scheme employs encryption scheme on the attribute granularity, which combines a newly k-Mapping Character-data Encryption Scheme (k-MCES) with the existing Order Preserving Encryption Scheme (OPES). The theories and experiments analysis show that queries over encrypted data with this synthetic encryption scheme can return exact results. Furthermore, this scheme is correct and safe.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

668-672

Citation:

Online since:

January 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] H.Hacigumus, B.Iyer, C.Li, et al. Executing SQL over encrypted data in the database-service- provider model[C]. In Proc. of ACM Conference on Management of Data,USA, 2002:216-227.

DOI: 10.1145/2213836.2370917

Google Scholar

[2] L.FF, M.Hadjieleftheriou, G.Kollios. Dynamic authenticated index structures for outsourced databases[C]. In Proc. of ACM Conference on Management of Data, USA, 2006:121-132.

DOI: 10.1145/1142473.1142488

Google Scholar

[3] Y. Yang, S. Papadopoulos, D. Papadias, et al. Authenticated Indexing for Outsourced Spatial Databases. The VLDB Journal, 2009, 118(3):631-648.

DOI: 10.1007/s00778-008-0113-2

Google Scholar

[4] M. Xie, H. Wang, J. Yin, et al. Integrity Auditing of Outsourced Data. In Proc. of the 30th Conference on Very Large Databases, Austria, 2007:782-793.

Google Scholar

[5] H.Hacigumus, B.Iyer, S.Mehrotra. Providing database as a service[C]. In Proc. of International Conference on Data Engineering (ICDE), 2002: 29-40.

DOI: 10.1109/icde.2002.994695

Google Scholar

[6] B. Hore, S. Mehrotra, G. Tsudik. A Privacy-Index for Range Queries[C]. In Proc. of the 30th VLDB conference, Toronto, Canada, 2004:223-235.

DOI: 10.1016/b978-012088469-8.50064-4

Google Scholar

[7] Z. Danfeng, G.Feng, J.Shunfu, et al. A cryptograph index technology based on wrong hit expectation[J]. Journal of Chinese Computer Systems.2010, 31(1):113-118.

Google Scholar

[8] R Agrawal, J. Kiernan, R. Srikant, et al. Order Preserving Encryption for Numeric Data. In Proc. of the ACM SIGMOD Conference On Management of Data, Paris, France, 2004:563-574.

DOI: 10.1145/1007568.1007632

Google Scholar

[9] TPC-H. Benchmark Specification [OP]. [2009-04-20]. http://www.tpc.org.

Google Scholar

[10] D. X. Song, D. Wanger, A. Perrig. Practical Techniques for Searches on Encrypted Data. In Proc. of IEEE Symposium on Security and Privacy, Berkeley, CA, USA, 2000:44-55.

DOI: 10.1109/secpri.2000.848445

Google Scholar

[11] Y. Elovici, R. Waisenberg, E. Shmueli, et al. A Structure Preserving Database Encryption Scheme. In Proc. of VLDB Workshop on Secure Data Management. Canada, 2004:28-40.

DOI: 10.1007/978-3-540-30073-1_3

Google Scholar

[12] E. Mykletun, M. Narasimha, G. Tsudik. Authentication and Integrity in Outsourced Databases. ACM Transactions on Storage, 2006, 2(2):107-138.

DOI: 10.1145/1149976.1149977

Google Scholar