Fast Multi-dimensional Range Queries on Encrypted Cloud Databases

With the adoption of cloud computing, data owners can store their datasets on clouds for lower cost and better performance. However, privacy issues compel sensitive data to be encrypted before outsourcing, which inevitably introduces challenges in terms of search functionalities. This paper considers the issue of multi-dimensional range queries on encrypted cloud databases. Prior schemes focusing on this issue are weak in either security or efficiency. In this paper, using our improved asymmetric scalar-product-preserving encryption, we present an innovative technique for the encrypted rectangle intersection problem. Based on this technique, we propose a tree-based method to handle multi-dimensional range queries in encrypted form. Thorough analysis demonstrates that our method is secure under the honest-but-curious model and the known-plaintext attack model. Experimental results on both real-life and artificial datasets and comprehensive comparisons with other schemes show the high efficiency of our proposed approach.

[1]  Brent Waters,et al.  Conjunctive, Subset, and Range Queries on Encrypted Data , 2007, TCC.

[2]  Antonin Guttman,et al.  R-trees: a dynamic index structure for spatial searching , 1984, SIGMOD '84.

[3]  David,et al.  [Wiley Series in Probability and Statistics] Order Statistics (David/Order Statistics) || Basic Distribution Theory , 2003 .

[4]  Jure Leskovec,et al.  Friendship and mobility: user movement in location-based social networks , 2011, KDD.

[5]  Yantian Hou,et al.  Maple: scalable multi-dimensional range search over encrypted cloud data with tree-based index , 2014, AsiaCCS.

[6]  Cong Wang,et al.  Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data , 2014 .

[7]  Murat Kantarcioglu,et al.  Secure multidimensional range queries over outsourced data , 2012, The VLDB Journal.

[8]  Peng Wang,et al.  Secure and efficient range queries on outsourced databases using Rp-trees , 2013, 2013 IEEE 29th International Conference on Data Engineering (ICDE).

[9]  Hakan Hacigümüs,et al.  Executing SQL over encrypted data in the database-service-provider model , 2002, SIGMOD '02.

[10]  Gu Jixing,et al.  Known‐plaintext attack on secure kNN computation on encrypted databases , 2014 .

[11]  Jon Louis Bentley,et al.  Multidimensional binary search trees used for associative searching , 1975, CACM.

[12]  Yanbin Lu,et al.  Privacy-preserving Logarithmic-time Search on Encrypted Data in Cloud , 2012, NDSS.

[13]  Rui Li,et al.  Fast Range Query Processing with Strong Privacy Protection for Cloud Computing , 2014, Proc. VLDB Endow..

[14]  Elaine Shi,et al.  Multi-Dimensional Range Query over Encrypted Data , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[15]  Haitao Wang,et al.  Geometric Range Search on Encrypted Spatial Data , 2016, IEEE Transactions on Information Forensics and Security.

[16]  Hakan Hacigümüs,et al.  Providing database as a service , 2002, Proceedings 18th International Conference on Data Engineering.

[17]  H. N. Nagaraja,et al.  Order Statistics, Third Edition , 2005, Wiley Series in Probability and Statistics.

[18]  Rafail Ostrovsky,et al.  Software protection and simulation on oblivious RAMs , 1996, JACM.

[19]  Dawn Xiaodong Song,et al.  Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[20]  Min Zhang,et al.  Privacy-Enhancing Range Query Processing over Encrypted Cloud Databases , 2015, WISE.

[21]  Nikos Mamoulis,et al.  Secure kNN computation on encrypted databases , 2009, SIGMOD Conference.

[22]  Christian S. Jensen,et al.  Building Accurate 3D Spatial Networks to Enable Next Generation Intelligent Transportation Systems , 2013, 2013 IEEE 14th International Conference on Mobile Data Management.

[23]  Dengguo Feng,et al.  Fast Multi-keywords Search over Encrypted Cloud Data , 2016, WISE.