A Quantum-Based Database Query Scheme for Privacy Preservation in Cloud Environment

Cloud computing is a powerful and popular information technology paradigm that enables data service outsourcing and provides higher-level services with minimal management effort. However, it is still a key challenge to protect data privacy when a user accesses the sensitive cloud data. Privacy-preserving database query allows the user to retrieve a data item from the cloud database without revealing the information of the queried data item, meanwhile limiting user’s ability to access other ones. In this study, in order to achieve the privacy preservation and reduce the communication complexity, a quantum-based database query scheme for privacy preservation in cloud environment is developed. Specifically, all the data items of the database are firstly encrypted by different keys for protecting server’s privacy, and in order to guarantee the clients’ privacy, the server is required to transmit all these encrypted data items to the client with the oblivious transfer strategy. Besides, two oracle operations, a modified Grover iteration, and a special offset encryption mechanism are combined together to ensure that the client can correctly query the desirable data item. Finally, performance evaluation is conducted to validate the correctness, privacy, and efficiency of our proposed scheme.

[1]  Yu-Zhong Zhang,et al.  On-Line Scheduling on Parallel Machines to Minimize the Makespan , 2016, J. Syst. Sci. Complex..

[2]  Lukasz Olejnik,et al.  Secure quantum private information retrieval using phase-encoded queries , 2011 .

[3]  Dawn Xiaodong Song,et al.  Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[4]  Xuyun Zhang,et al.  Privacy-Aware Data Publishing and Integration for Collaborative Service Recommendation , 2018, IEEE Access.

[5]  Michael O. Rabin,et al.  How To Exchange Secrets with Oblivious Transfer , 2005, IACR Cryptol. ePrint Arch..

[6]  Jiguo Yu,et al.  Privacy-Preserving and Scalable Service Recommendation Based on SimHash in a Distributed Cloud Environment , 2017, Complex..

[7]  Chaman Singh,et al.  Database Management System as a Cloud Service , 2017 .

[8]  Alfons Kemper,et al.  Database as a Service , 2011, Datenbank-Spektrum.

[9]  Preskill,et al.  Efficient networks for quantum factoring. , 1996, Physical review. A, Atomic, molecular, and optical physics.

[10]  Yong Xu,et al.  Multiparty quantum sealed-bid auction using single photons as message carrier , 2016, Quantum Inf. Process..

[11]  Xuyun Zhang,et al.  A Distributed Locality-Sensitive Hashing-Based Approach for Cloud Service Recommendation From Multi-Source Data , 2017, IEEE Journal on Selected Areas in Communications.

[12]  Randy H. Katz,et al.  Above the Clouds: A Berkeley View of Cloud Computing , 2009 .

[13]  Wenjie Liu,et al.  Full-Blind Delegating Private Quantum Computation , 2020, ArXiv.

[14]  Xuyun Zhang,et al.  An Exception Handling Approach for Privacy-Preserving Service Recommendation Failure in a Cloud Environment , 2018, Sensors.

[15]  Cong Wang,et al.  Secure Ranked Keyword Search over Encrypted Cloud Data , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.

[16]  Wenjie Liu,et al.  A Unitary Weights Based One-Iteration Quantum Perceptron Algorithm for Non-Ideal Training Sets , 2019, IEEE Access.

[17]  Chao Liu,et al.  Improved Deterministic N-To-One Joint Remote Preparation of an Arbitrary Qubit via EPR Pairs , 2014, 1405.6453.

[18]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[19]  Lov K. Grover Quantum Mechanics Helps in Searching for a Needle in a Haystack , 1997, quant-ph/9706033.

[20]  Gene Tsudik,et al.  Privacy-Preserving Cloud Database Querying , 2011, J. Internet Serv. Inf. Secur..

[21]  S. Gudder Review: A. S. Holevo, Probabilistic and statistical aspects of quantum theory , 1985 .

[22]  Ching-Nung Yang,et al.  Quantum Relief algorithm , 2018, Quantum Information Processing.

[23]  Xu An Wang,et al.  Efficient privacy preserving predicate encryption with fine-grained searchable capability for Cloud storage , 2016, Comput. Electr. Eng..

[24]  Sunguk Lee,et al.  Database Management System as a Cloud Service , 2012 .

[25]  R. Mousoli,et al.  Controlled cyclic remote state preparation of arbitrary qubit states , 2018 .

[26]  Jing Zhao,et al.  Methods for Solving Generalized Nash Equilibrium , 2013, J. Appl. Math..

[27]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[28]  Christoph Simon,et al.  Practical private database queries based on a quantum-key-distribution protocol , 2010, 1002.4360.

[29]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[30]  Seth Lloyd,et al.  Quantum private queries. , 2007, Physical review letters.

[31]  Ching-Nung Yang,et al.  An Efficient and Secure Arbitrary N-Party Quantum Key Agreement Protocol Using Bell States , 2018 .

[32]  Gail-Joon Ahn,et al.  Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.

[33]  Wenjie Liu,et al.  Multi-party Semi-quantum Key Agreement with Delegating Quantum Computation , 2017 .

[34]  Naihua Xiu,et al.  Some projection-like methods for the generalized Nash equilibria , 2010, Comput. Optim. Appl..

[35]  V. Buzek,et al.  Quantum secret sharing , 1998, quant-ph/9806063.

[36]  Gang Xu,et al.  Rational Non-Hierarchical Quantum State Sharing Protocol , 2019 .

[37]  Yiwei Thomas Hou,et al.  Inverted index based multi-keyword public-key searchable encryption with strong privacy guarantee , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).

[38]  Juan Xu,et al.  Analysis and Improvement of an Efficient Controlled Quantum Secure Direct Communication and Authentication Protocol , 2018 .

[39]  Shujun Lian,et al.  Smoothing of the lower-order exact penalty function for inequality constrained optimization , 2016 .

[40]  Chen Hanwu,et al.  An efficient deterministic secure quantum communication scheme based on cluster states and identity authentication , 2009 .

[41]  Eyal Kushilevitz,et al.  Private information retrieval , 1998, JACM.

[42]  Zhiguo Qu,et al.  A Novel Quantum Stegonagraphy Based on Brown States , 2018 .

[43]  Lianyong Qi,et al.  Privacy-Aware Multidimensional Mobile Service Quality Prediction and Recommendation in Distributed Fog Environment , 2018, Wirel. Commun. Mob. Comput..

[44]  Cheng Ma,et al.  A new class of exact penalty functions and penalty algorithms , 2014, J. Glob. Optim..

[45]  Hui Chen,et al.  Flexible quantum private queries based on quantum key distribution. , 2011, Optics express.

[46]  M. V. Panduranga Rao,et al.  Towards communication-efficient quantum oblivious key distribution , 2012, 1208.2501.

[47]  Xu An Wang,et al.  Reusable garbled gates for new fully homomorphic encryption service , 2017, Int. J. Web Grid Serv..

[48]  Peter W. Shor,et al.  Algorithms for quantum computation: discrete logarithms and factoring , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.

[49]  Wang Xiaojun,et al.  Attacks and Improvement of Quantum Sealed-Bid Auction with EPR Pairs , 2014 .

[50]  Xiaoqing Tan,et al.  Perfect Quantum Teleportation via Bell States , 2018 .

[51]  Ronald L. Rivest,et al.  ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .

[52]  Xu An Wang,et al.  Cost-effective secure E-health cloud system using identity based cryptographic techniques , 2017, Future Gener. Comput. Syst..