Secure Storage and Fuzzy Query over Encrypted Databases
详细信息    查看全文
  • 作者:Zheli Liu (19)
    Haoyu Ma (19)
    Jin Li (20)
    Chunfu Jia (19)
    Jingwei Li (19)
    Ke Yuan (19)
  • 刊名:Lecture Notes in Computer Science
  • 出版年:2013
  • 出版时间:2013
  • 年:2013
  • 卷:7873
  • 期:1
  • 页码:451-464
  • 全文大小:258KB
  • 参考文献:1. Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Order preserving encryption for numeric data. In: Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data, pp. 563鈥?74. ACM (2004)
    2. Amanatidis, G., Boldyreva, A., O鈥橬eill, A.: Provably-secure schemes for basic query support in outsourced databases. In: Barker, S., Ahn, G.-J. (eds.) Data and Applications Security 2007. LNCS, vol.聽4602, pp. 14鈥?0. Springer, Heidelberg (2007) CrossRef
    3. Bao, F., Deng, R.H., Ding, X., Yang, Y.: Private query on encrypted data in multi-user settings. In: Chen, L., Mu, Y., Susilo, W. (eds.) ISPEC 2008. LNCS, vol.聽4991, pp. 71鈥?5. Springer, Heidelberg (2008) CrossRef
    4. Bellare, M., Ristenpart, T., Rogaway, P., Stegers, T.: Format-preserving encryption. In: Jacobson Jr., M.J., Rijmen, V., Safavi-Naini, R. (eds.) SAC 2009. LNCS, vol.聽5867, pp. 295鈥?12. Springer, Heidelberg (2009) CrossRef
    5. Bellare, M., Rogaway, P., Spies, T.: The ffx mode of operation for format-preserving encryption, NIST submission (February 2010)
    6. Black, J., Halevi, S., Krawczyk, H., Krovetz, T., Rogaway, P.: UMAC: Fast and secure message authentication. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.聽1666, pp. 216鈥?33. Springer, Heidelberg (1999) CrossRef
    7. Black, J., Rogaway, P.: Ciphers with arbitrary finite domains. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol.聽2271, pp. 114鈥?30. Springer, Heidelberg (2002) CrossRef
    8. Boldyreva, A., Chenette, N., Lee, Y., O鈥橬eill, A.: Order-preserving symmetric encryption. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol.聽5479, pp. 224鈥?41. Springer, Heidelberg (2009) CrossRef
    9. Boneh, D., Waters, B.: Conjunctive, subset, and range queries on encrypted data. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol.聽4392, pp. 535鈥?54. Springer, Heidelberg (2007) CrossRef
    10. Carter, J., Wegman, M.N.: Universal classes of hash functions. Journal of Computer and System Sciences聽18(2), 143鈥?54 (1979) CrossRef
    11. Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: Improved definitions and efficient constructions. Journal of Computer Security聽19(5), 895鈥?34 (2011)
    12. van Dijk, M., Gentry, C., Halevi, S., Vaikuntanathan, V.: Fully homomorphic encryption over the integers. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol.聽6110, pp. 24鈥?3. Springer, Heidelberg (2010) CrossRef
    13. Evdokimov, S., G眉nther, O.: Encryption techniques for secure database outsourcing. In: Biskup, J., L贸pez, J. (eds.) ESORICS 2007. LNCS, vol.聽4734, pp. 327鈥?42. Springer, Heidelberg (2007) CrossRef
    14. Ge, T., Zdonik, S.: Fast, secure encryption for indexing in a column-oriented dbms. In: IEEE 23rd International Conference on Data Engineering, pp. 327鈥?42. IEEE (2007)
    15. Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Proceedings of the 41st Annual ACM Symposium on Theory of Computing, pp. 169鈥?78. ACM (2009)
    16. Hakan, H., Bala, L., Chen, L., Sharad, M.: Executing sql over encrypted data in the database-service-provider model. In: Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data, pp. 216鈥?27. ACM (2002)
    17. Halevi, S., Krawczyk, H.: MMH: Software message authentication in the gbit/Second rates. In: Biham, E. (ed.) FSE 1997. LNCS, vol.聽1267, pp. 172鈥?89. Springer, Heidelberg (1997) CrossRef
    18. Hoang, V.T., Morris, B., Rogaway, P.: An enciphering scheme based on a card shuffle. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol.聽7417, pp. 1鈥?3. Springer, Heidelberg (2012) CrossRef
    19. Hoang, V.T., Rogaway, P.: On generalized feistel networks. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol.聽6223, pp. 613鈥?30. Springer, Heidelberg (2010) CrossRef
    20. Li, J., Wang, Q., Wang, C., Cao, N., Ren, K., Lou, W.: Fuzzy keyword search over encrypted data in cloud computing. In: 2010 IEEE INFOCOM, pp. 1鈥?. IEEE (2010)
    21. Li, M., Liu, Z., Li, J., Jia, C.: Format-preserving encryption for character data. Journal of Networks聽7(8), 1239鈥?244 (2012)
    22. Morris, B., Rogaway, P., Stegers, T.: How to encipher messages on a small domain: Deterministic encryption and the thorp shuffle. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol.聽5677, pp. 286鈥?02. Springer, Heidelberg (2009) CrossRef
    23. Nguyen, L.H., Roscoe, A.W.: Short-output universal hash functions and their use in fast and secure data authentication. In: Canteaut, A. (ed.) FSE 2012. LNCS, vol.聽7549, pp. 326鈥?45. Springer, Heidelberg (2012) CrossRef
    24. Patarin, J.: Luby-rackoff: 7 rounds are enough for 2 / n(1鈥夆垝鈥?em class="a-plus-plus">蔚) security. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.聽2729, pp. 513鈥?29. Springer, Heidelberg (2003) CrossRef
    25. Patarin, J.: Security of random feistel schemes with 5 or more rounds. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol.聽3152, pp. 106鈥?22. Springer, Heidelberg (2004) CrossRef
    26. Popa, R.A., Redfield, C.M.S., Zeldovich, N., Balakrishnan, H.: Cryptdb: protecting confidentiality with encrypted query processing. In: Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, pp. 85鈥?00. ACM (2011)
    27. Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceedings of the 21st IEEE Symposium on Security and Privacy, pp. 44鈥?5. IEEE (2000)
    28. Spies, T.: Feistel finite set encryption, NIST submission (February 2008)
    29. Wang, C., Cao, N., Li, J., Ren, K., Lou, W.: Secure ranked keyword search over encrypted cloud data. In: IEEE 30th International Conference on Distributed Computing Systems, pp. 253鈥?62. IEEE (2010)
    30. Wang, C., Ren, K., Yu, S., Urs, K.: Achieving usable and privacy-assured similarity search over outsourced cloud data. In: 2012 IEEE INFOCOM, pp. 451鈥?59. IEEE (2012)
    31. Wang, C., Wang, Q., Ren, K.: Towards secure and effective utilization over encrypted cloud data. In: The 31st International Conference on Distributed Computing Systems Workshops, pp. 282鈥?86. IEEE (2011)
    32. Wang, Z.F., Dai, J., Wang, W., Shi, B.L.: Fast query over encrypted character data in database. In: Zhang, J., He, J.-H., Fu, Y. (eds.) CIS 2004. LNCS, vol.聽3314, pp. 1027鈥?033. Springer, Heidelberg (2004) CrossRef
    33. Wegman, M.N., Carter, J.: New hash functions and their use in authentication and set equality. Journal of Computer and System Sciences聽22(3), 265鈥?79 (1981) CrossRef
    34. Yang, Z., Zhong, S., Wright, R.N.: Privacy-preserving queries on encrypted data. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol.聽4189, pp. 479鈥?95. Springer, Heidelberg (2006) CrossRef
  • 作者单位:Zheli Liu (19)
    Haoyu Ma (19)
    Jin Li (20)
    Chunfu Jia (19)
    Jingwei Li (19)
    Ke Yuan (19)

    19. College of Information Technical Science, Nankai University, China
    20. School of Computer Science, Guangzhou University, China
  • ISSN:1611-3349
文摘
Outsourcing database has attracted much attention recently due to the emergence of Cloud Computing. However, there are still two problems to solve, 1) how to encipher and protect the sensitive information before outsourcing while keeping the database structure, and 2) how to enable better utilization of the database like fuzzy queries over the encrypted information. In this paper we propose a new solution based on format-preserving encryption, which protects the privacy of the sensitive data and keeps the data structure as well in the encrypted database. We also show how to perform fuzzy queries over such enciphered data. Specially, our scheme supports fuzzy queries by simply exploiting the internal storing and query mechanism of the databases, thus the influence on both the inner relation of databases and the construction of applications are minimized. Evaluation indicates that our scheme is able to efficiently perform fuzzy query on encrypted database.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700