New construction of secure range query on encrypted data in cloud computing
Academic papers|更新时间:2024-06-05
|
New construction of secure range query on encrypted data in cloud computing
Journal on CommunicationsVol. 36, Issue 2, Pages: 29-37(2015)
作者机构:
1. 南京邮电大学 计算机学院,江苏 南京 210003
2. 江苏省无线传感网高技术研究重点实验室,江苏 南京 210003
3. 网络与数据安全四川省重点实验室,四川 成都 610054
4. 河南大学 计算机与信息工程学院,河南 郑州 475004
作者简介:
基金信息:
The National Natural Science Foundation of China(61373139);The National Natural Science Foundation of China(61373006);The Natural Science Foundation of Jiangsu Province(BK2012833);The National Natural Science Foundation of China(61003236)
Shao-hui WANG, Zhi-jie HAN, Dan-wei CHEN, et al. New construction of secure range query on encrypted data in cloud computing[J]. Journal on Communications, 2015, 36(2): 29-37.
DOI:
Shao-hui WANG, Zhi-jie HAN, Dan-wei CHEN, et al. New construction of secure range query on encrypted data in cloud computing[J]. Journal on Communications, 2015, 36(2): 29-37. DOI: 10.11959/j.issn.1000-436x.2015028.
New construction of secure range query on encrypted data in cloud computing
To solve the information leakage problem resulting from several assertions of previous range query solutions
there is a secure range query scheme with one assertion (SRQSAE scheme)
and the scheme is claimed to be secure against ciphertext-only attack.The security analysis on SRQSAE scheme is presented
and it shows SRQSAE scheme can not hide the size of search keyword.A new scheme of secure range query on encrypted data is proposed through introducing random numbers in the generation of search index and trapdoor.The new scheme can provide the privacy guarantee on search range and search keyword
and it achieves high level needs of security without losing efficiency.
关键词
Keywords
references
GOLDREICH O , OSTROVSKY R . Software protection and simulation on oblivious RAMs [J ] . Journal of the ACM , 1996 , 43 ( 3 ): 431 - 473 .
SONG D , WAGNER D , PERRIG A . Practical techniques for searching on encrypted data [A ] . SSP 2000,Proceedings of the 2000 IEEE Symposium on Security and Privacy [C ] . Seattle,USA , 2006 . 44 - 55 .
CHANG Y , MITZENMACHER M . Privacy preserving keyword searches on remote encrypted data [A ] . ACNS’05,Proceedings of Applied Cryptography and Network Security,LNCS 3531 [C ] . Berlin,Germany , 2005 . 445 - 455 .
CURTMOLA R , GARAY J , KAMARA S . OSTROVSKY R.Searchable symmetric encryption:improved definitions and efficient constructions [A ] . CCS 2006,Proceedings of ACM Conference on Computer and Communications Security [C ] . New York,USA , 2006 . 79 - 88 .
LIESDONK P , SEDGHI S , DOUMEN J , HARTEL P H , JONKER W . Computationally efficient searchable symmetric encryption [A ] . SDM 2010,Proceedings of Workshop on Secure Data Management,LNCS 6358 [C ] . Berlin,Germany , 2010 . 87 - 100 .
KUROSAWA K , OHTAKI Y . UC-secure searchable symmetric encryption [A ] . FC 2012,Proceedings of Financial Cryptography and Data Security,LNCS 7397 [C ] . Berlin,Germany , 2012 . 285 - 298 .
BONEH D , CRESCENZO G D , OSTROVSKY R , PERSIANO G . Public key encryption with keyword search [A ] . Advances in Cryptology:EUROCRYPT 2004,LNCS 3027 [C ] . Berlin,Germany , 2004 . 506 - 522 .
ABDALLA M , BELLARE M , CATALANO D , et al . Searchable encryption revisited:consistency properties,relation to anonymous IBE,and extensions [J ] . Journal of Cryptology , 2008 , 21 ( 3 ): 350 - 391 .
BELLARE M , BOLDYREVA A , O’NEIL A . Deterministic and efficiently searchable encryption [A ] . Advances in Cryptology:CRYPTO 2007,LNCS 4622 [C ] . Berlin,Germany , 2007 . 535 - 552 .
CAMENISCH J , KOHLWEISS M , RIAL A , et al . Blind and anonymous identity-based encryption and authorized private searches on public-key encrypted data [A ] . PKC’09,Proceedings of Public Key Cryptography,LNCS 5443 [C ] . Berlin,Germany , 2009 . 196 - 214 .
BONEH D , SAHAI A , WATERS B . Functional encryption:Definitions and challenges [A ] . TCC 2011,Proceedings of Theory of Cryptography,LNCS 6597 [C ] . Berlin,Germany , 2011 . 253 - 273 .
SHI E , BETHENCOURT J , CHAN T , et al . Multi-dimensional range query over encrypted data [A ] . SP 2007,Proceedings of the IEEE Symposium on Security and Privacy [C ] . Seattle,USA , 2007 . 350 - 364 .
AGRAWAL R , KIERNAN J , SRIKANT R , et al . Order preserving encryption for numeric data [A ] . SIGMOD 2004,Proceedings of ACM SIGMOD Conference [C ] . New York,USA , 2004 . 563 - 574 .
BOLDYREVA A , CHENETTE N , LEE Y , et al . Order preserving symmetric encryption [A ] . Advances in Cryptology:EUROCRYPT 2009,LNCS 5479 [C ] . Berlin,Germany , 2009 . 224 - 241 .
HACIGUMUS H , IYER B , LI C , et al . Executing SQL over encrypted data in the database-service-provider model [A ] . SIGMOD 2002,Proceedings of ACM SIGMOD Conference on Management of Data [C ] . New York,USA , 2002 . 216 - 227 .
HORE B , MEHROTRA S , TSUDIK G . A privacy-preserving index for range queries [A ] . CLDB 2004,Proceedings of Very Large Databases Conference [C ] . Seattle,USA , 2004 . 720 - 731 .
CAI K , ZHANG M , FENG D G . Secure range query with single assertion on encrypted data [J ] . Chinese Journal of Computers , 2011 , 34 ( 11 ): 2093 - 2103 .