Secure range query over encrypted data in outsourced environments

  • Ningning CuiEmail author
  • Xiaochun Yang
  • Bin Wang
  • Jing Geng
  • Jianxin Li
Part of the following topical collections:
  1. Special Issue on Trust, Privacy, and Security in Crowdsourcing Computing


With the rapid development of cloud computing paradigm, data owners have the opportunity to outsource their databases and management tasks to the cloud. Due to privacy concerns, it is required for them to encrypt the databases prior to outsourcing. However, there are no existing techniques handling range queries in a fully secure way. Therefore, in this paper, we focus exactly on the secure processing of range queries over outsourced encrypted databases. To efficiently process secure range queries, the extraordinarily challenging task is how to perform fully secure range queries over encrypted data without the cloud ever decrypting the data. To address the challenge, we first propose a basic secure range queries algorithm which is not absolutely secure (i.e., leaking the privacy of access patterns and path patterns). To meet better security, we present a fully secure algorithm that preserves the privacy of the data, query, result, access patterns and path patterns. To improve the performance further, we also propose two schemes to accelerate query speed. At last, we empirically analyze and conduct a comprehensive performance evaluation using the real dataset to validate our ideas and the proposed secure algorithms.


Database outsourcing Encrypted index Secure range query 



  1. 1.
    Bellare, M., Rogaway, P.: Optimal asymmetric encryption. Eurocrypto 950(6), 92–111 (1994)MathSciNetzbMATHGoogle Scholar
  2. 2.
    Chi, J., Hong, C., Zhang, M., et al.: Fast multi-dimensional range queries on encrypted cloud databases. In: IEEE International Conference on Databases Systems for Advanced Applications, pp 559–575. Springer, SuZhou (2017)CrossRefGoogle Scholar
  3. 3.
    Chi, J., Hong, C., Zhang, M., Zhang, Z.: Privacy-enhancing range query processing over encrypted cloud databases. In: WISE, pp 63–77 (2015)Google Scholar
  4. 4.
    Cui, N., Li, J., Yang, X., et al.: When geo-text meets security: privacy-preserving boolean spatial keyword queries. In: ICDE. IEEE, Macao (2019)Google Scholar
  5. 5.
    Cui, N., Yang, X., Wang, L., et al.: Secure range query over encrypted data in outsourced environments. In: International Conference on Database Systems for Advanced Applications. Springer, Cham (2018)CrossRefGoogle Scholar
  6. 6.
    Dai, Y., Shao, J., Hu, G., et al.: A resource-aware approach for authenticating privacy preserving GNN queries. World Wide Web (2017)Google Scholar
  7. 7.
    Elmehdwi, Y., Samanthula, B.K., Jiang, W.: Secure K-nearest neighbor query over encrypted data in outsourced environments. In: The ICDE, pp 664–675. IEEE, Chicago (2014)Google Scholar
  8. 8.
    Hore, B., Mehrotra, S., Canim, M., Kantarcioglu, M.: Secure multidimensional range queries over outsourced data. The VLDB Journal. 21(3), 333–358 (2012)CrossRefGoogle Scholar
  9. 9.
    Hore, B., Mehrotra, S., Tsudik, G.: A privacy-preserving index for range queries. In: Thirtieth International Conference on Very Large Data Bases VLDB Endowment, pp 720–731. ACM, Toronto (2004)CrossRefGoogle Scholar
  10. 10.
    Hu, H., Xu, J., Ren, C., Choi, B.: Processing private queries over untrusted data cloud through privacy homomorphism. In: ICDE, pp 601–612. IEEE, Hannover (2011)Google Scholar
  11. 11.
    Kim, H.I., Kim, H.J., Chang, J.W.: A range query processing algorithm hiding data access patterns in outsourced database environment. In: International Conference on Data Mining and Big Data, pp 434–446. Springer, Cham (2016)CrossRefGoogle Scholar
  12. 12.
    Li, J., Cai, T., Mian, A., Li, R., Sellis, T., Yu, J.X.: Holistic influence maximization for targeted advertisements in spatial social networks. IEEE International Conference on Data Engineering (ICDE), pp. 1340–1343 (2018)Google Scholar
  13. 13.
    Li, R., Liu, A.X., Wang, A.L., et al.: Fast and scalable range query processing with strong privacy protection for cloud computing. IEEE/ACM Trans. Networking 24 (4), 2305–2318 (2016)CrossRefGoogle Scholar
  14. 14.
    Li, J., Wang, X., Deng, K., Sellis, T., Yu, J.X., Yang, X.: Discovering influential community over large social networks. The 33rd IEEE International Conference on Data Engineering (ICDE), pp. 871–882 (2017)Google Scholar
  15. 15.
    Li, S.P., Wong, M.H.: Privacy-preserving queries over outsourced data with access pattern protection. In: IEEE International Conference on Data Mining Workshop, pp 581–588. IEEE, Shenzhen (2014)Google Scholar
  16. 16.
    Liu, A., Kai, Z., Lu, L., et al.: Efficient secure similarity computation on encrypted trajectory data. In: International Conference on Data Engineering, pp 66–77. IEEE, Seoul (2015)Google Scholar
  17. 17.
    Liu, J., Yang, J., Xiong, L., et al.: Secure skyline queries on cloud platform. In: International Conference on Data Engineering, pp 633–645. IEEE, San Diego (2017)Google Scholar
  18. 18.
    Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: International Conference on Theory and Application of Cryptographic Techniques, pp 223–238. Springer, Prague (1999)Google Scholar
  19. 19.
    Rivest, R.L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 26(2), 96–99 (1978)MathSciNetzbMATHGoogle Scholar
  20. 20.
    Samanthula, B.K.K., Hu, C., Jiang, W.: An efficient and probabilistic secure bit-decomposition. In: The ASIA CCS, pp 541–546. ACM, Hangzhou (2013)Google Scholar
  21. 21.
    Shi, E., Bethencourt, J., Chan, T.H., et al.: Multi-dimensional range query over encrypted data. In: Security and Privacy, pp 350–364. IEEE (2007)Google Scholar
  22. 22.
    Wang, B., Hou, Y., Li, M., Wang, H., Li, H.: Maple: scalable multi-dimensional range search over encrypted cloud data with tree-based index. In: The ASIA CCS, pp 111–122. ACM, Kyoto (2014)Google Scholar
  23. 23.
    Wang, B., Li, M., Wang, H.: Geometric range search on encrypted spatial data. IEEE Trans. Inf. Forensics Secur. 11(4), 704–719 (2016)Google Scholar
  24. 24.
    Wang, P., Ravishankar, C.V.: Secure and efficient range queries on outsourced databases using \(\widehat {R}\)-Trees. In: IEEE International Conference on Data Engineering, pp 314–325. IEEE, Brisbane (2013)Google Scholar
  25. 25.
    Wu, W., Parampalli, U., Liu, J., et al.: Privacy preserving k-nearest neighbor classification over encrypted database in outsourced cloud environments. World Wide Web (11)1–23 (2018)Google Scholar
  26. 26.
    Wu, Z., Xu, G., Lu, C., et al.: An effective approach for the protection of privacy text data in the cloudDB. World Wide Web (2017)Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  • Ningning Cui
    • 1
    Email author
  • Xiaochun Yang
    • 1
  • Bin Wang
    • 1
  • Jing Geng
    • 2
  • Jianxin Li
    • 3
  1. 1.School of Computer Science and EngineeringNortheastern UniversityShenyangChina
  2. 2.School of Computer Science and TechnologyBeijing Institute of TechnologyBeijingChina
  3. 3.School of Computer Science and EngineeringDeakin UniversityMelbourneAustralia

Personalised recommendations