Advertisement

Private Range Queries on Outsourced Databases

  • Lu LiEmail author
  • Liusheng Huang
  • An Liu
  • Yao Shen
  • Wei Yang
  • Shengnan Shao
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9098)

Abstract

With the advent of cloud computing, data owners could upload their databases to the cloud service provider to relief the burden of data storage and management. To protect sensitive data from the cloud, the data owner could publish an encrypted version of the original data. However, this will make data utilization much harder. In this paper, we consider the problem of private range query. Specifically, the data owner wants to obtain all the data within a query region, while keeping the query private to the service provider. Previous works only provide partial security guarantee, and are inefficient to deal with large scale datasets. To solve this problem, we present a fully secure scheme based on private information retrieval (PIR) and batch codes (BC).

Keywords

Secure range query Cloud computing Private information retrieval 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Lu, Y.: Privacy-preserving logarithmic-time search on encrypted data in cloud. In: NDSS (2012)Google Scholar
  2. 2.
    Wang, P., Ravishankar, C.V.: Secure and efficient range queries on outsourced databases using \(\hat{R}\) tree. In: ICDE, pp. 314–325 (2013)Google Scholar
  3. 3.
    Katz, J., Lindell, Y.: Introduction to Modern Cryptography (Chapman Hall/Crc Cryptography and Network Security Series). Chapman Hall/CRC (2007)Google Scholar
  4. 4.
    Wang, B., Hou, Y., Li, M., et al.: Maple: scalable multi-dimensional range search over encrypted cloud data with tree-based index. In: ASIACCS, pp. 111–122 (2014)Google Scholar
  5. 5.
    Boneh, D., Waters, B.: Conjunctive, subset, and range queries on encrypted data. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 535–554. Springer, Heidelberg (2007) CrossRefGoogle Scholar
  6. 6.
    Ishai, Y., Kushilevitz, E., Ostrovsky, R., Sahai, A.: Batch codes and their applications. In: STOC, pp. 262–271 (2004)Google Scholar
  7. 7.
    Armbrust, M., Fox, A., Griffith, R., Joseph, A., et al.: A View of Cloud Computing. Communications of the ACM 53(4), 50–58 (2010)CrossRefGoogle Scholar
  8. 8.
    Kushilevitz, E., Ostrovsky, R.: Replication is not needed: single database, computationally private information retrieval. In: FOCS, pp. 364–373 (1997)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  • Lu Li
    • 1
    Email author
  • Liusheng Huang
    • 1
  • An Liu
    • 2
  • Yao Shen
    • 1
  • Wei Yang
    • 1
  • Shengnan Shao
    • 3
  1. 1.School of Computer Science and TechnologyUniversity of Science and Technology of ChinaHefeiChina
  2. 2.School of Computer ScienceSoochow UniversitySuzhouChina
  3. 3.School of Software Engineering of USTCSuzhouChina

Personalised recommendations