Privacy-Preserving Multidimensional Range Query on Real-Time Data

  • Zhong TingEmail author
  • Han Xiao
  • Yang Yunshuo
  • Zhu Aixiang
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9483)


We propose a scheme for realizing privacy-preserving multidimensional range query on real-time data. This is motivated by the scenario where data owner (DO) stores its real-time data that are periodically submitted by its subordinate data collectors (DCs) on cloud service provider (CSP) in encrypted form and sometimes executes range query. The semi-trusted CSP is curious about the data and may return incomplete query results to DO. We divide time into \( N \) epochs and adopt key-insulated technology which supports periodical key update to bucketization method. Our scheme radically reduces the cost of DO and is more secure in the sense that keys for up to \( m < N \) epochs can be compromised without jeopardizing the security of whole system. Moreover, we realize the integrity verification of query results. Experiment results show that the cost of our scheme is acceptable, particularly for the scenario where each DC collects small amount of real-time data in each epoch.


Multidimensional range query Real-time data Key-insulated technology Privacy-preserving Storage security 



Our work is sponsored by the national natural science foundation of China (research on privacy protecting cipher text query algorithm in cloud storage, No. 61472064), the science and technology foundation of Sichuan province (research and application demonstration on trusted and safety-controllable privacy protecting service architecture for cloud data, 2015GZ0095) and the fundamental research funds for the central universities (research on some key technology in cloud storage security, YGX2013J072).


  1. 1.
    Shi, E., Bethencourt, J., Chan, H.T.-H., Song, D.X., Perrig, A.: Multi-dimensional range query over encrypted data. In: IEEE S&P (2007)Google Scholar
  2. 2.
    Boneh, D., Waters, B.: Conjunctive, subset, and range queries on encrypted data. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 535–554. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  3. 3.
    Li, J., Omiecinski, E.R.: Efficiency and security trade-off in supporting range queries on encrypted databases. In: Jajodia, S., Wijesekera, D. (eds.) Data and Applications Security 2005. LNCS, vol. 3654, pp. 69–83. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  4. 4.
    Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Order-preserving encryption for numeric data. In: Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data, pp. 563–574. ACM (2004)Google Scholar
  5. 5.
    Boldyreva, A., Chenette, N., Lee, Y., O’Neill, A.: Order-preserving symmetric encryption. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 224–241. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  6. 6.
    Hacigümüş, H., Lyer, B., Li, C., Mehrotra, S.: Executing SQL over encrypted data in the database-service-provider model. In: Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data, pp. 216–227. ACM (2002)Google Scholar
  7. 7.
    Hore, B., Mehrotra, S., Tsudik, G.: A privacy-preserving index for range queries. In: Proceedings of the Thirtieth International Conference on Very Large Data Bases, vol. 30, pp. 720–731. VLDB Endowment (2004)Google Scholar
  8. 8.
    Hore, B., Mehrotra, S., Canim, M., Kantarcioglu, M.: Secure multidimensional range queries over outsourced data. Int. J. Very Large Data Bases 21, 333–358 (2012)CrossRefGoogle Scholar
  9. 9.
    Girault, M.: Relaxing tamper-resistance requirements for smart cards by using (auto-) proxy signatures. In: Quisquater, J.-J., Schneier, B. (eds.) CARDIS 1998. LNCS, vol. 1820, pp. 157–166. Springer, Heidelberg (2000)Google Scholar
  10. 10.
    Dodis, Y., Katz, J., Xu, S., Yung, M.: Key-insulated public key cryptosystems. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 65–82. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  11. 11.
    Tzeng, W.-G., Tzeng, Z.-J.: Robust key-evolving public key encryption schemes. In: Deng, R.H., Qing, S., Bao, F., Zhou, J. (eds.) ICICS 2002. LNCS, vol. 2513, pp. 61–72. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  12. 12.
    Lu, C.-F., Shieh, S.-P.: Secure key-evolving protocols for discrete logarithm schemes. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol. 2271, pp. 300–309. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  13. 13.
    Hanaoka, G., Hanaoka, Y., Imai, H.: Parallel key-insulated public key encryption. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol. 3958, pp. 105–122. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  14. 14.
    Zhang, R., Shi, J., Zhang, Y.: Secure multidimensional range queries in sensor networks. In: Proceedings of the Tenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 197–206. ACM (2009)Google Scholar
  15. 15.
    Phan Van Song, Y.-L.: Query-optimal-bucketization and controlled-diffusion algorithms for privacy in outsourced databases. Project report, CS5322 Databases Security-2009/2010Google Scholar
  16. 16.
    Hore, B., Mehrotra, S., Tsudik, G.: A privacy-preserving index for range queries. In: Proceedings of the Thirtieth International Conference on Very Large Data Bases, vol. 30, pp. 720–731. VLDB Endowment (2004)Google Scholar
  17. 17.
    Bellare, M., Desai, A., Jokipii, E., Rogaway, P.: A concrete security treatment of symmetric encryption. In: Foundations of Computer Science, pp. 394–403 (1997)Google Scholar
  18. 18.
    Papamanthou, C., Tamassia, R., Triandopoulos, N.: Authenticated hash tables. In: Proceedings of the 15th ACM Conference on Computer and Communications Security, pp. 437–448. ACM (2008)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  • Zhong Ting
    • 1
    Email author
  • Han Xiao
    • 1
  • Yang Yunshuo
    • 1
  • Zhu Aixiang
    • 1
  1. 1.School of Information and Software EngineeringUniversity of Electronic Science and Technology of ChinaChengduChina

Personalised recommendations