Abstract
Secure range query processing algorithms have been studied as the range query can be used as a baseline technique in various fields. However, when processing a range query, the existing methods fail to hide the data access patterns which can be used to derive the actual data items and the private information of a querying issuer. The problem is that the data access patterns can be exposed even though the data and query are encrypted. So, in this paper we propose a new range query processing algorithm on the encrypted database. Our method conceals the data access patterns while supporting efficient query processing by using our proposed encrypted index search scheme. Through the performance analysis, we show that the proposed range query processing algorithm can efficiently process a query while hiding the data access patterns.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Yiu ML, Ghinita G, Jensen CS, Kalnis P (2010) Enabling search services on outsourced private spatial data. VLDB J 19(3):363–384
Hore B, Mehrotra S, Canim M, Kantarcioglu M (2012) Secure multidimensional range queries over outsourced data. VLDB J 21(3):333–358
Wang P, Ravishankar CV (2013) Secure and efficient range queries on outsourced databases using R-trees, ICDE, pp 314–325
Wang B, Hou Y, Li M, Wang H, Li H (2014) Maple: scalable multi-dimensional range search over encrypted cloud data with tree-based index, ASIACCS, pp 111–122
Kim H, Hong S, Chang J (2015) Hilbert curve-based cryptographic transformation scheme for spatial query processing on outsourced private data. Data Knowl Eng. doi:10.1016/j.datak.2015.05.002
Vimercati S, Foresti S, Samarati P (2012) Managing and accessing data in the cloud: privacy risks and approaches, CRiSIS, pp 1–9
Elmehdwi Y, Samanthula BK, Jiang W (2014) Secure k-nearest neighbor query over encrypted data in outsourced environments, ICDE, pp 664–675
Paillier P (1999) Public-key cryptosystems based on composite degree residuosity classes, EUROCRYPT, pp 223–238
Samanthula BK, Chun H, Jiang W (2013) An efficient and probabilistic secure bit-decomposition, ASIACCS, pp 541–546
Carmit H, Lindell Y (2010) Efficient secure two-party protocols: techniques and constructions, Springer Science & Business Media
Acknowledgments
This work was supported by the Human Resource Training Program for Regional Innovation and Creativity through the Ministry of Education and National Research Foundation of Korea (NRF-2014H1C1A1065816)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer Science+Business Media Singapore
About this paper
Cite this paper
Kim, HI., Choi, M., Kim, HJ., Chang, JW. (2016). A Secure Range Query Processing Algorithm for the Encrypted Database on the Cloud. In: Park, J., Jin, H., Jeong, YS., Khan, M. (eds) Advanced Multimedia and Ubiquitous Engineering. Lecture Notes in Electrical Engineering, vol 393. Springer, Singapore. https://doi.org/10.1007/978-981-10-1536-6_14
Download citation
DOI: https://doi.org/10.1007/978-981-10-1536-6_14
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-1535-9
Online ISBN: 978-981-10-1536-6
eBook Packages: Computer ScienceComputer Science (R0)