Skip to main content

A Secure Range Query Processing Algorithm for the Encrypted Database on the Cloud

  • Conference paper
  • First Online:
Advanced Multimedia and Ubiquitous Engineering

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 393))

Abstract

Secure range query processing algorithms have been studied as the range query can be used as a baseline technique in various fields. However, when processing a range query, the existing methods fail to hide the data access patterns which can be used to derive the actual data items and the private information of a querying issuer. The problem is that the data access patterns can be exposed even though the data and query are encrypted. So, in this paper we propose a new range query processing algorithm on the encrypted database. Our method conceals the data access patterns while supporting efficient query processing by using our proposed encrypted index search scheme. Through the performance analysis, we show that the proposed range query processing algorithm can efficiently process a query while hiding the data access patterns.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Yiu ML, Ghinita G, Jensen CS, Kalnis P (2010) Enabling search services on outsourced private spatial data. VLDB J 19(3):363–384

    Article  Google Scholar 

  2. Hore B, Mehrotra S, Canim M, Kantarcioglu M (2012) Secure multidimensional range queries over outsourced data. VLDB J 21(3):333–358

    Article  Google Scholar 

  3. Wang P, Ravishankar CV (2013) Secure and efficient range queries on outsourced databases using R-trees, ICDE, pp 314–325

    Google Scholar 

  4. Wang B, Hou Y, Li M, Wang H, Li H (2014) Maple: scalable multi-dimensional range search over encrypted cloud data with tree-based index, ASIACCS, pp 111–122

    Google Scholar 

  5. Kim H, Hong S, Chang J (2015) Hilbert curve-based cryptographic transformation scheme for spatial query processing on outsourced private data. Data Knowl Eng. doi:10.1016/j.datak.2015.05.002

    Google Scholar 

  6. Vimercati S, Foresti S, Samarati P (2012) Managing and accessing data in the cloud: privacy risks and approaches, CRiSIS, pp 1–9

    Google Scholar 

  7. Elmehdwi Y, Samanthula BK, Jiang W (2014) Secure k-nearest neighbor query over encrypted data in outsourced environments, ICDE, pp 664–675

    Google Scholar 

  8. Paillier P (1999) Public-key cryptosystems based on composite degree residuosity classes, EUROCRYPT, pp 223–238

    Google Scholar 

  9. Samanthula BK, Chun H, Jiang W (2013) An efficient and probabilistic secure bit-decomposition, ASIACCS, pp 541–546

    Google Scholar 

  10. Carmit H, Lindell Y (2010) Efficient secure two-party protocols: techniques and constructions, Springer Science & Business Media

    Google Scholar 

Download references

Acknowledgments

This work was supported by the Human Resource Training Program for Regional Innovation and Creativity through the Ministry of Education and National Research Foundation of Korea (NRF-2014H1C1A1065816)

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jae-Woo Chang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer Science+Business Media Singapore

About this paper

Cite this paper

Kim, HI., Choi, M., Kim, HJ., Chang, JW. (2016). A Secure Range Query Processing Algorithm for the Encrypted Database on the Cloud. In: Park, J., Jin, H., Jeong, YS., Khan, M. (eds) Advanced Multimedia and Ubiquitous Engineering. Lecture Notes in Electrical Engineering, vol 393. Springer, Singapore. https://doi.org/10.1007/978-981-10-1536-6_14

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-1536-6_14

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-1535-9

  • Online ISBN: 978-981-10-1536-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics