Multi-user Order Preserving Encryption Scheme in Cloud Computing Environments
Cloud computing, a modern application that is very commonly utilized, has garnered considerable interest from researchers and developers. Data privacy security is the most urgent issue related to cloud computing. Studies have shown that order-preserving encryption (OPE) technology is an effective way of securing privacy in the cloud. This study proposes a multi-user order- preserving encryption scheme in cloud environments (MUOPE). The scheme locates the multi-user problem to the most common many-to-many model according to security requirements. Before encryption plaintext, the original plaintext is randomly divided into successive intervals having different lengths, and the plaintexts are encrypted by encryption function. Trusted key generation center is introduced to generate user key and a corresponding auxiliary key for each user, and the encrypted ciphertext is re-encrypted by proxy re-encryption. The re-encrypted ciphertexts allow user to decrypt by using own private key. Security analysis and experimental have verified the safety and effectiveness of the MUOPE scheme.
KeywordsOrder preserving encryption Cloud computing Multi-user Local sensitive hashing Ciphertext Re-encryption
This work was partly supported by the National Natural Science Foundation of China (No. 61762010 and No. 61462007).
- 2.Belen, C.Z., Jose, L.F.A., Ambrosio, T.: Security in cloud computing: a mapping study. Comput. Sci. Inf. Syst. 12(1), 161–184 (2014)Google Scholar
- 5.Liu, D.X., Wang, S.L.: Programmable order-preserving secure index for encrypted database query. In: 2012 IEEE Fifth International Conference on Cloud Computing, pp. 502–509. IEEE Computer Society, Honolulu (2012)Google Scholar
- 8.Krendelev, S.F., Yakovlev, M., Usoltseva, M.: Order-preserving encryption schemes based on arithmetic coding and matrices. In: Proceedings the 2014 Federated Conference on Computer Science and Information Systems, pp. 891–899. Institute of Electrical and Electronics Engineers Inc., Warsaw (2014)Google Scholar
- 11.Popa, R.A., Li, F.H., Zeldovich, N.: An ideal-security protocol for order-preserving encoding. In: 2013 IEEE Symposium on IEEE Security and Privacy, pp. 1–15. Institute of Electrical and Electronics Engineers Inc., San Francisco (2013)Google Scholar
- 12.Reddy, K.S., Ramachandram, S.: A novel dynamic order- preserving encryption scheme. In: 2014 First International Conference on Networks and Software Computing, pp. 92–96. Institute of Electrical and Electronics Engineers Inc., Guntur (2014)Google Scholar
- 13.Ahmadian, M., Paya, A., Marinescu, D.C.: Security of applications involving multiple organizations and order preserving encryption in hybrid cloud environments. In: IEEE 28th International Parallel and Distributed Processing Symposium Workshops, pp. 894–903. IEEE Computer Society, Phoenix (2014)Google Scholar