Multi-user Order Preserving Encryption Scheme in Cloud Computing Environments

  • Taoshen LiEmail author
  • Xiong Zhou
  • Ruwei Wang
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 950)


Cloud computing, a modern application that is very commonly utilized, has garnered considerable interest from researchers and developers. Data privacy security is the most urgent issue related to cloud computing. Studies have shown that order-preserving encryption (OPE) technology is an effective way of securing privacy in the cloud. This study proposes a multi-user order- preserving encryption scheme in cloud environments (MUOPE). The scheme locates the multi-user problem to the most common many-to-many model according to security requirements. Before encryption plaintext, the original plaintext is randomly divided into successive intervals having different lengths, and the plaintexts are encrypted by encryption function. Trusted key generation center is introduced to generate user key and a corresponding auxiliary key for each user, and the encrypted ciphertext is re-encrypted by proxy re-encryption. The re-encrypted ciphertexts allow user to decrypt by using own private key. Security analysis and experimental have verified the safety and effectiveness of the MUOPE scheme.


Order preserving encryption Cloud computing Multi-user Local sensitive hashing Ciphertext Re-encryption 



This work was partly supported by the National Natural Science Foundation of China (No. 61762010 and No. 61462007).


  1. 1.
    Modi, C., Patel, D., Borisaniya, B., Patel, A., Rajarajan, M.: A survey of intrusion detection techniques in Cloud. J. Netw. Comput. Appl. 36(1), 42–57 (2013)CrossRefGoogle Scholar
  2. 2.
    Belen, C.Z., Jose, L.F.A., Ambrosio, T.: Security in cloud computing: a mapping study. Comput. Sci. Inf. Syst. 12(1), 161–184 (2014)Google Scholar
  3. 3.
    Wang, J.F., et al.: Efficient verifiable fuzzy keyword search over encrypted data in cloud computing. Comput. Sci. Inf. Syst. 10(2), 667–684 (2013)CrossRefGoogle Scholar
  4. 4.
    Huang, R.W., Gu, X.L., Yang, S., Zhou, W.: Study of privacy preserving framework for cloud storage. Comput. Sci. Inf. Syst. 8(3), 801–819 (2011)CrossRefGoogle Scholar
  5. 5.
    Liu, D.X., Wang, S.L.: Programmable order-preserving secure index for encrypted database query. In: 2012 IEEE Fifth International Conference on Cloud Computing, pp. 502–509. IEEE Computer Society, Honolulu (2012)Google Scholar
  6. 6.
    Liu, D.X., Wang, S.L.: Nonlinear order preserving index for encrypted database query in service cloud environments. Concurr. Comput.: Pract. Exp. 25(13), 1967–1984 (2013)CrossRefGoogle Scholar
  7. 7.
    Boldyreva, A., Chenette, N., O’Neill, A.: Order-preserving encryption revisited: improved security analysis and alternative solutions. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 578–595. Springer, Heidelberg (2011). Scholar
  8. 8.
    Krendelev, S.F., Yakovlev, M., Usoltseva, M.: Order-preserving encryption schemes based on arithmetic coding and matrices. In: Proceedings the 2014 Federated Conference on Computer Science and Information Systems, pp. 891–899. Institute of Electrical and Electronics Engineers Inc., Warsaw (2014)Google Scholar
  9. 9.
    Martinez, S., Miret, J.M., Tomas, R., et al.: Securing databases by using diagonal-based order preserving symmetric encryption. Appl. Math. Inf. Sci. 8(5), 2085–2094 (2014)CrossRefGoogle Scholar
  10. 10.
    Fang, Q., Wilfred, N., Feng, J.L., et al.: Bucket order-preserving sub-matrices in gene expression data. IEEE Trans. Knowl. Data Eng. 24(12), 2218–2231 (2012)CrossRefGoogle Scholar
  11. 11.
    Popa, R.A., Li, F.H., Zeldovich, N.: An ideal-security protocol for order-preserving encoding. In: 2013 IEEE Symposium on IEEE Security and Privacy, pp. 1–15. Institute of Electrical and Electronics Engineers Inc., San Francisco (2013)Google Scholar
  12. 12.
    Reddy, K.S., Ramachandram, S.: A novel dynamic order- preserving encryption scheme. In: 2014 First International Conference on Networks and Software Computing, pp. 92–96. Institute of Electrical and Electronics Engineers Inc., Guntur (2014)Google Scholar
  13. 13.
    Ahmadian, M., Paya, A., Marinescu, D.C.: Security of applications involving multiple organizations and order preserving encryption in hybrid cloud environments. In: IEEE 28th International Parallel and Distributed Processing Symposium Workshops, pp. 894–903. IEEE Computer Society, Phoenix (2014)Google Scholar
  14. 14.
    Liu, Z.L., Chen, X.F., Yang, G.J., et al.: New order preserving encryption model for outsourced database in cloud environments. J. Netw. Comput. Appl. 59, 198–207 (2014)CrossRefGoogle Scholar
  15. 15.
    Huang, R.W., Gui, X.N., Chen, N.: An encryption algorithm supporting relational calculations in cloud computing. J. Softw. 26(5), 1181–1195 (2015)MathSciNetGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  1. 1.Guangxi UniversityNanningPeople’s Republic of China

Personalised recommendations