Skip to main content

Multi-user Order Preserving Encryption Scheme in Cloud Computing Environments

  • Conference paper
  • First Online:
Book cover Applications and Techniques in Information Security (ATIS 2018)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 950))

  • 415 Accesses

Abstract

Cloud computing, a modern application that is very commonly utilized, has garnered considerable interest from researchers and developers. Data privacy security is the most urgent issue related to cloud computing. Studies have shown that order-preserving encryption (OPE) technology is an effective way of securing privacy in the cloud. This study proposes a multi-user order- preserving encryption scheme in cloud environments (MUOPE). The scheme locates the multi-user problem to the most common many-to-many model according to security requirements. Before encryption plaintext, the original plaintext is randomly divided into successive intervals having different lengths, and the plaintexts are encrypted by encryption function. Trusted key generation center is introduced to generate user key and a corresponding auxiliary key for each user, and the encrypted ciphertext is re-encrypted by proxy re-encryption. The re-encrypted ciphertexts allow user to decrypt by using own private key. Security analysis and experimental have verified the safety and effectiveness of the MUOPE scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Modi, C., Patel, D., Borisaniya, B., Patel, A., Rajarajan, M.: A survey of intrusion detection techniques in Cloud. J. Netw. Comput. Appl. 36(1), 42–57 (2013)

    Article  Google Scholar 

  2. Belen, C.Z., Jose, L.F.A., Ambrosio, T.: Security in cloud computing: a mapping study. Comput. Sci. Inf. Syst. 12(1), 161–184 (2014)

    Google Scholar 

  3. Wang, J.F., et al.: Efficient verifiable fuzzy keyword search over encrypted data in cloud computing. Comput. Sci. Inf. Syst. 10(2), 667–684 (2013)

    Article  Google Scholar 

  4. Huang, R.W., Gu, X.L., Yang, S., Zhou, W.: Study of privacy preserving framework for cloud storage. Comput. Sci. Inf. Syst. 8(3), 801–819 (2011)

    Article  Google Scholar 

  5. Liu, D.X., Wang, S.L.: Programmable order-preserving secure index for encrypted database query. In: 2012 IEEE Fifth International Conference on Cloud Computing, pp. 502–509. IEEE Computer Society, Honolulu (2012)

    Google Scholar 

  6. Liu, D.X., Wang, S.L.: Nonlinear order preserving index for encrypted database query in service cloud environments. Concurr. Comput.: Pract. Exp. 25(13), 1967–1984 (2013)

    Article  Google Scholar 

  7. Boldyreva, A., Chenette, N., O’Neill, A.: Order-preserving encryption revisited: improved security analysis and alternative solutions. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 578–595. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-22792-9_33

    Chapter  Google Scholar 

  8. Krendelev, S.F., Yakovlev, M., Usoltseva, M.: Order-preserving encryption schemes based on arithmetic coding and matrices. In: Proceedings the 2014 Federated Conference on Computer Science and Information Systems, pp. 891–899. Institute of Electrical and Electronics Engineers Inc., Warsaw (2014)

    Google Scholar 

  9. Martinez, S., Miret, J.M., Tomas, R., et al.: Securing databases by using diagonal-based order preserving symmetric encryption. Appl. Math. Inf. Sci. 8(5), 2085–2094 (2014)

    Article  Google Scholar 

  10. Fang, Q., Wilfred, N., Feng, J.L., et al.: Bucket order-preserving sub-matrices in gene expression data. IEEE Trans. Knowl. Data Eng. 24(12), 2218–2231 (2012)

    Article  Google Scholar 

  11. Popa, R.A., Li, F.H., Zeldovich, N.: An ideal-security protocol for order-preserving encoding. In: 2013 IEEE Symposium on IEEE Security and Privacy, pp. 1–15. Institute of Electrical and Electronics Engineers Inc., San Francisco (2013)

    Google Scholar 

  12. Reddy, K.S., Ramachandram, S.: A novel dynamic order- preserving encryption scheme. In: 2014 First International Conference on Networks and Software Computing, pp. 92–96. Institute of Electrical and Electronics Engineers Inc., Guntur (2014)

    Google Scholar 

  13. Ahmadian, M., Paya, A., Marinescu, D.C.: Security of applications involving multiple organizations and order preserving encryption in hybrid cloud environments. In: IEEE 28th International Parallel and Distributed Processing Symposium Workshops, pp. 894–903. IEEE Computer Society, Phoenix (2014)

    Google Scholar 

  14. Liu, Z.L., Chen, X.F., Yang, G.J., et al.: New order preserving encryption model for outsourced database in cloud environments. J. Netw. Comput. Appl. 59, 198–207 (2014)

    Article  Google Scholar 

  15. Huang, R.W., Gui, X.N., Chen, N.: An encryption algorithm supporting relational calculations in cloud computing. J. Softw. 26(5), 1181–1195 (2015)

    MathSciNet  Google Scholar 

Download references

Acknowledgments

This work was partly supported by the National Natural Science Foundation of China (No. 61762010 and No. 61462007).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Taoshen Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Li, T., Zhou, X., Wang, R. (2018). Multi-user Order Preserving Encryption Scheme in Cloud Computing Environments. In: Chen, Q., Wu, J., Zhang, S., Yuan, C., Batten, L., Li, G. (eds) Applications and Techniques in Information Security. ATIS 2018. Communications in Computer and Information Science, vol 950. Springer, Singapore. https://doi.org/10.1007/978-981-13-2907-4_2

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-2907-4_2

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-2906-7

  • Online ISBN: 978-981-13-2907-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics