Abstract
Cloud computing, a modern application that is very commonly utilized, has garnered considerable interest from researchers and developers. Data privacy security is the most urgent issue related to cloud computing. Studies have shown that order-preserving encryption (OPE) technology is an effective way of securing privacy in the cloud. This study proposes a multi-user order- preserving encryption scheme in cloud environments (MUOPE). The scheme locates the multi-user problem to the most common many-to-many model according to security requirements. Before encryption plaintext, the original plaintext is randomly divided into successive intervals having different lengths, and the plaintexts are encrypted by encryption function. Trusted key generation center is introduced to generate user key and a corresponding auxiliary key for each user, and the encrypted ciphertext is re-encrypted by proxy re-encryption. The re-encrypted ciphertexts allow user to decrypt by using own private key. Security analysis and experimental have verified the safety and effectiveness of the MUOPE scheme.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Modi, C., Patel, D., Borisaniya, B., Patel, A., Rajarajan, M.: A survey of intrusion detection techniques in Cloud. J. Netw. Comput. Appl. 36(1), 42–57 (2013)
Belen, C.Z., Jose, L.F.A., Ambrosio, T.: Security in cloud computing: a mapping study. Comput. Sci. Inf. Syst. 12(1), 161–184 (2014)
Wang, J.F., et al.: Efficient verifiable fuzzy keyword search over encrypted data in cloud computing. Comput. Sci. Inf. Syst. 10(2), 667–684 (2013)
Huang, R.W., Gu, X.L., Yang, S., Zhou, W.: Study of privacy preserving framework for cloud storage. Comput. Sci. Inf. Syst. 8(3), 801–819 (2011)
Liu, D.X., Wang, S.L.: Programmable order-preserving secure index for encrypted database query. In: 2012 IEEE Fifth International Conference on Cloud Computing, pp. 502–509. IEEE Computer Society, Honolulu (2012)
Liu, D.X., Wang, S.L.: Nonlinear order preserving index for encrypted database query in service cloud environments. Concurr. Comput.: Pract. Exp. 25(13), 1967–1984 (2013)
Boldyreva, A., Chenette, N., O’Neill, A.: Order-preserving encryption revisited: improved security analysis and alternative solutions. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 578–595. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-22792-9_33
Krendelev, S.F., Yakovlev, M., Usoltseva, M.: Order-preserving encryption schemes based on arithmetic coding and matrices. In: Proceedings the 2014 Federated Conference on Computer Science and Information Systems, pp. 891–899. Institute of Electrical and Electronics Engineers Inc., Warsaw (2014)
Martinez, S., Miret, J.M., Tomas, R., et al.: Securing databases by using diagonal-based order preserving symmetric encryption. Appl. Math. Inf. Sci. 8(5), 2085–2094 (2014)
Fang, Q., Wilfred, N., Feng, J.L., et al.: Bucket order-preserving sub-matrices in gene expression data. IEEE Trans. Knowl. Data Eng. 24(12), 2218–2231 (2012)
Popa, R.A., Li, F.H., Zeldovich, N.: An ideal-security protocol for order-preserving encoding. In: 2013 IEEE Symposium on IEEE Security and Privacy, pp. 1–15. Institute of Electrical and Electronics Engineers Inc., San Francisco (2013)
Reddy, K.S., Ramachandram, S.: A novel dynamic order- preserving encryption scheme. In: 2014 First International Conference on Networks and Software Computing, pp. 92–96. Institute of Electrical and Electronics Engineers Inc., Guntur (2014)
Ahmadian, M., Paya, A., Marinescu, D.C.: Security of applications involving multiple organizations and order preserving encryption in hybrid cloud environments. In: IEEE 28th International Parallel and Distributed Processing Symposium Workshops, pp. 894–903. IEEE Computer Society, Phoenix (2014)
Liu, Z.L., Chen, X.F., Yang, G.J., et al.: New order preserving encryption model for outsourced database in cloud environments. J. Netw. Comput. Appl. 59, 198–207 (2014)
Huang, R.W., Gui, X.N., Chen, N.: An encryption algorithm supporting relational calculations in cloud computing. J. Softw. 26(5), 1181–1195 (2015)
Acknowledgments
This work was partly supported by the National Natural Science Foundation of China (No. 61762010 and No. 61462007).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Li, T., Zhou, X., Wang, R. (2018). Multi-user Order Preserving Encryption Scheme in Cloud Computing Environments. In: Chen, Q., Wu, J., Zhang, S., Yuan, C., Batten, L., Li, G. (eds) Applications and Techniques in Information Security. ATIS 2018. Communications in Computer and Information Science, vol 950. Springer, Singapore. https://doi.org/10.1007/978-981-13-2907-4_2
Download citation
DOI: https://doi.org/10.1007/978-981-13-2907-4_2
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-2906-7
Online ISBN: 978-981-13-2907-4
eBook Packages: Computer ScienceComputer Science (R0)