A Partially Order-Preserving Index Scheme
نویسنده
چکیده
It has become advantageous in certain scenarios for a database owner to outsource hosting and management of his database to a third party. This approach is known as database as a service or DAS. However, in the case of highly sensitive data, it may be necessary to protect it even from the third party database administrator. As a result, several methods have been proposed that allow for encryption of the relational data in such a way as to permit some limited set of queries to be executed directly on the encrypted data. Most encryption methods, like hashing techniques, tend to diffuse the data, such that two nearby plaintext values may have completely dissimilar ciphertext values. As a result, performing range queries on the encrypted data is particularly challenging. We here propose a new partially order-preserving indexing scheme that permits efficient range queries on encrypted data. This work is largely derived from prior work done by Agrawal et al. on fully order preserving encryption [1] and work by Hore et al. on a bucketization approach for range queries [2]. Our method resembles the bucketization technique used in [2], but enforces an ordering of the ciphertext buckets that correlates with the ordering of the plaintext buckets. A plaintext value may still end up in one of several buckets (diffusion), but instead of selecting the target buckets randomly, they will be selected based on their proximity to the ciphertext bucket corresponding to the plaintext value. (See section 2) This imposes a partial ordering on the ciphertext values, allowing large range queries to yield fewer false positives than they do in [2], while at the same time preserving some of the privacy lost to the total ordering seen in [1].
منابع مشابه
Separating indexes from data: a distributed scheme for secure database outsourcing
Database outsourcing is an idea to eliminate the burden of database management from organizations. Since data is a critical asset of organizations, preserving its privacy from outside adversary and untrusted server should be warranted. In this paper, we present a distributed scheme based on storing shares of data on different servers and separating indexes from data on a distinct server. Shamir...
متن کاملA Geometry Preserving Kernel over Riemannian Manifolds
Abstract- Kernel trick and projection to tangent spaces are two choices for linearizing the data points lying on Riemannian manifolds. These approaches are used to provide the prerequisites for applying standard machine learning methods on Riemannian manifolds. Classical kernels implicitly project data to high dimensional feature space without considering the intrinsic geometry of data points. ...
متن کاملA Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications
Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...
متن کاملSESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing
While cloud computing is growing at a remarkable speed, privacy issues are far from being solved. One way to diminish privacy concerns is to store data on the cloud in encrypted form. However, encryption often hinders useful computation cloud services. A theoretical approach is to employ the so-called fully homomorphic encryption, yet the overhead is so high that it is not considered a viable s...
متن کاملON THE SYSTEM OF LEVEL-ELEMENTS INDUCED BY AN L-SUBSET
This paper focuses on the relationship between an $L$-subset and the system of level-elements induced by it, where the underlying lattice $L$ is a complete residuated lattice and the domain set of $L$-subset is an $L$-partially ordered set $(X,P)$. Firstly, we obtain the sufficient and necessary condition that an $L$-subset is represented by its system of level-elements. Then, a new representat...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009