Trust enhancement over range search for encrypted data

Xu Yang, Ting Ting Lee, Joseph K. Liu, Xinyi Huang

    Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

    Abstract

    Data outsource in the cloud has become inevitable trend nowadays, which significantly motivates the development of range search. Order-preserving encryption (OPE) as the most efficient scheme for range search has received increasing interest in both the industries and the cryptographic communities. However, the state of arts show that current OPE schemes either lack efficiency or suffer from severe data leakage. Further, none of them implement OPE in the parallel system. Thus, our work aims to address these issues. In this paper, we propose a non-interactive OPE scheme for encrypted parallel database system, which consists of six functions to satisfy the basic operations for data retrieval. In order to enhance the security of non-interactive protocols, one-to-two mapping technique is utilized to hide data distribution as well as data frequency. It can not only protect data from ciphertext-only attack (COA) but also accomplish the higher security level: indistinguishability under a partial ordered ciphertext-only attack (IND-POCA).

    Original languageEnglish
    Title of host publication2016 IEEE Trustcom/BigDataSE/ISPA
    Subtitle of host publicationTianjin, China, 23-26 August, 2016, [Proceedings]
    EditorsYang Xiang, Kui Ren, Dengguo Feng
    Place of PublicationPiscataway, NJ
    PublisherIEEE, Institute of Electrical and Electronics Engineers
    Pages66-73
    Number of pages8
    ISBN (Electronic)9781509032051
    ISBN (Print)9781509032068
    DOIs
    Publication statusPublished - 7 Feb 2017
    EventIEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) 2016 - Tianjin, China
    Duration: 23 Aug 201626 Aug 2016
    Conference number: 15th
    http://wikicfp.com/cfp/servlet/event.showcfp?eventid=51525&copyownerid=85083

    Conference

    ConferenceIEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) 2016
    Abbreviated titleTrustcom 2016
    CountryChina
    CityTianjin
    Period23/08/1626/08/16
    OtherThis was a Joint conference: The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Symposium on Parallel and Distributed Processing with Applications, IEEE TrustCom/BigDataSE/ISPA 2016
    Internet address

    Keywords

    • Non-interactive
    • Order-preserving encryption
    • Privacy
    • Range search
    • Security

    Cite this

    Yang, X., Lee, T. T., Liu, J. K., & Huang, X. (2017). Trust enhancement over range search for encrypted data. In Y. Xiang, K. Ren, & D. Feng (Eds.), 2016 IEEE Trustcom/BigDataSE/ISPA: Tianjin, China, 23-26 August, 2016, [Proceedings] (pp. 66-73). [7846930] Piscataway, NJ : IEEE, Institute of Electrical and Electronics Engineers. https://doi.org/10.1109/TrustCom.2016.0047
    Yang, Xu ; Lee, Ting Ting ; Liu, Joseph K. ; Huang, Xinyi. / Trust enhancement over range search for encrypted data. 2016 IEEE Trustcom/BigDataSE/ISPA: Tianjin, China, 23-26 August, 2016, [Proceedings]. editor / Yang Xiang ; Kui Ren ; Dengguo Feng. Piscataway, NJ : IEEE, Institute of Electrical and Electronics Engineers, 2017. pp. 66-73
    @inproceedings{d750a99480da469790483856f3a87dd2,
    title = "Trust enhancement over range search for encrypted data",
    abstract = "Data outsource in the cloud has become inevitable trend nowadays, which significantly motivates the development of range search. Order-preserving encryption (OPE) as the most efficient scheme for range search has received increasing interest in both the industries and the cryptographic communities. However, the state of arts show that current OPE schemes either lack efficiency or suffer from severe data leakage. Further, none of them implement OPE in the parallel system. Thus, our work aims to address these issues. In this paper, we propose a non-interactive OPE scheme for encrypted parallel database system, which consists of six functions to satisfy the basic operations for data retrieval. In order to enhance the security of non-interactive protocols, one-to-two mapping technique is utilized to hide data distribution as well as data frequency. It can not only protect data from ciphertext-only attack (COA) but also accomplish the higher security level: indistinguishability under a partial ordered ciphertext-only attack (IND-POCA).",
    keywords = "Non-interactive, Order-preserving encryption, Privacy, Range search, Security",
    author = "Xu Yang and Lee, {Ting Ting} and Liu, {Joseph K.} and Xinyi Huang",
    year = "2017",
    month = "2",
    day = "7",
    doi = "10.1109/TrustCom.2016.0047",
    language = "English",
    isbn = "9781509032068",
    pages = "66--73",
    editor = "Xiang, {Yang } and Ren, {Kui } and Feng, {Dengguo }",
    booktitle = "2016 IEEE Trustcom/BigDataSE/ISPA",
    publisher = "IEEE, Institute of Electrical and Electronics Engineers",
    address = "United States of America",

    }

    Yang, X, Lee, TT, Liu, JK & Huang, X 2017, Trust enhancement over range search for encrypted data. in Y Xiang, K Ren & D Feng (eds), 2016 IEEE Trustcom/BigDataSE/ISPA: Tianjin, China, 23-26 August, 2016, [Proceedings]., 7846930, IEEE, Institute of Electrical and Electronics Engineers, Piscataway, NJ , pp. 66-73, IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) 2016, Tianjin, China, 23/08/16. https://doi.org/10.1109/TrustCom.2016.0047

    Trust enhancement over range search for encrypted data. / Yang, Xu; Lee, Ting Ting; Liu, Joseph K.; Huang, Xinyi.

    2016 IEEE Trustcom/BigDataSE/ISPA: Tianjin, China, 23-26 August, 2016, [Proceedings]. ed. / Yang Xiang; Kui Ren; Dengguo Feng. Piscataway, NJ : IEEE, Institute of Electrical and Electronics Engineers, 2017. p. 66-73 7846930.

    Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

    TY - GEN

    T1 - Trust enhancement over range search for encrypted data

    AU - Yang, Xu

    AU - Lee, Ting Ting

    AU - Liu, Joseph K.

    AU - Huang, Xinyi

    PY - 2017/2/7

    Y1 - 2017/2/7

    N2 - Data outsource in the cloud has become inevitable trend nowadays, which significantly motivates the development of range search. Order-preserving encryption (OPE) as the most efficient scheme for range search has received increasing interest in both the industries and the cryptographic communities. However, the state of arts show that current OPE schemes either lack efficiency or suffer from severe data leakage. Further, none of them implement OPE in the parallel system. Thus, our work aims to address these issues. In this paper, we propose a non-interactive OPE scheme for encrypted parallel database system, which consists of six functions to satisfy the basic operations for data retrieval. In order to enhance the security of non-interactive protocols, one-to-two mapping technique is utilized to hide data distribution as well as data frequency. It can not only protect data from ciphertext-only attack (COA) but also accomplish the higher security level: indistinguishability under a partial ordered ciphertext-only attack (IND-POCA).

    AB - Data outsource in the cloud has become inevitable trend nowadays, which significantly motivates the development of range search. Order-preserving encryption (OPE) as the most efficient scheme for range search has received increasing interest in both the industries and the cryptographic communities. However, the state of arts show that current OPE schemes either lack efficiency or suffer from severe data leakage. Further, none of them implement OPE in the parallel system. Thus, our work aims to address these issues. In this paper, we propose a non-interactive OPE scheme for encrypted parallel database system, which consists of six functions to satisfy the basic operations for data retrieval. In order to enhance the security of non-interactive protocols, one-to-two mapping technique is utilized to hide data distribution as well as data frequency. It can not only protect data from ciphertext-only attack (COA) but also accomplish the higher security level: indistinguishability under a partial ordered ciphertext-only attack (IND-POCA).

    KW - Non-interactive

    KW - Order-preserving encryption

    KW - Privacy

    KW - Range search

    KW - Security

    UR - http://www.scopus.com/inward/record.url?scp=85015150275&partnerID=8YFLogxK

    U2 - 10.1109/TrustCom.2016.0047

    DO - 10.1109/TrustCom.2016.0047

    M3 - Conference Paper

    SN - 9781509032068

    SP - 66

    EP - 73

    BT - 2016 IEEE Trustcom/BigDataSE/ISPA

    A2 - Xiang, Yang

    A2 - Ren, Kui

    A2 - Feng, Dengguo

    PB - IEEE, Institute of Electrical and Electronics Engineers

    CY - Piscataway, NJ

    ER -

    Yang X, Lee TT, Liu JK, Huang X. Trust enhancement over range search for encrypted data. In Xiang Y, Ren K, Feng D, editors, 2016 IEEE Trustcom/BigDataSE/ISPA: Tianjin, China, 23-26 August, 2016, [Proceedings]. Piscataway, NJ : IEEE, Institute of Electrical and Electronics Engineers. 2017. p. 66-73. 7846930 https://doi.org/10.1109/TrustCom.2016.0047