A Range Query Processing Algorithm Hiding Data Access Patterns in Outsourced Database Environment
Research on secure range query processing techniques in outsourced databases has been spotlighted with the development of cloud computing. The existing range query processing schemes can preserve the data privacy and the query privacy of a user. However,
- PDF / 1,043,169 Bytes
- 13 Pages / 439.37 x 666.142 pts Page_size
- 65 Downloads / 207 Views
Abstract. Research on secure range query processing techniques in outsourced databases has been spotlighted with the development of cloud computing. The existing range query processing schemes can preserve the data privacy and the query privacy of a user. However, they fail to hide the data access patterns while processing a range query. So, in this paper we propose a secure range query processing algorithm which hides data access patterns. Our method filters unnecessary data using the encrypted index. We show from our performance analysis that the proposed range query processing algorithm can efficiently process a query while hiding the data access patterns. Keywords: Database outsourcing structure Range query processing
Database encryption Encrypted Hiding data access patterns
index
1 Introduction A database outsourcing has been spotlighted as a new paradigm for the database management. In the database outsourcing environment, a data owner can outsource his/her database and their managements to a cloud. By outsourcing the database, the data owner (DO) can flexibly utilize the resource of the cloud, thus reducing the management costs. The cloud not only stores the database, but also provides an authorized user with querying services on the outsourced database. However, if the original database is outsourced to the cloud, the cloud or an attacker can abuse the private information stored in the database. For example, if a real estate agent outsources his/her original database to the cloud, the cloud or an attacker can sell the property information to the other agents. In addition, the private information of a user such as preference and disease can be revealed to the attacker. For example, if a user sends a query with his/her location information to enjoy location-based services, the attacker can find places where the user frequently visit. Meanwhile, a range query is one of the most typical query types which is widely used as a baseline scheme in various fields. However, some privacy threat can occur when processing the range query. This is because the range information is closely related to the interest and preference of a user. Therefore, researches on the range query processing methods which preserve the data privacy and the query privacy have been © Springer International Publishing Switzerland 2016 Y. Tan and Y. Shi (Eds.): DMBD 2016, LNCS 9714, pp. 434–446, 2016. DOI: 10.1007/978-3-319-40973-3_44
A Range Query Processing Algorithm Hiding Data Access Patterns
435
performed. The existing secure range query processing schemes fall into two categories. First, the database transformation based schemes [1, 2] convert the original database before outsourcing. However, they are vulnerable to various attacks such as chosen plaintext attack. Second, the database encryption based schemes [3–8] encrypt the database before outsourcing. Therefore, they can preserve the data privacy and the query privacy from an attacker. However, there is no work that hides the data access patterns during processing the range qu
Data Loading...