Javascript must be enabled to continue!
Outsourced Databases in the Cloud: A Privacy-Preserving Indexing Scheme
View through CrossRef
Abstract
Cloud computing becomes a popular and successful paradigm for data outsourcing. Cloud computing has developed as an affordable and realistic alternative to in-house data centers. However, security and privacy concerns have arisen and are still a great barrier. To mitigate these concerns , several authors proposed to use Property-Preserving Encryption (PPE) schemes. PPE schemes enable storing and processing queries over encrypted data. But, such schemes inherently leak some information about plaintexts that could jeopardize data privacy. In this article, we address the crucial issue of protecting data privacy when performing queries on it in an untrusted cloud. We introduce new order-preserving indexing schemes that allow queries to be carried out efficiently through encrypted data. We consider a robust security model and improve security strength with a complementary order-obfuscating technique. The proposed indexing schemes preserve the expressiveness of state-of-the-art PPE schemes while at the same time offering stronger security protections compared to pre-used schemes. We provide formal proofs of the security of our schemes and prove that they meet standard notions of security against a strong adversary model. We theoretically evaluate and compare our schemes with current PPE schemes. Analytically, we show the superiority of the proposed schemes relative to on-the-shelf PPE schemes. Our comparison demonstrates some interesting insights concerning the overall security and efficiency .
Title: Outsourced Databases in the Cloud: A Privacy-Preserving Indexing Scheme
Description:
Abstract
Cloud computing becomes a popular and successful paradigm for data outsourcing.
Cloud computing has developed as an affordable and realistic alternative to in-house data centers.
However, security and privacy concerns have arisen and are still a great barrier.
To mitigate these concerns , several authors proposed to use Property-Preserving Encryption (PPE) schemes.
PPE schemes enable storing and processing queries over encrypted data.
But, such schemes inherently leak some information about plaintexts that could jeopardize data privacy.
In this article, we address the crucial issue of protecting data privacy when performing queries on it in an untrusted cloud.
We introduce new order-preserving indexing schemes that allow queries to be carried out efficiently through encrypted data.
We consider a robust security model and improve security strength with a complementary order-obfuscating technique.
The proposed indexing schemes preserve the expressiveness of state-of-the-art PPE schemes while at the same time offering stronger security protections compared to pre-used schemes.
We provide formal proofs of the security of our schemes and prove that they meet standard notions of security against a strong adversary model.
We theoretically evaluate and compare our schemes with current PPE schemes.
Analytically, we show the superiority of the proposed schemes relative to on-the-shelf PPE schemes.
Our comparison demonstrates some interesting insights concerning the overall security and efficiency .
Related Results
Augmented Differential Privacy Framework for Data Analytics
Augmented Differential Privacy Framework for Data Analytics
Abstract
Differential privacy has emerged as a popular privacy framework for providing privacy preserving noisy query answers based on statistical properties of databases. ...
Privacy Risk in Recommender Systems
Privacy Risk in Recommender Systems
Nowadays, recommender systems are mostly used in many online applications to filter information and help users in selecting their relevant requirements. It avoids users to become o...
Leveraging Artificial Intelligence for smart cloud migration, reducing cost and enhancing efficiency
Leveraging Artificial Intelligence for smart cloud migration, reducing cost and enhancing efficiency
Cloud computing has become a critical component of modern IT infrastructure, offering businesses scalability, flexibility, and cost efficiency. Unoptimized cloud migration strategi...
Hybrid Cloud Scheduling Method for Cloud Bursting
Hybrid Cloud Scheduling Method for Cloud Bursting
In the paper, we consider the hybrid cloud model used for cloud bursting, when the computational capacity of the private cloud provider is insufficient to deal with the peak number...
Linking Sensitive Data – Applications, Techniques, and Challenges
Linking Sensitive Data – Applications, Techniques, and Challenges
IntroductionThe linking of sensitive databases containing personal identifying information across organisations is an increasingly important task in application domains ranging fro...
THE SECURITY AND PRIVACY MEASURING SYSTEM FOR THE INTERNET OF THINGS DEVICES
THE SECURITY AND PRIVACY MEASURING SYSTEM FOR THE INTERNET OF THINGS DEVICES
The purpose of the article: elimination of the gap in existing need in the set of clear and objective security and privacy metrics for the IoT devices users and manufacturers and a...
THE IMPACT OF CLOUD COMPUTING ON CONSTRUCTION PROJECT DELIVERY ABUJA NIGERIA
THE IMPACT OF CLOUD COMPUTING ON CONSTRUCTION PROJECT DELIVERY ABUJA NIGERIA
Cloud computing is the delivery of computing services, such as storage, processing power, and software applications, via the internet. Cloud computing offers various advantages and...
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
The advent of distributed cloud systems has revolutionized data storage and access, providing flexibility and scalability across various industries. However, these benefits come wi...

