Order-Hiding Range Query Over Encrypted Cloud Data

Hyunsoo Kwon, Junbeom Hur, Changhee Hahn

    Research output: Contribution to journalArticlepeer-review

    1 Citation (Scopus)

    Abstract

    Range query on encrypted data has been widely studied to achieve fast query processing while keeping data and queries secret. Prior work hides even the ordering information of the data, but sacrifices accuracy (e.g., false positives) and efficiency (e.g., exponential complexity in the domain size) as a trade-off. Moreover, hiding the order alone is not sufficient to prevent the recent database reconstruction attacks on range query abusing access pattern and volume leakage. Several countermeasures prevent such information leakage but incur practically unacceptable storage or computational overhead due to fake records embedded in the database and database re-encryption procedures. In this paper, we first propose a range query scheme RevealRE, which is highly efficient, but reveals ordering information. We then extend RevealRE to construct HideRE, a range query scheme that does not leak data ordering information while accurate (i.e., no false positives/negatives) and efficient (i.e., logarithmic search time). HideRE can mitigate the database reconstruction attacks by introducing deceptive queries, which are indistinguishable from regular queries while obfuscating the queried ranges. We experimentally confirm efficiency of our construction under various data distribution models, demonstrating the practicality. Resilience to database reconstruction attacks of our order-hiding range query scheme is formally proved.

    Original languageEnglish
    Pages (from-to)75604-75618
    Number of pages15
    JournalIEEE Access
    Volume10
    DOIs
    Publication statusPublished - 2022

    Bibliographical note

    Publisher Copyright:
    © 2013 IEEE.

    Keywords

    • Range query
    • privacy
    • security

    ASJC Scopus subject areas

    • General Engineering
    • General Materials Science
    • General Computer Science

    Fingerprint

    Dive into the research topics of 'Order-Hiding Range Query Over Encrypted Cloud Data'. Together they form a unique fingerprint.

    Cite this