Order-Hiding Range Query Over Encrypted Cloud Data

Hyunsoo Kwon, Junbeom Hur, Changhee Hahn

Research output: Contribution to journalArticlepeer-review

1 Citation (Scopus)


Range query on encrypted data has been widely studied to achieve fast query processing while keeping data and queries secret. Prior work hides even the ordering information of the data, but sacrifices accuracy (e.g., false positives) and efficiency (e.g., exponential complexity in the domain size) as a trade-off. Moreover, hiding the order alone is not sufficient to prevent the recent database reconstruction attacks on range query abusing access pattern and volume leakage. Several countermeasures prevent such information leakage but incur practically unacceptable storage or computational overhead due to fake records embedded in the database and database re-encryption procedures. In this paper, we first propose a range query scheme RevealRE, which is highly efficient, but reveals ordering information. We then extend RevealRE to construct HideRE, a range query scheme that does not leak data ordering information while accurate (i.e., no false positives/negatives) and efficient (i.e., logarithmic search time). HideRE can mitigate the database reconstruction attacks by introducing deceptive queries, which are indistinguishable from regular queries while obfuscating the queried ranges. We experimentally confirm efficiency of our construction under various data distribution models, demonstrating the practicality. Resilience to database reconstruction attacks of our order-hiding range query scheme is formally proved.

Original languageEnglish
Pages (from-to)75604-75618
Number of pages15
JournalIEEE Access
Publication statusPublished - 2022

Bibliographical note

Publisher Copyright:
© 2013 IEEE.


  • Range query
  • privacy
  • security

ASJC Scopus subject areas

  • General Engineering
  • General Materials Science
  • General Computer Science


Dive into the research topics of 'Order-Hiding Range Query Over Encrypted Cloud Data'. Together they form a unique fingerprint.

Cite this