Browse > Article
http://dx.doi.org/10.3837/tiis.2020.10.015

Searchable Encrypted String for Query Support on Different Encrypted Data Types  

Azizi, Shahrzad (University of Zanajn)
Mohammadpur, Davud (University of Zanajn)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.14, no.10, 2020 , pp. 4198-4213 More about this Journal
Abstract
Data encryption, particularly application-level data encryption, is a common solution to protect data confidentiality and deal with security threats. Application-level encryption is a process in which data is encrypted before being sent to the database. However, cryptography transforms data and makes the query difficult to execute. Various studies have been carried out to find ways in order to implement a searchable encrypted database. In the current paper, we provide a new encrypting method and querying on encrypted data (ZSDB) for different data types. It is worth mentioning that the proposed method is based on secret sharing. ZSDB provides data confidentiality by dividing sensitive data into two parts and using the additional server as Dictionary Server. In addition, it supports required operations on various types of data, especially LIKE operator functioning on string data type. ZSDB dedicates the largest volume of execution tasks on queries to the server. Therefore, the data owner only needs to encrypt and decrypt data.
Keywords
Data Encryption; Queryable Encryption; Secure Databases; Secure SQL Queries; Secret Sharing;
Citations & Related Records
Times Cited By KSCI : 4  (Citation Analysis)
연도 인용수 순위
1 J. Tang, Y. Cui, Q. Li, K. Ren, J. Liu and R. Buyya, "Ensuring security and privacy preservation for cloud data services," ACM Computing Surveys (CSUR), vol. 49, no. 1, pp. 13, 2016.
2 F. A. Aljumah, Protocols for Secure Computation on Privately Encrypted Data in the Cloud, Doctoral dissertation, Concordia University, Canada, 2017.
3 C. Sahin and A. El Abbadi, "Data security and privacy for outsourced data in the cloud," in Proc. of IEEE 34th International Conference on Data Engineering (ICDE), pp. 1731-1734, 2018.
4 L. Bouganim and Y. Guo, Database encryption. Encyclopedia of Cryptography and, 2nd Edition, Springer US, pp. 307-312, 2011.
5 P. Singh and K. Kaur, "Database security using encryption," in Proc. of IEEE International Conference on Futuristic Trends on Computational Analysis and Knowledge Management (ABLAZE), pp. 353-358, February, 2015.
6 C. Gentry, "Fully homomorphic encryption using ideal lattices," in Proc. of the forty-first annual ACM symposium on Theory of computing, pp. 169-178, May, 2009.
7 R. L. Rivest, A. Shamir and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Communications of the ACM, vol. 21, no. 2, pp. 120-126, 1978.   DOI
8 A. C. Yao, "Protocols for secure computations," in Proc. of 23rd annual symposium on foundations of computer science, pp. 160-164, November, 1982.
9 W. K. Wong, B. Kao, D. W. L. Cheung, R. Li and S. M. Yiu, "Secure query processing with data interoperability in a cloud database environment," in Proc. of the 2014 ACM SIGMOD international conference on Management of data, pp. 1395-1406, June, 2014.
10 H. Hacigumus, B. Iyer, C. Li and S. Mehrotra, "Executing SQL over encrypted data in the database-service-provider model," in Proc. of the 2002 ACM SIGMOD international conference on Management of data, pp. 216-227, June, 2002.
11 E. Mykletun and G. Tsudik, "Aggregation queries in the database-as-a-service model," in Proc. of the annual conference on data and applications security and privacy, pp. 89-103, July, 2006.
12 K. G. Ho, L. Vu, N. H. Nguyen and H. M. Nguyen, "Speed up querying encrypted data on outsourced database," in Proc. of the 2017 International Conference on Machine Learning and Soft Computing, pp. 47-52, 2017.
13 R. A. Popa, C. Redfield, N. Zeldovich and H. Balakrishnan, "CryptDB: protecting confidentiality with encrypted query processing," in Proc. of the Twenty-Third ACM Symposium on Operating Systems Principles, pp. 85-100, October, 2011.
14 S. Tu, M. Kaashoek, S. Madden and N. Zeldovich, "Processing analytical queries over encrypted data," in Proc. of the VLDB Endowment, pp. 289-300, March, 2013.
15 Z. He, W. K. Wong, B. Kao, D. W. L. Cheung, R. Li, S. M. Yiu and E. Lo, "SDB: a secure query processing system with data interoperability," in Proc. of the VLDB Endowment, vol. 8, no. 12, pp. 1876-1879, 2015.   DOI
16 P. G. Alves and D. F. Aranha, "A framework for searching encrypted databases," Journal of Internet Services and Applications, vol. 9, no. 1, pp. 1, 2018.   DOI
17 Y. Zhou and L. M. Wang, "Sds2: Secure data-sharing scheme for crowd owners in public cloud service," in Proc. of the IEEE Second International Conference on Data Science in Cyberspace (DSC), pp. 22-29, June, 2017.
18 S. S. Moghadam, J. Darmont and G. Gavin, "Enforcing privacy in cloud databases," in Proc. of the International Conference on Big Data Analytics and Knowledge Discovery, pp. 53-73, August, 2017.
19 T. K. Saha, M. Rathee and T. Koshiba, "Efficient private database queries using ring-LWE somewhat homomorphic encryption," Journal of Information Security and Applications, vol. 49, no. 1, 2019.
20 R. Pontes, M. Pinto, M. Barbosa, R. Vilaca, M. Matos and R. Oliveira, "Performance trade-offs on a secure multi-party relational database," in Proc. of the Symposium on Applied Computing, pp. 456-461, April 2017.
21 V. Attasena, N. Harbi and J. Darmont, "A novel multi-secret sharing approach for secure data warehousing and on-line analysis processing in the cloud," International Journal of Data Warehousing and Mining (IJDWM), vol. 11, no. 2, pp. 22-43, 2015.   DOI
22 M. He, J. Zhang, G. Zeng and S. M. Yiu, "A Privacy-Preserving Multi-Pattern Matching Scheme for Searching Strings in Cloud Database," in Proc. of the 15th Annual Conference on Privacy, Security and Trust (PST), pp. 293-299, August 2017.
23 B. Wang, S. Yu, W. Lou and Y. T. Hou, "Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud," in Proc. of the IEEE INFOCOM 2014-IEEE Conference on Computer Communications, pp. 2112-2120, April 2014.
24 D. Wang, X. Jia, C. Wang, K. Yang, S. Fu and M. Xu, "Generalized pattern matching string search on encrypted data in cloud systems," in Proc. of the IEEE Conference on Computer Communications (INFOCOM), pp. 2101-2109, April, 2015.
25 Z. Liu, J. Li, C. Jia, J. Yang and K. Yuan, "SQL-based fuzzy query mechanism over encrypted database," International Journal of Data Warehousing and Mining (IJDWM), vol. 10, no. 4, pp. 71-87, 2014.   DOI
26 Z. Wu, G. Xu, C. Lu, E. Chen, F. Jiang and G. Li, "An effective approach for the protection of privacy text data in the CloudDB," World Wide Web, vol. 21, no. 4, pp. 915-938, 2018.   DOI
27 W. Tang, B. Qin, Y. Li and Q. Wu, "Functional Privacy-preserving Outsourcing Scheme with Computation Verifiability in Fog Computing," KSII Transactions on Internet & Information Systems, vol. 14, no. 1, pp. 281-298, 2020.   DOI
28 S. Papadopoulos, A. Kiayias and D. Papadias, "Secure and efficient in-network processing of exact SUM queries," in Proc. of the 27th International Conference on Data Engineering, pp. 517-528, April, 2011.
29 S. Fatima and S. Ahmad, "An Exhaustive Review on Security Issues in Cloud Computing," KSII Transactions on Internet & Information Systems, vol. 13, no. 6, pp. 3219-3237, 2019.   DOI
30 J. Hua, Y. Liu, H. Chen, X. Tian and C. Jin, "An enhanced wildcard-based fuzzy searching scheme in encrypted databases," World Wide Web, vol. 23, pp. 2185-2214, 2020.   DOI