scispace - formally typeset
Search or ask a question
Journal ArticleDOI

L-EncDB: A lightweight framework for privacy-preserving data queries in cloud computing

TL;DR: A new format-preserving encryption (FPE) scheme is constructed in this paper, which can be used to encrypt all types of character strings stored in database and is highly efficient and provably secure under existing security model.
Abstract: With the advent of cloud computing, individuals and organizations have become interested in moving their databases from local to remote cloud servers However, data owners and cloud service providers are not in the same trusted domain in practice For the protection of data privacy, sensitive data usually have to be encrypted before outsourcing, which makes effective database utilization a very challenging task To address this challenge, in this paper, we propose L-EncDB, a novel lightweight encryption mechanism for database, which (i) keeps the database structure and (ii) supports efficient SQL-based queries To achieve this goal, a new format-preserving encryption (FPE) scheme is constructed in this paper, which can be used to encrypt all types of character strings stored in database Extensive analysis demonstrates that the proposed L-EncDB scheme is highly efficient and provably secure under existing security model

Summary (4 min read)

1 Introduction

  • The ever-increasing amount of valuable digital data both at home and in business needs to be protected, since its irrevocable loss is unacceptable.
  • The advent of cloud storage motivates enterprises and organizations to outsource data storage to third-party cloud providers, as evidenced by many real-life case studies.
  • In recent years, their popularity has increased dramatically.
  • In the proposed L-EncDB system, the encryption and query are based on SQL.

1.1 Organization

  • The rest of this paper proceeds as follows.
  • In Section 3, the authors propose the system architecture and construction method for the L-EncDB system.
  • Its security and performance analysis is also given in this section.

2.1 FPE

  • The notion of FPE [1–4] has been proposed to generate ciphertext with the same format as plaintext while encrypting sensitive information.
  • More specifically, FPE can keep data type and length in the ciphertext, therefore, without changing database structure and field type.
  • There is no suitable character FPE solution to preserve both length and storage size of strings above.
  • Such a character set is called “multi-byte character set”.
  • Cycle-walking can not guarantee stable efficiency, which is impractical in most applications.

2.2 Privacy-preserving Database Encryption

  • A number of research results [9–13] were proposed for privacy-preserving database encryption.
  • To support query over encrypted numerical data, Hakan et al. [9] firstly presented a basic framework of how to ensure data security in “Database-As-Service” (DAS) model, in which a coarse query is executed by the database service provider.
  • The proxy encrypts and decrypts all the data, and changes some query operators, while preserving the semantics of the query.
  • In cloud computing, users are able to store, modify and retrieve data from anywhere in the world, as long as they have access to the Internet.
  • CryptDB changes the database structure and stores the ciphertexts generating by different encryption methods.

3.1 System Model

  • To provide data privacy protection solution and save upgrade cost for existing DB applications, L-EncDB system utilizes FPE technique to encrypt data.
  • There are two layers in the L-EncDB system, that is, the application system layer and database layer.
  • As shown in Fig. 2, the application system receives the interpreted SQL sentence by calling SQL interface, which takes the original SQL sentence as the input.
  • The authors show how to process the interpretation for each type in their system.
  • For fuzzy query or range query, SQL interpretation interface will further generate the query for ciphertext by using FQE or OPE and store it into an additional filed.

3.2 Security Notions

  • For L-EncDB system, the interface for SQL interpretation can be deployed at client side or the application service layer.
  • The authors assume that there exist authentication and access control methods to protect the key used in L-EncDB.
  • The authors consider two types of attackers for L-EncDB: (1) attackers with access to database, including DBA or cloud service provider.
  • They have access to the encrypted data and DB structure; (2) attackers with access to both application system and database.
  • In another word, they are able to access SQL interpretation interface deployed in DB applications, construct SQL sentences with plaintext, gain interpreted SQL sentences with encrypted data, and view all fields and structure of database.

3.3 SQL-based Data Operations

  • L-EncDB uses SQL interpretation interface to interpret all SQL sentence, which is viewed as an API that can be flexibly used by developers.
  • Next, the authors describe the interpretation processes in details and show how L-EncDB supports SQL operations and queries over encrypted data.

3.3.1 Basic SQL Operations

  • For basic data operation (insert, update, and delete) and query (exact query, join query, and nested query), the interface for SQL interpretation will replace the plaintexts with the corresponding ciphertexts encrypted by FPE.
  • Note that FPE is deterministic, which means that SQL-based data operation and query operation can be directly executed over the encrypted database.
  • “Insert into Table1(Field1, Field2) values (String1, String2 )”, will be interpreted to “Insert into Table1(Field1, Field2) values (fpek (String1 ), fpek(String2 ))”, where fpe is the adopted FPE algorithm, k is the selected encryption key, and fpek(x) means to encrypt x with fpe.
  • Similarly, the interface for SQL interpretation will replace the constants in the queries with ciphertexts of FPE in the following SQL sentences: Update, “Update Table1 set Field2=String3 where Field1=String1”; Delete, “Delete from Table1 where Field1 = String1”; Exact query, “Select * from Table1 where Field1 = String1”; Join query, “Select Table1.* from Table1,Table2 where Table1.

3.3.2 Advanced Queries

  • For range query, the interface applies OPE to generate ciphertexts and store them in additional fields.
  • For a SQL sentence like “Insert into Table1(Field1) values (String1 )”, where Field1 is for range query, the interpreted SQL sentence will be “Insert into Table1(Field1, Field1Extra) values (fpek(String1 ),OPEk(String1 ))”, where Field1Extra is additional field for Field1, OPE is adopted OPE scheme and OPEk(x) means to encrypt x with OPE scheme using encryption key k.
  • To perform fuzzy query, the interface changes the query filed to its additional field and generate keyword ciphertexts.
  • Direct SQL-based operations cannot be supported in CryptDB, where the trusted database proxy is used to intercept all the SQL queries and decrypt their results.
  • In short, compared with the other database encryption solutions such as CryptDB, L-EncDB is lightweight to support SQL-based operation directly in DBMS and can be flexibly deployed in database applications.

4 New FPE Scheme for Character String

  • As described in section 2.1, there is no suitable FPE scheme for varchar data type with the restriction that the ciphertext has the same length with its corresponding plaintext.
  • The authors propose a new FPE scheme for character string with arbitrary data type, which will be used in L-EncDB.

4.1 Preliminary

  • Throughout the rest of the paper, the authors let Chars be a multi-byte character set, and Chars∗ be character strings over Chars of any length.
  • For a multi-byte character set Chars, it can be divided into subsets and each subset contains characters of same size.
  • The authors now give a review of the classical definition for FPE given by Morris et al. [2].
  • (1) If a field is defined as nvarchar(n), it means that the field can store arbitrary character string with length (or character number) not more than n.
  • The FFX method [3] is suitable for this type of domain.

4.3.1 Basic Idea

  • For each character c, let v(c) be its mapping value in Zn.
  • For strings with type of varchar, FPE will preserve both length and storage size.
  • In the new FPE scheme, the result of addition has the same radix as that of left operand because the modulo is radix of left operand.

4.3.2 Description

  • The authors new FPE can be described by three algorithms, that is, Setup, Encrypt, and Decrypt.
  • It takes as input the string X, key k and the round number rn.
  • More specifically, three steps will be included.
  • Fig. 4 also describes the multi-radix modular addition algorithm, which ensures Ω(Li+1) = Ω(Ri) and Ω(Xi+1) = Ω(Xi), i.e., the output of i-th round has the same format as the input.

4.4 Security analysis

  • According to [2], the PRP security notion under chosen plaintext attack, i.e., PRP-CPA, is defined by PRP game PRPAξ between challenger C and adversary A as follows.
  • An FPE scheme ξ is PRP-CPA secure if any polynomial time adversary has only a negligible advantage in PRP game shown above, where the advantage is defined as AdvPRPξ (A) def = Pr[PRPAξ ⇒ 1]− 12 Theorem 1.
  • If the underlying round function is a secure pseudo random permutation, their new FPE scheme achieves the PRP security.
  • Assume that there exists an adversary breaks the security of their FPE scheme, a simulator will be built to show the insecurity of PRF , that is, the simulator could break the indistinguishability of PRF from a truly random permutation P .

5.1 Implementation Details

  • The experiment for their L-EncDB system is conducted to evaluate its efficiency.
  • To implement FPE schemes, AES and big number in open source library polarssl are used.
  • That is, L-EncDB DLL must know DB structure, and the fields should be encrypted for fuzzy query or range query.
  • Firstly, it analyzes SQL sentence, decides operations and tables to execute.
  • Secondly, based on operation and table structure, it decides whether encryption, fuzzy query or range query are needed.

5.2 Experimental Evaluation

  • L-EncDB is external encryption mechanism independent from database.
  • To evaluate its performance, two issues are addressed: 1) the performance of FPE encryption algorithms for batch data encryption, 2) the performance of OPE.
  • To construct the test platform, the authors use Java language to construct an application, in which the open source library named “HTTPClient” is used to visit the specified webpage in their website.
  • As shown in Fig. 7.(a), the average execution time of query is about 0.6ms, but that of insert and update is only about 0.3ms.
  • Execution time of SQL insert operation using L-EncDB is very close to that without encryption as shown in Fig. 7.(b).

6 Extension of L-EncDB to NoSQL Database Encryption

  • With the advent of the Internet Web2.0 site, traditional SQL-based relational databases cannot be applied and many challenges arise, including: (1) Performance problem.
  • In big data background, each user will produce massive dynamic information.
  • BigTable of Goole and Dynamo of Amazon are successful implementation of NoSQL.
  • In L-EncDB, exact query can be reserved because of the deterministic encryption.
  • So, the fuzzy query expression can be interpreted as “db.users.find(“name” :/ˆFQEk(A)/)”.

Did you find this useful? Give us your feedback

Content maybe subject to copyright    Report

L-EncDB: A Lightweight Framework for
Privacy-Preserving Data Queries in Cloud
Computing
Jin Li
a,
a
School of Computer Science and Educational Software
Guangzhou University, Guangzhou, 510006 P.R. China
Zheli Liu
b,
b
College of Information Technical Science
Nankai University, P.R. China
Xiaofeng Chen
c
c
State Key Laboratory of Integrated Service Networks (ISN)
Xidian University, Xi’an, P.R. China
Fatos Xhafa
d
d
Department of Languages and Informatics Systems
Technical University of Catalonia, Spain
Xiao Tan, Duncan S. Wong
e
e
Department of Computer Science
City University of Hong Kong, Hong Kong
Abstract
With the advent of cloud computing, individuals and organizations have become in-
terested in moving their databases from local to remote cloud servers. However, data
owners and cloud service providers are not in the same trusted domain in practice.
For the protection of data privacy, sensitive data usually have to be encrypted be-
fore outsourcing, which makes effective database utilization a very challenging task.
To address this challenge, in this paper, we propose L-EncDB, a novel lightweight
encryption mechanism for database, which i) keeps the database structure, and ii)
supports efficient SQL-based queries. To achieve this goal, a new format-preserving
encryption (FPE) scheme is constructed in this paper, which can be used to encrypt
all types of character strings stored in database. Extensive analysis demonstrates
Preprint submitted to Knowledge-Based Systems 25 March 2014

that the proposed L-EncDB scheme is highly efficient and provably secure under
existing security model.
Key words: Data query, outsourcing, privacy, format-preserving encryption
1 Introduction
The ever-increasing amount of valuable digital data both at home and in
business needs to be protected, since its irrevocable loss is unacceptable. The
advent of cloud storage motivates enterprises and organizations to outsource
data storage to third-party cloud providers, as evidenced by many real-life
case studies. Cloud storage services promise to be a solution for this problem.
In recent years, their popularity has increased dramatically. They offer user-
friendly, easily accessible and costsaving ways to store and automatically back
up arbitrary data, as well as data sharing between users and synchronization
of multiple devices.
As in any existing application and system, security and privacy play an ex-
tremely important role for the success, and certainly raise new challenges
among the many others that cloud storage is confronted with. Specifically,
when entrusting data to the cloud, data owner also releases control over the
data, resulting that their trust is put in the cloud service provider’s integrity
and in the security of its access control mechanisms. However, individuals and
especially businesses hesitate to entrust their data to cloud storage services
since they fear that they will lose control over it. Recent successful attacks
on cloud storage providers have exacerbated these concerns. The providers
are trying to alleviate the situation and have taken measures to keep their
customers’ data secure. The simple and popular solutions adopted for data
privacy are traditional encryption techniques such as public key encryption
or symmetric key encryption. Through these encryption methods before out-
sourcing, the security of users’s data can be protected.
However, traditional database encryption will change the data structure of
original data, and results in the impracticability of database application for
various kinds of SQL operations. If the data structure is changed, it cannot
support data operations over ciphertext such as range query and fuzzy query,
etc. Especially, there has been considerable recent interest in the paradigm of
Corresponding author. Jin Li and Zheli Liu contribute to this work equally.
Email addresses: jinli71@gmail.com (Jin Li ), liuzheli1978@163.com (Zheli
Liu).
2

data mining-as-service: a company (data owner) lacking in expertise or com-
putational resources can outsource its mining needs to a third party service
provider. However, both the outsourced database and the knowledge extracted
through data mining are considered private property of the data owner in many
applications. Thus, to protect data privacy while realizing data mining and
knowledge extraction, the data owner is required to transform its data without
changing its structure before outsourcing.
Contribution. To realize effective data utilization after secure outsourcing,
we propose a lightweight encrypted database mechanism denoted by L-EncDB.
This new mechanism is able to protect sensitive information while keeping the
data structure in outsourcing service for big database application. In the pro-
posed L-EncDB system, the encryption and query are based on SQL. Through
only one interface, all SQL sentences for database can be interpreted.
Furthermore, based on format-preserving encryption (FPE) technique and a
new character string FPE scheme, L-EncDB can be implemented to preserve
data type and length in ciphertext. It enables i) to encrypt data and store
them without changing original database structure, ii) to perform SQL oper-
ations on all kinds of databases, including text database such as SQLite and
Access, iii) to support SQL-based operations including advanced fuzzy and
range queries.
Innovation. In this paper, a novel FPE scheme with the method of “multi-
radix modular addition” is proposed to support the L-EncDB lightweight
framework for privacy-preserving outsourced database. The new proposed
FPE can preserve both length and storage size of character strings, which
cannot be efficiently achieved in the traditional FPE schemes. Based on the
FPE scheme, data operations such as data mining and SQL-based queries can
be directly executed over ciphertexts in the proposed L-EncDB framework.
Furthermore, L-EncDB framework can be extended to text database (such as
SQLite used in mobile) and NoSQL databases, which have not been considered
in the previous related work.
1.1 Organization
The rest of this paper proceeds as follows. In Section 2, we give a survey for
the related work to ours. In Section 3, we propose the system architecture and
construction method for the L-EncDB system. In Section 4, we propose a prac-
tical construction of FPE for character string. Its security and performance
analysis is also given in this section. In Section 5, we present the implementa-
tion of prototype for L-EncDB with the proposed FPE, and in Section 6, we
present an extension of the L-EncDB to NoSQL database encryption. Finally
3

we draw conclusion and show the future work in Section 7.
2 Related Work
We briefly discuss FPE technique and privacy-preserving database encryption
solutions in this Section.
2.1 FPE
The notion of FPE [1–4] has been proposed to generate ciphertext with the
same format as plaintext while encrypting sensitive information. More specifi-
cally, FPE can keep data type and length in the ciphertext, therefore, without
changing database structure and field type. Thus, the use of FPE enables
upgrading database security in a transparent way. The goal of FPE is to
generate ciphertext which falls in the same domain as the plaintext. Some
practical FPE schemes have been proposed for simple domains such as integer
[5], character data [3] and datetime [6]. Character data is the common data
type in database, which appears in the form of character strings, i.e., the fi-
nite sequences of characters from some character sets. However, there is no
suitable character FPE solution to preserve both length and storage size of
strings above. For a string with character from iso-8859-1 or ASCII, where
the storage size of each character is 1 byte, the length of string is equal to its
storage size, and FFX is also suitable in this case.
However, most of character sets are represented using more powerful encoding
formats, and different characters may require different byte counts to repre-
sent. In this paper, such a character set is called “multi-byte character set”.
Consider a character string of length n with each character in UTF-8, its stor-
age size will be from n bytes to 4n bytes. In this case, FFX is unsuitable. In
2012, Li et al. [7] proposed a solution based on cycle-walking [8]. However,
cycle-walking can not guarantee stable efficiency, which is impractical in most
applications. In this paper, we develop a new FPE method in Section 4.
2.2 Privacy-preserving Database Encryption
A number of research results [9–13] were proposed for privacy-preserving
database encryption. However, most of them cannot provide the complete
solution for general SQL-base operations over encrypted data. To support
query over encrypted numerical data, Hakan et al. [9] firstly presented a basic
4

Fig. 1. CryptDB architecture
Database Layer
Field_1
Field_n Additional Field
ciphertext ciphertext Keyword ciphertext
Additional Field
Keyword ciphertext
Application
System
Trusted SQL Interpretation Layer
Format-preserving
Encryption
Fuzzy Query
Encryption
Order-preserving
Encryption
1. Plaintext SQL
2. Ciphertext SQL
3. Execute SQL
SQL Flow
Data Flow
Table1
Fig. 2. L-EncDB Architecture
framework of how to ensure data security in “Database-As-Service” (DAS)
model, in which a coarse query is executed by the database service provider.
Based on this basic framework, Wu et al. [12] described a solution for query
over encrypted character strings.
One of the most typical database encryption solutions is CryptDB [14], which
explores an intermediate design point to provide confidentiality for applica-
tions that use database management systems (DBMSes). As shown in Fig. 1,
CryptDB works by intercepting all SQL queries in a database proxy, which
rewrites queries to execute over encrypted data (CryptDB assumes that all
queries go through the proxy). The proxy encrypts and decrypts all the data,
and changes some query operators, while preserving the semantics of the query.
However, CryptDB is not designed for existing database applications and the
DAS model of cloud storage. In cloud computing, users are able to store,
modify and retrieve data from anywhere in the world, as long as they have
access to the Internet. CryptDB changes the database structure and stores
the ciphertexts generating by different encryption methods.
2.3 Other Related Work
The notion of order preserving encryption (OPE) [15–18] is another important
encryption method in database to achieve the confidentiality while keeping
the order of underlying plaintexts. Such a property allows users to perform
5

Citations
More filters
Journal ArticleDOI
TL;DR: This work presents a blockchain-based system for secure mutual authentication, BSeIn, to enforce fine-grained access control polices and is designed to provide privacy and security guarantees such as anonymous authentication, auditability, and confidentiality.
Abstract: To be prepared for the ‘Industry 4.0’-era, we propose a hierarchical framework comprising four tangible layers, which is designed to vertically integrate inter-organizational value networks, engineering value chain, manufacturing factories, etc. The conceptual framework allows us to efficiently implement a flexible and reconfigurable smart factory. However, we need to consider security inherent in existing (stand-alone) devices and networks as well as those that may arise in such integrations. Especially the existing solutions are insufficient to address these fundamental security concerns. Thus, we present a blockchain-based system for secure mutual authentication, BSeIn, to enforce fine-grained access control polices. The proposed system (with integrated attribute signature, multi-receivers encryption and message authentication code) is designed to provide privacy and security guarantees such as anonymous authentication, auditability, and confidentiality. BSeIn also scales well due to the utilization of smart contract. We then evaluate the security and performance of BSeIn. For example, findings from the performance evaluation demonstrate that Initialization/Request Issuance/Chain Transaction/State Delivery/Permission Update phase only cost 12.123/4.810/6.978/0.013/2.559s, respectively.

307 citations

Journal ArticleDOI
TL;DR: This paper discusses various research challenges that still exist in the literature, which provides better understanding of the problem, current solution space, and future research directions to defend IoT against different attacks.
Abstract: Internet technology is very pervasive today. The number of devices connected to the Internet, those with a digital identity, is increasing day by day. With the developments in the technology, Internet of Things (IoT) become important part of human life. However, it is not well defined and secure. Now, various security issues are considered as major problem for a full-fledged IoT environment. There exists a lot of security challenges with the proposed architectures and the technologies which make the backbone of the Internet of Things. Some efficient and promising security mechanisms have been developed to secure the IoT environment, however, there is a lot to do. The challenges are ever increasing and the solutions have to be ever improving. Therefore, aim of this paper is to discuss the history, background, statistics of IoT and security based analysis of IoT architecture. In addition, we will provide taxonomy of security challenges in IoT environment and taxonomy of various defense mechanisms. We conclude our paper discussing various research challenges that still exist in the literature, which provides better understanding of the problem, current solution space, and future research directions to defend IoT against different attacks.

260 citations

Journal ArticleDOI
TL;DR: A new system for Cloud Computing integrated with Internet of Things as a base scenario for Big Data and an architecture relaying on the security of the network are proposed in order to improve their security issues.
Abstract: With the significant advances in communication technologies and in many other sectors, also are growing up security and privacy issues. In our research, is introduced a base technology called Cloud Computing (CC) to operate with the Big Data (BD). CC is a technology which refers to the processing power of data in the fog, providing more “green” computational and sustainable computing. Since it is a recently investigated technology, it has many gaps in security and privacy. So, in this paper, we proposed a new system for Cloud Computing integrated with Internet of Things as a base scenario for Big Data. Moreover, we tried to establish an architecture relaying on the security of the network in order to improve the security issues. A solution proposed is installing a security “wall” between the Cloud Server and the Internet, with the aim to eliminate the privacy and security issues. As a result, we consider that CC deals more efficient with the privacy issue of bits transferred through time. Through our proposed system, the interaction and cooperation between things and objects communicate through the wireless networks in order to fulfil the objective set to them as a combined entity. Regarding the major goal of our research, which is the security, a sort survey of IoT and CC presented, with a focus on the security issues of both technologies. In addition to this, we try present the security challenges of the integration of IoT and Cloud Computing with the aim to provide an architecture relaying on the security of the network in order to improve their security issues. Finally, we realize that through our study Cloud Computing could offer a more “green” and efficient fog environment for sustainable computing scenarios.

198 citations

Journal ArticleDOI
TL;DR: This paper constructs a new ID-based linear homomorphic signature scheme, which avoids the shortcomings of the use of public-key certificates and is proved secure against existential forgery on adaptively chosen message and ID attack under the random oracle model.
Abstract: Identity-based cryptosystems mean that public keys can be directly derived from user identifiers, such as telephone numbers, email addresses, and social insurance number, and so on. So they can simplify key management procedures of certificate-based public key infrastructures and can be used to realize authentication in blockchain. Linearly homomorphic signature schemes allow to perform linear computations on authenticated data. And the correctness of the computation can be publicly verified. Although a series of homomorphic signature schemes have been designed recently, there are few homomorphic signature schemes designed in identity-based cryptography. In this paper, we construct a new ID-based linear homomorphic signature scheme, which avoids the shortcomings of the use of public-key certificates. The scheme is proved secure against existential forgery on adaptively chosen message and ID attack under the random oracle model. The ID-based linearly homomorphic signature schemes can be applied in e-business and cloud computing. Finally, we show how to apply it to realize authentication in blockchain.

175 citations


Cites background from "L-EncDB: A lightweight framework fo..."

  • ...Homomorphic signature schemes can be employed in electronic business and cloud computing [16], [18], [21], [27], [36]....

    [...]

Journal ArticleDOI
TL;DR: The proposed scheme enables a trainer to train a Naive Bayes classifier over the dataset provided jointly by different data owners, without the help of a trusted curator, and can achieve ϵ-differential privacy while the training will not break the privacy of each owner.
Abstract: For meeting diverse requirements of data analysis, the machine learning classifier has been provided as a tool to evaluate data in many applications. Due to privacy concerns of preventing disclosing sensitive information, data owners often suppress their data for an untrusted trainer to train a classifier. Some existing work proposed privacy-preserving solutions for learning algorithms, which allow a trainer to build a classifier over the data from a single owner. However, they cannot be directly used in the multi-owner setting where each owner is not totally trusted for each other. In this paper, we propose a novel privacy-preserving Naive Bayes learning scheme with multiple data sources. The proposed scheme enables a trainer to train a Naive Bayes classifier over the dataset provided jointly by different data owners, without the help of a trusted curator. The training result can achieve ϵ-differential privacy while the training will not break the privacy of each owner. We implement the prototype of the scheme and conduct corresponding experiment.

171 citations

References
More filters
Proceedings ArticleDOI
14 May 2000
TL;DR: This work describes the cryptographic schemes for the problem of searching on encrypted data and provides proofs of security for the resulting crypto systems, and presents simple, fast, and practical algorithms that are practical to use today.
Abstract: It is desirable to store data on data storage servers such as mail servers and file servers in encrypted form to reduce security and privacy risks. But this usually implies that one has to sacrifice functionality for security. For example, if a client wishes to retrieve only documents containing certain words, it was not previously known how to let the data storage server perform the search and answer the query, without loss of data confidentiality. We describe our cryptographic schemes for the problem of searching on encrypted data and provide proofs of security for the resulting crypto systems. Our techniques have a number of crucial advantages. They are provably secure: they provide provable secrecy for encryption, in the sense that the untrusted server cannot learn anything about the plaintext when only given the ciphertext; they provide query isolation for searches, meaning that the untrusted server cannot learn anything more about the plaintext than the search result; they provide controlled searching, so that the untrusted server cannot search for an arbitrary word without the user's authorization; they also support hidden queries, so that the user may ask the untrusted server to search for a secret word without revealing the word to the server. The algorithms presented are simple, fast (for a document of length n, the encryption and search algorithms only need O(n) stream cipher and block cipher operations), and introduce almost no space and communication overhead, and hence are practical to use today.

3,300 citations


"L-EncDB: A lightweight framework fo..." refers background or methods in this paper

  • ...Another notion related is searchable encryption (SE) [19,20], which provides functionalities to perform keyword search over encrypted data without decrypting them....

    [...]

  • ...proposed a keyword search scheme based on SE scheme [19]....

    [...]

Proceedings ArticleDOI
03 Jun 2002
TL;DR: The paper explores an algebraic framework to split the query to minimize the computation at the client site, and explores techniques to execute SQL queries over encrypted data.
Abstract: Rapid advances in networking and Internet technologies have fueled the emergence of the "software as a service" model for enterprise computing. Successful examples of commercially viable software services include rent-a-spreadsheet, electronic mail services, general storage services, disaster protection services. "Database as a Service" model provides users power to create, store, modify, and retrieve data from anywhere in the world, as long as they have access to the Internet. It introduces several challenges, an important issue being data privacy. It is in this context that we specifically address the issue of data privacy.There are two main privacy issues. First, the owner of the data needs to be assured that the data stored on the service-provider site is protected against data thefts from outsiders. Second, data needs to be protected even from the service providers, if the providers themselves cannot be trusted. In this paper, we focus on the second challenge. Specifically, we explore techniques to execute SQL queries over encrypted data. Our strategy is to process as much of the query as possible at the service providers' site, without having to decrypt the data. Decryption and the remainder of the query processing are performed at the client site. The paper explores an algebraic framework to split the query to minimize the computation at the client site. Results of experiments validating our approach are also presented.

1,351 citations


"L-EncDB: A lightweight framework fo..." refers background in this paper

  • ...[9] firstly presented a basic framework of how to ensure data security in ‘‘Database-As-Service’’ (DAS) model, in which a coarse query is executed by the database service provider....

    [...]

Book ChapterDOI
21 Feb 2007
TL;DR: This work constructs public-key systems that support comparison queries on encrypted data as well as more general queries such as subset queries (x∈ S) and supports arbitrary conjunctive queries without leaking information on individual conjuncts.
Abstract: We construct public-key systems that support comparison queries (x ≥ a) on encrypted data as well as more general queries such as subset queries (x∈ S). Furthermore, these systems support arbitrary conjunctive queries (P1 ∧ ... ∧ Pl) without leaking information on individual conjuncts. We present a general framework for constructing and analyzing public-key systems supporting queries on encrypted data.

1,310 citations

Proceedings ArticleDOI
13 Jun 2004
TL;DR: This work presents an order-preserving encryption scheme for numeric data that allows any comparison operation to be directly applied on encrypted data, and is robust against estimation of the true value in such environments.
Abstract: Encryption is a well established technology for protecting sensitive data. However, once encrypted, data can no longer be easily queried aside from exact matches. We present an order-preserving encryption scheme for numeric data that allows any comparison operation to be directly applied on encrypted data. Query results produced are sound (no false hits) and complete (no false drops). Our scheme handles updates gracefully and new values can be added without requiring changes in the encryption of other values. It allows standard databse indexes to be built over encrypted tables and can easily be integrated with existing database systems. The proposed scheme has been designed to be deployed in application environments in which the intruder can get access to the encrypted database, but does not have prior domain information such as the distribution of values and annot encrypt or decrypt arbitrary values of his choice. The encryption is robust against estimation of the true value in such environments.

1,303 citations

Proceedings ArticleDOI
23 Oct 2011
TL;DR: The evaluation shows that CryptDB has low overhead, reducing throughput by 14.5% for phpBB, a web forum application, and by 26% for queries from TPC-C, compared to unmodified MySQL.
Abstract: Online applications are vulnerable to theft of sensitive information because adversaries can exploit software bugs to gain access to private data, and because curious or malicious administrators may capture and leak data. CryptDB is a system that provides practical and provable confidentiality in the face of these attacks for applications backed by SQL databases. It works by executing SQL queries over encrypted data using a collection of efficient SQL-aware encryption schemes. CryptDB can also chain encryption keys to user passwords, so that a data item can be decrypted only by using the password of one of the users with access to that data. As a result, a database administrator never gets access to decrypted data, and even if all servers are compromised, an adversary cannot decrypt the data of any user who is not logged in. An analysis of a trace of 126 million SQL queries from a production MySQL server shows that CryptDB can support operations over encrypted data for 99.5% of the 128,840 columns seen in the trace. Our evaluation shows that CryptDB has low overhead, reducing throughput by 14.5% for phpBB, a web forum application, and by 26% for queries from TPC-C, compared to unmodified MySQL. Chaining encryption keys to user passwords requires 11--13 unique schema annotations to secure more than 20 sensitive fields and 2--7 lines of source code changes for three multi-user web applications.

1,269 citations


"L-EncDB: A lightweight framework fo..." refers background in this paper

  • ...(1) CryptDB can only partially support fuzzy query....

    [...]

  • ...Model L-EncDB CryptDB Fuzzy query Yes Partial Data operation Application DB proxy and UDFs Change DB structure Add fields Anonymize tables and columns Please cite this article in press as: J. Li et al., L-EncDB: A lightweight framework (2014), http://dx.doi.org/10.1016/j.knosys.2014.04.010 scheme and OPEkðxÞ means to encrypt x with OPE scheme using encryption key k....

    [...]

  • ...For example, for a SQL sentence like ‘‘Insert into Table 1(Field1) values (String1)’’, where Field1 is for range query, the interpreted SQL sentence will be ‘‘Insert into Table 1(Field1, Field1Extra) values (fpek(String1),OPEk(String1))’’, where Field1Extra is additional field for Field1, OPE is adopted OPE Table 1 FPE for data types in DB. Types Subtypes SQL field type FPE scheme Numeric Integer smallint; int FFSEM [5] Decimal numeric; float Char Finite length nchar;nvarchar FFX [3] Finite space char; varchar MR-FPE Datetime N/A datetime Liu et al. [6] Binary N/A binary; varbinary Block cipher Table 2 Comparison between L-EncDB and CryptDB....

    [...]

  • ...However, CryptDB is not designed for existing database applications and the DAS model of cloud storage....

    [...]

  • ...(3) On database structure, CryptDB anonymizes each table and column name to achieve confidentiality....

    [...]

Frequently Asked Questions (16)
Q1. What have the authors contributed in "L-encdb: a lightweight framework for privacy-preserving data queries in cloud computing" ?

To address this challenge, in this paper, the authors propose L-EncDB, a novel lightweight encryption mechanism for database, which i ) keeps the database structure, and ii ) supports efficient SQL-based queries. To achieve this goal, a new format-preserving encryption ( FPE ) scheme is constructed in this paper, which can be used to encrypt all types of character strings stored in database. 

Finally, the authors also showed how to extend their L-EncDB to realize the privacy-preserving queries over encrypted NoSQL Database. Especially, the authors will extend it to privacy-preserving knowledge extraction for outsourcing database, and further provide some practical data publishing methods suitable for their framework. Finally, the authors also showed how to extend their L-EncDB to realize the privacy-preserving queries over encrypted NoSQL Database. Especially, the authors will extend it to privacy-preserving knowledge extraction for outsourcing database, and further provide some practical data publishing methods suitable for their framework. 

For a SQL insert sentence with 30 fields and no range query or fuzzy query, the execution time for each insert operation is about 0.09ms, i.e., the system can interpret 11000 SQL sentences within 1s. 

To construct the test platform, the authors use Java language to construct an application, in which the open source library named “HTTPClient” is used to visit the specified webpage in their website. 

The simple and popular solutions adopted for data privacy are traditional encryption techniques such as public key encryption or symmetric key encryption. 

In cloud computing, users are able to store, modify and retrieve data from anywhere in the world, as long as they have access to the Internet. 

To provide dynamic pages and information for user, thousands of read and write requests are produced each second in web2.0 site, and results in high concurrent load of database. 

most of character sets are represented using more powerful encoding formats, and different characters may require different byte counts to represent. 

for existing database applications, L-EncDB is more suitable and lightweight when enterprises and organizations outsource data storage to third-party cloud providers. 

A format-preserving encryption scheme is a function F : K × N ×T ×X → X ×{⊥}, where ⊥ ≠ X , and nonempty sets K, N , T , X denote the key space, format space, tweak space and domain, respectively. 

The new proposed FPE can preserve both length and storage size of character strings, which cannot be efficiently achieved in the traditional FPE schemes. 

In the cloud computing, more and more enterprises also need to outsource NoSQL database to construct their business applications. 

In their FPE for strings with type of varchar, the format space is defined by both length and storage size, that is N [Chars] = {(l(X), s(X))|X ∈ X [Chars]}. 

individuals and especially businesses hesitate to entrust their data to cloud storage services since they fear that they will lose control over it. 

Experimental results demonstrate that the new L-EncDB is efficient and can be applied to big database for privacy-preserving applications. 

As shown in Fig. 3.(a), for SQL data operation sentences, such as to insert, or to update, each constant in the query will be encrypted using FPE.