Please use this identifier to cite or link to this item:
http://hdl.handle.net/10397/105606
DC Field | Value | Language |
---|---|---|
dc.contributor | Department of Computing | - |
dc.creator | Dou, Y | - |
dc.creator | Chan, HCB | - |
dc.creator | Au, MH | - |
dc.date.accessioned | 2024-04-15T07:35:21Z | - |
dc.date.available | 2024-04-15T07:35:21Z | - |
dc.identifier.issn | 0010-4620 | - |
dc.identifier.uri | http://hdl.handle.net/10397/105606 | - |
dc.language.iso | en | en_US |
dc.publisher | Oxford University Press | en_US |
dc.rights | © The British Computer Society 2018. All rights reserved. | en_US |
dc.rights | This is a pre-copyedited, author-produced version of an article accepted for publication in The Computer Journal following peer review. The version of record Yi Dou, Henry C B Chan, Man Ho Au, Order-Hiding Range Query over Encrypted Data without Search Pattern Leakage, The Computer Journal, Volume 61, Issue 12, December 2018, Pages 1806–182 is available online at: https://doi.org/10.1093/comjnl/bxy075. | en_US |
dc.subject | Cloud data storage | en_US |
dc.subject | Cloud security | en_US |
dc.subject | Data privacy | en_US |
dc.subject | Range query | en_US |
dc.subject | Searchable symmetric encryption | en_US |
dc.title | Order-hiding range query over encrypted data without search pattern leakage | en_US |
dc.type | Journal/Magazine Article | en_US |
dc.identifier.spage | 1806 | - |
dc.identifier.epage | 1824 | - |
dc.identifier.volume | 61 | - |
dc.identifier.issue | 12 | - |
dc.identifier.doi | 10.1093/comjnl/bxy075 | - |
dcterms.abstract | For cloud data storage, data privacy and security are two key concerns. Although sensitive data can be encrypted before they are stored in the cloud, the encrypted data can hardly be processed efficiently. Hence, a lightweight solution is required to satisfy both high security and high efficiency requirements. In this paper, we study the problem of range query over encrypted data. The main idea is to transform the range comparison to a privacy-preserving set intersection operation. To protect record privacy, our scheme builds searchable encrypted indexes for records that are secure against inference attack. To ensure the privacy of range queries, non-deterministic encryption, which has not been achieved in range query before, is proposed to hide the search pattern of queries. During range comparison, our scheme neither leaks the order relationship between the upper/lower bound of a range query and the encrypted index, nor produces false positives in the query results. We have implemented our scheme and evaluated its performance in comparison with other schemes. The comparison results indicate that our scheme has a shorter index size and search time than the order-revealing encryption (ORE) scheme when the processing unit is large. Meanwhile, our scheme only leaks the access pattern, and is proved to be more secure than existing schemes. | - |
dcterms.accessRights | open access | en_US |
dcterms.bibliographicCitation | Computer journal, Dec. 2018, v. 61, no. 12, p. 1806-1824 | - |
dcterms.isPartOf | Computer journal | - |
dcterms.issued | 2018-12 | - |
dc.identifier.scopus | 2-s2.0-85058802893 | - |
dc.identifier.eissn | 1460-2067 | - |
dc.description.validate | 202402 bcch | - |
dc.description.oa | Accepted Manuscript | en_US |
dc.identifier.FolderNumber | COMP-0778 | en_US |
dc.description.fundingSource | Others | en_US |
dc.description.fundingText | PolyU | en_US |
dc.description.pubStatus | Published | en_US |
dc.identifier.OPUS | 25066091 | en_US |
dc.description.oaCategory | Green (AAM) | en_US |
Appears in Collections: | Journal/Magazine Article |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Dou_Order-Hiding_Range_Query.pdf | Pre-Published version | 1.21 MB | Adobe PDF | View/Open |
Page views
15
Citations as of Jun 30, 2024
Downloads
5
Citations as of Jun 30, 2024
SCOPUSTM
Citations
4
Citations as of Jul 4, 2024
WEB OF SCIENCETM
Citations
4
Citations as of Jul 4, 2024
Google ScholarTM
Check
Altmetric
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.