RASP: Efficient Multidimensional Range Query on Attack-Resilient Encrypted Databases
Document Type
Conference Proceeding
Publication Date
2011
Find in a Library
Abstract
Range query is one of the most frequently used queries for online data analytics. Providing such a query service could be expensive for the data owner. With the development of services computing and cloud computing, it has become possible to outsource large databases to database service providers and let the providers maintain the range-query service. With outsourced services, the data owner can greatly reduce the cost in maintaining computing infrastructure and data-rich applications. However, the service provider, although honestly processing queries, may be curious about the hosted data and received queries. Most existing encryption based approaches require linear scan over the entire database, which is inappropriate for online data analytics on large databases. While a few encryption solutions are more focused on efficiency side, they are vulnerable to attackers equipped with certain prior knowledge. We propose the Random Space Encryption (RASP) approach that allows efficient range search with stronger attack resilience than existing efficiency-focused approaches. We use RASP to generate indexable auxiliary data that is resilient to prior knowledge enhanced attacks. Range queries are securely transformed to the encrypted data space and then efficiently processed with a two-stage processing algorithm. We thoroughly studied the potential attacks on the encrypted data and queries at three different levels of prior knowledge available to an attacker. Experimental results on synthetic and real datasets show that this encryption approach allows efficient processing of range queries with high resilience to attacks.
Repository Citation
Chen, K.,
Kavuluru, R.,
& Guo, S.
(2011). RASP: Efficient Multidimensional Range Query on Attack-Resilient Encrypted Databases. Proceedings of the first ACM Conference on Data and Application Security and Privacy.
https://corescholar.libraries.wright.edu/knoesis/39
Comments
This paper was presented at the ACM Conference on Data and Application Security and Privacy (CODASPY), 2011.