2014
DOI: 10.14778/2733085.2733100
|View full text |Cite
|
Sign up to set email alerts
|

Fast range query processing with strong privacy protection for cloud computing

Abstract: Privacy has been the key road block to cloud computing as clouds may not be fully trusted. This paper concerns the problem of privacy preserving range query processing on clouds. Prior schemes are weak in privacy protection as they cannot achieve index indistinguishability, and therefore allow the cloud to statistically estimate the values of data and queries using domain knowledge and history query results. In this paper, we propose the first range query processing scheme that achieves index indistinguishabil… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
99
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 85 publications
(99 citation statements)
references
References 44 publications
(51 reference statements)
0
99
0
Order By: Relevance
“…Li et al [18] discussed the problem about privacy preserving range query processing on clouds, and presented a fast range query processing scheme by organizing indexing elements in a complete binary tree. Wai et al [28] addressed security issues in a cloud database system, and proposed a secure query processing scheme on relational tables and a set of elementary operators on encrypted data, which allows a wide range of database queries to be processed by the server on encrypted data.…”
Section: Related Workmentioning
confidence: 99%
“…Li et al [18] discussed the problem about privacy preserving range query processing on clouds, and presented a fast range query processing scheme by organizing indexing elements in a complete binary tree. Wai et al [28] addressed security issues in a cloud database system, and proposed a secure query processing scheme on relational tables and a set of elementary operators on encrypted data, which allows a wide range of database queries to be processed by the server on encrypted data.…”
Section: Related Workmentioning
confidence: 99%
“…Our constructions with their performance and security characteristics are summarized in Table 1 and discussed in detail throughout the paper. We also quantify the costs of Li et al [50], which is clearly subsumed by our Logarithmic-BRC scheme.…”
Section: Introductionmentioning
confidence: 99%
“…SSE also provides a rigorous framework for accurately defining leakage for any construction. Unfortunately, the scheme by Li et al [50] relies on weak, obsolete SSE definitions (explained in detail in Section 2.1). Moreover, it unnecessarily introduces false positives and does not support updates.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations