Abstract
Skylining for multi-criteria decision making is widely applicable and often involves sensitive data that should be encrypted, especially when the database and query engine are outsourced to an untrusted cloud platform. The state-of-the-art designs (ICDE’17) of skylining over encrypted data, while relying on two non-colluding servers, are still slow – taking around three hours to get the skyline for 9000 2-D points.
This paper proposes a very efficient solution with a trusted processor such as SGX. A challenge is to support dynamic queries while keeping the memory footprint small and simultaneously preventing unintended leakage with only lightweight cryptographic primitives. Our proposed approach iteratively loads data to the memory-limited SGX on-demand and builds a binary-tree-like index for logarithmic query time. For millions of points, we gain \({6000} - {28000}\times \) improvement in query time (ICDE’17).
The first two authors contributed equally and share the “co-first author” status. Sherman S. M. Chow is supported by General Research Funds (CUHK 14209918 and 14210217) of the Research Grants Council, UGC, Hong Kong. The authors would like to thank Shuaike Dong and Di Tang for their advice on the experiments, and the anonymous reviewers for their suggestions and comments.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
We remark that the assumption of two non-colluding servers and the usage of AHE enables both addition and multiplication over encrypted data [19].
- 2.
- 3.
We do not exploit multi-dimensional tree structures, such as R-tree, kd-tree, or their variants, since they will leak the distribution of the entire database before querying.
- 4.
Associated files are encrypted under another SKE key, generated by the data owner and shared with authorized users. The server (or SGX) cannot decrypt these files.
- 5.
Due to the page limit, we defer proof of Theorem 1 to the full version of this paper.
- 6.
- 7.
The extended version of [16] studies optimizations of BSSP and FSSP, which discusses the influence of parameters separately rather than providing a complete optimized scheme. We thus focus on the comparisons with regular BSSP and FSSP.
References
Bindschaedler, V., Grubbs, P., Cash, D., Ristenpart, T., Shmatikov, V.: The Tao of inference in privacy-protected databases. PVLDB 11(11), 1715–1728 (2018)
Bloom, B.H.: Space/time trade-offs in hash coding with allowable errors. Commun. ACM 13(7), 422–426 (1970)
Börzsönyi, S., Kossmann, D., Stocker, K.: The skyline operator. In: ICDE, pp. 421–430 (2001)
Bothe, S., Karras, P., Vlachou, A.: eSkyline: processing skyline queries over encrypted data. PVLDB 6(12), 1338–1341 (2013)
Cash, D., Liu, F.-H., O’Neill, A., Zhandry, M., Zhang, C.: Parameter-hiding order revealing encryption. In: Peyrin, T., Galbraith, S. (eds.) ASIACRYPT 2018. LNCS, vol. 11272, pp. 181–210. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-03326-2_7
Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. In: CCS, pp. 79–88. ACM (2006)
Du, M., Wang, Q., He, M., Weng, J.: Privacy-preserving indexing and query processing for secure dynamic cloud storage. IEEE TIFS 13(9), 2320–2332 (2018)
Elmehdwi, Y., Samanthula, B.K., Jiang, W.: Secure k-nearest neighbor query over encrypted data in outsourced environments. In: ICDE, pp. 664–675 (2014)
Hu, P., Chow, S.S.M., Aloufi, A.: Geosocial query with user-controlled privacy. In: WiSec, pp. 163–172. ACM (2017)
Kamara, S., Papamanthou, C., Roeder, T.: Dynamic searchable symmetric encryption. In: CCS, pp. 965–976. ACM (2012)
Kossmann, D., Ramsak, F., Rost, S.: Shooting stars in the sky: an online algorithm for skyline queries. In: VLDB, pp. 275–286 (2002)
Lai, R.W.F., Chow, S.S.M.: Structured encryption with non-interactive updates and parallel traversal. In: ICDCS, pp. 776–777 (2015)
Lai, R.W.F., Chow, S.S.M.: Parallel and dynamic structured encryption. In: Deng, R., Weng, J., Ren, K., Yegneswaran, V. (eds.) SecureComm 2016. LNICST, vol. 198, pp. 219–238. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-59608-2_12
Lai, R.W.F., Chow, S.S.M.: Forward-secure searchable encryption on labeled bipartite graphs. In: Gollmann, D., Miyaji, A., Kikuchi, H. (eds.) ACNS 2017. LNCS, vol. 10355, pp. 478–497. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-61204-1_24
Li, R., Liu, A.X.: Adaptively secure conjunctive query processing over encrypted data for cloud computing. In: ICDE, pp. 697–708 (2017)
Liu, J., Yang, J., Xiong, L., Pei, J.: Secure skyline queries on cloud platform. In: ICDE, pp. 633–644 (2017)
Liu, X., Choo, K.R., Deng, R.H., Yang, Y., Zhang, Y.: PUSC: privacy-preserving user-centric skyline computation over multiple encrypted domains. In: TrustCom, pp. 958–963 (2018)
Papadias, D., Tao, Y., Fu, G., Seeger, B.: An optimal and progressive algorithm for skyline queries. In: SIGMOD, pp. 467–478 (2003)
Wang, B., Li, M., Chow, S.S.M., Li, H.: A tale of two clouds: computing on data encrypted under multiple keys. In: CNS, pp. 337–345. IEEE (2014)
Wang, J., Chow, S.S.M.: Forward and backward-secure range-searchable symmetric encryption. IACR ePrint Archive: 2019/497 (2019)
Wu, S., Li, Q., Li, G., Yuan, D., Yuan, X., Wang, C.: ServeDB: secure, verifiable, and efficient range queries on outsourced database. In: ICDE, pp. 626–637 (2019)
Zheng, Y., Lu, R., Li, B., Shao, J., Yang, H., Choo, K.R.: Efficient privacy-preserving data merging and skyline computation over multi-source encrypted data. Inf. Sci. 498, 91–105 (2019)
Zhu, H., Meng, X., Kollios, G.: Privacy preserving similarity evaluation of time series data. In: EDBT, pp. 499–510 (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Wang, J., Du, M., Chow, S.S.M. (2020). Stargazing in the Dark: Secure Skyline Queries with SGX. In: Nah, Y., Cui, B., Lee, SW., Yu, J.X., Moon, YS., Whang, S.E. (eds) Database Systems for Advanced Applications. DASFAA 2020. Lecture Notes in Computer Science(), vol 12114. Springer, Cham. https://doi.org/10.1007/978-3-030-59419-0_20
Download citation
DOI: https://doi.org/10.1007/978-3-030-59419-0_20
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-59418-3
Online ISBN: 978-3-030-59419-0
eBook Packages: Computer ScienceComputer Science (R0)