Skip to main content

DPI: Dual Private Indexes for Outsourced Databases

  • Conference paper
Intelligent Information and Database Systems (ACIIDS 2014)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 8397))

Included in the following conference series:

Abstract

Designing secure and efficient indexes to support selective queries over encrypted data at server side is necessary for outsourced databases. On one hand, the indexes must be associated with plain values in order to locate tuples precisely. On the other hand, the indexes may open a door to leak sensitive information, especially when the indexes are combined with selective encryption. In this paper, we propose DPI, a dual private index for outsourced databases. According to DPI, two types of indexes, incorporated with user-specified random salts, are defined for each attribute. The generalization-based index is used to support server side query over encrypted data and protect data from link inferences, and the value-based index is adaptively used at client side to reduce extra decryption costs. We have conducted some experiments to validate our proposed method.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Damiani, E., Vimercati, S., Jajodia, P.S., Samarati, P.: Balancing Confidentiality and Efficiency in Untrusted Relational DBMSs. In: Proceedings of ACM CCS 2003, pp. 93–10 (2003)

    Google Scholar 

  2. Damiani, E., Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Key Management for Multi-user Encrypted Databases. In: Proceedings of StorageSS 2005, pp. 74–83 (2005)

    Google Scholar 

  3. Hacigumus, H., Iyer, B., Li, C., Mehrotra, S.: Executing SQL over Encrypted Data in the Database-Service-Provider Model. In: Proceedings of ACM SIGMOD 2002, pp. 216–227 (2002)

    Google Scholar 

  4. Miklau, G., Suciu, D.: Controlling Access to Published Data Using Cryptography. In: Proceedings of VLDB 2003, pp. 898–909 (2003)

    Google Scholar 

  5. Tang, Y., Liu, F., Huang, L.: Generalization-Based Private Indexes for Outsourced Databases. In: Meng, W., Feng, L., Bressan, S., Winiwarter, W., Song, W. (eds.) DASFAA 2013, Part I. LNCS, vol. 7825, pp. 161–175. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  6. Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Private Data Indexes for Selective Access to Outsourced Data. In: Prodeedings of WPES 2011, pp. 69–80 (2011)

    Google Scholar 

  7. Wang, H., Lakshmanan, L.: Efficient Secure Query Evaluation over Encrypted XML Databases. In: Proceedings of VLDB 2006, pp. 127–138 (2006)

    Google Scholar 

  8. Yu, S., Wang, C., Ren, K., Lou, W.: Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing. In: Proceedings of INFOCOM 2010, pp. 534–542 (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Tang, Y., Liu, F., Huang, L. (2014). DPI: Dual Private Indexes for Outsourced Databases. In: Nguyen, N.T., Attachoo, B., Trawiński, B., Somboonviwat, K. (eds) Intelligent Information and Database Systems. ACIIDS 2014. Lecture Notes in Computer Science(), vol 8397. Springer, Cham. https://doi.org/10.1007/978-3-319-05476-6_30

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-05476-6_30

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-05475-9

  • Online ISBN: 978-3-319-05476-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics