Skip to main content

Privacy-Preserving Comparable Encryption Scheme in Cloud Computing

  • Conference paper
  • First Online:
Cyberspace Safety and Security (CSS 2017)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10581))

Included in the following conference series:

  • 2194 Accesses

Abstract

Data owners encrypt and outsource large size of data to cloud servers to reduce storage and management overhead. In traditional database, it is difficult for users to make comparable queries over ciphertexts. A Short Comparable Encryption (SCE) scheme has been emerged as a fundamental solution to enable data owners to conduct comparable queries over encrypted data. Unfortunately, it infers high computational and storage overhead as well as economic burden. In this paper, we first propose a basic Short Comparable Encryption scheme based on Sliding Window method, namely SCESW, which can relief computational and storage burden as well as enhance work efficiency by utilizing sliding window method. However, since the cloud server is always provided by semi-trusted third-party, auditing technology can be applied to protect data integrity. To this end, we improve SCESW scheme to present an enhanced auditing of SCESW scheme called PA-SCESW. Formal security analysis proves that PA-SCESW and SCESW schemes can guarantee data security, integrity as well as weak indistinguishability in standard model. Actual performance evaluation shows PA-SCESW scheme’s feasibility and efficiency in practice applications, especially for users with constrained computing resources and capacities.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Sookhak, M., Gani, A., Khan, M.K., Buyya, R.: Dynamic remote data auditing for securing big data storage in cloud computing. Inf. Sci. 380, 101–116 (2017)

    Article  Google Scholar 

  2. Guo, L., Zhang, C., Sun, J., Fang, Y.: PAAS: A privacy-preserving attribute-based authentication system for ehealth networks. In: The 32nd International Conference on Distributed Computing Systems (ICDCS 2012), pp. 224–233 (2012)

    Google Scholar 

  3. Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J., Brandic, I.: Cloud computing and emerging it platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Gener. Comput. Syst. 25(6), 599–616 (2009)

    Article  Google Scholar 

  4. Xia, Z., Zhu, Y., Sun, X., Qin, Z., Ren, K.: Towards privacy-preserving content-based image retrieval in cloud computing. IEEE Trans. Cloud Comput. (2017)

    Google Scholar 

  5. Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Order preserving encryption for numeric data. In: Proceedings of the 2004 International Conference on Management of Data (ACM SIGMOD 2004), pp. 563–574 (2004)

    Google Scholar 

  6. Furukawa, J.: Request-based comparable encryption. In: Crampton, J., Jajodia, S., Mayes, K. (eds.) ESORICS 2013. LNCS, vol. 8134, pp. 129–146. Springer, Heidelberg (2013). doi:10.1007/978-3-642-40203-6_8

    Chapter  Google Scholar 

  7. Chen, P., Ye, J., Chen, X.: Efficient request-based comparable encryption scheme based on sliding window method. Soft. Comput. 20(11), 4589–4596 (2016)

    Article  MATH  Google Scholar 

  8. Furukawa, J.: Short comparable encryption. In: Gritzalis, D., Kiayias, A., Askoxylakis, I. (eds.) CANS 2014. LNCS, vol. 8813, pp. 337–352. Springer, Cham (2014). doi:10.1007/978-3-319-12280-9_22

    Google Scholar 

  9. Deswarte, Y., Quisquater, J.J., Saïdane, A.: Remote integrity checking. Integrity Intern. Control Inf. Syst. VI, 1–11 (2004)

    Google Scholar 

  10. Gazzoni Filho, D.L., Barreto, P.: Demonstrating data possession and uncheatable data transfer. IACR Cryptology ePrint Archive 150 (2006)

    Google Scholar 

  11. Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: ACM Conference on Computer and Communications Security (ACM 2007), pp. 598–609 (2007)

    Google Scholar 

  12. Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: Enabling public verifiability and data dynamics for storage security in cloud computing. In: European Symposium on Research in Computer Security, pp. 355–370 (2009)

    Google Scholar 

  13. Shacham, H., Waters, B.: Compact proofs of retrievability. J. Cryptology 26(3), 442–483 (2013)

    Article  MATH  MathSciNet  Google Scholar 

  14. Juels, A., Kaliski, B.S.: Pors: proofs of retrievability for large files. In: ACM Conference on Computer and Communications Security (ACM 2007), pp. 584–597 (2007)

    Google Scholar 

  15. Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for data storage security in cloud computing. In: 2010 Proceedings of IEEE INFOCOM, pp. 1–9 (2010)

    Google Scholar 

  16. Karras, P., Nikitin, A., Saad, M., Bhatt, R., Antyukhov, D., Idreos, S.: Adaptive indexing over encrypted numeric data. In: Proceedings of the 2016 International Conference on Management of Data, pp. 171–183 (2016)

    Google Scholar 

  17. Koç, C.K.: Analysis of sliding window techniques for exponentiation. Comput. Math. Appl. 30(10), 17–24 (1995)

    Article  MATH  MathSciNet  Google Scholar 

Download references

Acknowledgment

This work is supported by the National High Technology Research and Development Program (863 Program) (No. 2015AA016007), China Postdoctoral Science Foundation Funded Project (No. 2017M613080), the Fundamental Research Funds for the Central Universities (No. JB171504), the Key Program of NSFC (No. U1405255, No. U1135002), the Major Nature Science Foundation of China (No. 61472310, No. 61672413, No. 61370078, No. 61309016), the 111 project (No. B16037), the Shaanxi Science & Technology Coordination & Innovation Project (No. 2016TZC-G-6-3) and the Fundamental Research Funds for the Central Universities (No. BDZ011402).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jianfeng Ma .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Meng, Q., Ma, J., Chen, K., Miao, Y., Yang, T. (2017). Privacy-Preserving Comparable Encryption Scheme in Cloud Computing. In: Wen, S., Wu, W., Castiglione, A. (eds) Cyberspace Safety and Security. CSS 2017. Lecture Notes in Computer Science(), vol 10581. Springer, Cham. https://doi.org/10.1007/978-3-319-69471-9_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-69471-9_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-69470-2

  • Online ISBN: 978-3-319-69471-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics