Skip to main content

On Privacy Preserving Encrypted Data Stores

  • Conference paper
  • First Online:
Multimedia and Ubiquitous Engineering

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 240))

Abstract

Bucketization techniques allow for effective organization of encrypted data at untrusted servers and for querying by clients. This paper presents a new metric for estimating the risk of data exposure over a set of bucketized data. The metric accounts for the importance of bucket distinctness relative to bucket access. Additionally, we review a method of controlled diffusion which improves bucket security by maximizing entropy and variance. In conjunction with our metric we use this method to show that the advantages of bucketization may be offset due to a loss of bucket security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Agrawal R, Kiernan J, Srikant R, Xu Y (2004) Order preserving encryption for numeric data. In: 2004 ACM SIGMOD international conference on management of data, Paris, pp 563–574

    Google Scholar 

  2. Alwarsh M, Kresman R (2011) On querying encrypted databases. In: 2011 international conference on security and management, Las Vegas, pp 256–262

    Google Scholar 

  3. Damiani E, De Capitani di Vimercati S, Jajodia S, Paraboschi S, Samarati P (2003) Balancing confidentiality and efficiency in untrusted relational DBMSs. In: 10th ACM conference on computer and communication security, Washington, DC, pp 93–102

    Google Scholar 

  4. Hore B, Mehrotra S, Tsudik G (2004) A privacy-preserving index for range queries. In: 30th international conference on very large databases, Toronto, pp 720–731

    Google Scholar 

  5. Hore B, Mehrotra S, Canim M, Kantarcioglu M (2012) Secure multidimensional range queries over outsourced data. VLDB J 21(3):333–358

    Article  Google Scholar 

  6. Huet B, Chua TS, Hauptmann A (2012) Large-scale multimedia data collections. IEEE MultiMedia 19(3):12–14 (IEEE Computer Society)

    Google Scholar 

  7. Li J, Omiecinski ER (2005) Efficiency and security trade-off in supporting range queries on encrypted databases. In: 19th annual IFIP WG 11.3 working conference on data and applications security, Storrs, CT, pp 69–83

    Google Scholar 

  8. Liu D, Wang S (2012) Programmable order-preserving secure index for encrypted database query. In: 2012 IEEE 5th international conference on cloud computing, Honolulu, pp 502–509

    Google Scholar 

  9. Shannon CE (1948) A mathematical theory of communication. Bell Syst Tech J 27:379–423

    Article  MATH  MathSciNet  Google Scholar 

  10. Smith JR, Döller M, Tous R, Gruhne M, Yoon K, Sano M, Burnett IS (2008) The MPEG query format: unifying access to multimedia retrieval systems. IEEE Multimedia 15(4):82–95

    Article  Google Scholar 

  11. Sun W, Rane S (2012) A distance-sensitive attribute based cryptosystem for privacy-preserving querying. In: 2012 IEEE international conference on multimedia and expo, Melbourne, pp. 386–391

    Google Scholar 

  12. Wang J, Du X, Lu J, Lu W (2010) Bucket-based authentication for outsourced databases. Concurr Comput Pract Experience 22(9):1160–1180

    Google Scholar 

  13. Weis J, Alves-Foss J (2011) Securing database as a service: issues and compromises. IEEE Secur Privacy 9:49–55

    Article  Google Scholar 

  14. Win LL, Thomas T, Emmanuel S (2011) A privacy preserving content distribution mechanism for DRM without trusted third parties. In: 2011 IEEE international conference on multimedia and expo, pp 1–6, Barcelona

    Google Scholar 

  15. Yao Y, Guo H, Sun C (2008) An improved indexing scheme for range queries. In: 2008 international conference on security and management, Las Vegas, pp 397–403

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jong Kwan Lee .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media Dordrecht(Outside the USA)

About this paper

Cite this paper

Raybourn, T., Lee, J.K., Kresman, R. (2013). On Privacy Preserving Encrypted Data Stores. In: Park, J., Ng, JY., Jeong, HY., Waluyo, B. (eds) Multimedia and Ubiquitous Engineering. Lecture Notes in Electrical Engineering, vol 240. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-6738-6_28

Download citation

  • DOI: https://doi.org/10.1007/978-94-007-6738-6_28

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-007-6737-9

  • Online ISBN: 978-94-007-6738-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics