Security and Privacy in New Computing Environments. Second EAI International Conference, SPNCE 2019, Tianjin, China, April 13–14, 2019, Proceedings

Research Article

An Effective Encryption Scheme on Outsourcing Data for Query on Cloud Platform

Download
42 downloads
  • @INPROCEEDINGS{10.1007/978-3-030-21373-2_24,
        author={Jianchao Tang and Shaojing Fu and Ming Xu},
        title={An Effective Encryption Scheme on Outsourcing Data for Query on Cloud Platform},
        proceedings={Security and Privacy in New Computing Environments. Second EAI International Conference, SPNCE 2019, Tianjin, China, April 13--14, 2019, Proceedings},
        proceedings_a={SPNCE},
        year={2019},
        month={6},
        keywords={Cloud platform Encrypted database Possible queries Double AES encryption Neighbor rows exchange},
        doi={10.1007/978-3-030-21373-2_24}
    }
    
  • Jianchao Tang
    Shaojing Fu
    Ming Xu
    Year: 2019
    An Effective Encryption Scheme on Outsourcing Data for Query on Cloud Platform
    SPNCE
    Springer
    DOI: 10.1007/978-3-030-21373-2_24
Jianchao Tang1,*, Shaojing Fu, Ming Xu1
  • 1: National University Of Defense Technology
*Contact email: tangjianchao14@nudt.edu.cn

Abstract

Outsourcing encrypted data to cloud platforms is widely adopted by users, but there are some problems existing in it: one is that encrypted databases only provide limited types of queries for users. Meanwhile, in the deterministic encryption, users’ encrypted data is subject to the frequency attack easily. Besides, users’ data privacy is disclosed to cloud platforms when their data is updated. To address these problems, in this paper, we propose an effective encryption scheme on outsourcing data for query on cloud platforms. In our scheme, users’ data is encrypted according to all possible queries to meet users’ diverse query demands. Furthermore, a double AES encryption method is adopted to cope with the frequency attack existing in deterministic encryption. To protect users’ privacy when their data is updated, a neighbor rows exchange method is designed in our scheme. The theoretical analysis and comparative experiments demonstrate the effectiveness of our scheme.