About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Security and Privacy in New Computing Environments. Second EAI International Conference, SPNCE 2019, Tianjin, China, April 13–14, 2019, Proceedings

Research Article

An Effective Encryption Scheme on Outsourcing Data for Query on Cloud Platform

Download(Requires a free EAI acccount)
120 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-030-21373-2_24,
        author={Jianchao Tang and Shaojing Fu and Ming Xu},
        title={An Effective Encryption Scheme on Outsourcing Data for Query on Cloud Platform},
        proceedings={Security and Privacy in New Computing Environments. Second EAI International Conference, SPNCE 2019, Tianjin, China, April 13--14, 2019, Proceedings},
        proceedings_a={SPNCE},
        year={2019},
        month={6},
        keywords={Cloud platform Encrypted database Possible queries Double AES encryption Neighbor rows exchange},
        doi={10.1007/978-3-030-21373-2_24}
    }
    
  • Jianchao Tang
    Shaojing Fu
    Ming Xu
    Year: 2019
    An Effective Encryption Scheme on Outsourcing Data for Query on Cloud Platform
    SPNCE
    Springer
    DOI: 10.1007/978-3-030-21373-2_24
Jianchao Tang1,*, Shaojing Fu, Ming Xu1
  • 1: National University Of Defense Technology
*Contact email: tangjianchao14@nudt.edu.cn

Abstract

Outsourcing encrypted data to cloud platforms is widely adopted by users, but there are some problems existing in it: one is that encrypted databases only provide limited types of queries for users. Meanwhile, in the deterministic encryption, users’ encrypted data is subject to the frequency attack easily. Besides, users’ data privacy is disclosed to cloud platforms when their data is updated. To address these problems, in this paper, we propose an effective encryption scheme on outsourcing data for query on cloud platforms. In our scheme, users’ data is encrypted according to all possible queries to meet users’ diverse query demands. Furthermore, a double AES encryption method is adopted to cope with the frequency attack existing in deterministic encryption. To protect users’ privacy when their data is updated, a neighbor rows exchange method is designed in our scheme. The theoretical analysis and comparative experiments demonstrate the effectiveness of our scheme.

Keywords
Cloud platform Encrypted database Possible queries Double AES encryption Neighbor rows exchange
Published
2019-06-10
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-030-21373-2_24
Copyright © 2019–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL