A Novel Secure Scheme for Supporting Complex SQL Queries over Encrypted Databases in Cloud Computing

With the advance of database-as-a-service (DaaS) and cloud computing, increasingly more data owners are motivated to outsource their data to cloud database for great convenience and economic savings. Many encryption schemes have been proposed to process SQL queries over encrypted data in the databas...

Celý popis

Uložené v:
Podrobná bibliografia
Vydané v:Security and communication networks Ročník 2018; číslo 2018; s. 1 - 15
Hlavní autori: Xiang, Yang, Wang, Huaqun, Yang, Geng, Liu, Guoxiu, Dai, Hua
Médium: Journal Article
Jazyk:English
Vydavateľské údaje: Cairo, Egypt Hindawi Publishing Corporation 01.01.2018
Hindawi
John Wiley & Sons, Inc
Predmet:
ISSN:1939-0114, 1939-0122
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Abstract With the advance of database-as-a-service (DaaS) and cloud computing, increasingly more data owners are motivated to outsource their data to cloud database for great convenience and economic savings. Many encryption schemes have been proposed to process SQL queries over encrypted data in the database. In order to obtain the desired data, the SQL queries contain some statements to describe the requirement, e.g., arithmetic and comparison operators (+, -, ×, <, >, and =). However, to support different operators (+, -, ×, <, >, and =) in SQL queries over encrypted data, multiple encryption schemes need to be combined and adjusted to work together. Moreover, repeated encryptions will reduce the efficiency of execution. This paper presents a practical and secure homomorphic order-preserving encryption (FHOPE) scheme, which allows cloud server to perform complex SQL queries that contain different operators (such as addition, multiplication, order comparison, and equality checks) over encrypted data without repeated encryption. These operators are data interoperable, so they can be combined to formulate complex SQL queries. We conduct security analysis and efficiency evaluation of the proposed scheme FHOPE. The experiment results show that, compared with the existing approaches, the FHOPE scheme incurs less overhead on computation and communication. It is suitable for large batch complex SQL queries over encrypted data in cloud environment.
AbstractList With the advance of database-as-a-service (DaaS) and cloud computing, increasingly more data owners are motivated to outsource their data to cloud database for great convenience and economic savings. Many encryption schemes have been proposed to process SQL queries over encrypted data in the database. In order to obtain the desired data, the SQL queries contain some statements to describe the requirement, e.g., arithmetic and comparison operators (+, -, ×, <, >, and =). However, to support different operators (+, -, ×, <, >, and =) in SQL queries over encrypted data, multiple encryption schemes need to be combined and adjusted to work together. Moreover, repeated encryptions will reduce the efficiency of execution. This paper presents a practical and secure homomorphic order-preserving encryption (FHOPE) scheme, which allows cloud server to perform complex SQL queries that contain different operators (such as addition, multiplication, order comparison, and equality checks) over encrypted data without repeated encryption. These operators are data interoperable, so they can be combined to formulate complex SQL queries. We conduct security analysis and efficiency evaluation of the proposed scheme FHOPE. The experiment results show that, compared with the existing approaches, the FHOPE scheme incurs less overhead on computation and communication. It is suitable for large batch complex SQL queries over encrypted data in cloud environment.
With the advance of database-as-a-service (DaaS) and cloud computing, increasingly more data owners are motivated to outsource their data to cloud database for great convenience and economic savings. Many encryption schemes have been proposed to process SQL queries over encrypted data in the database. In order to obtain the desired data, the SQL queries contain some statements to describe the requirement, e.g., arithmetic and comparison operators ( + , - , × , < , > , and = ). However, to support different operators ( + , - , × , < , > , and = ) in SQL queries over encrypted data, multiple encryption schemes need to be combined and adjusted to work together. Moreover, repeated encryptions will reduce the efficiency of execution. This paper presents a practical and secure homomorphic order-preserving encryption (FHOPE) scheme, which allows cloud server to perform complex SQL queries that contain different operators (such as addition, multiplication, order comparison, and equality checks) over encrypted data without repeated encryption. These operators are data interoperable, so they can be combined to formulate complex SQL queries. We conduct security analysis and efficiency evaluation of the proposed scheme FHOPE. The experiment results show that, compared with the existing approaches, the FHOPE scheme incurs less overhead on computation and communication. It is suitable for large batch complex SQL queries over encrypted data in cloud environment.
Author Dai, Hua
Wang, Huaqun
Liu, Guoxiu
Xiang, Yang
Yang, Geng
Author_xml – sequence: 1
  fullname: Xiang, Yang
– sequence: 2
  fullname: Wang, Huaqun
– sequence: 3
  fullname: Yang, Geng
– sequence: 4
  fullname: Liu, Guoxiu
– sequence: 5
  fullname: Dai, Hua
BookMark eNqFkMtLw0AQhxepYFu9eZYFjxq7zzyOpdYHFKVUz2GzO7Fb0mzcJGr_e1NbFATxNAPzfTPDb4B6pSsBoVNKriiVcsQIjUcRj7mk4gD1acKTgFDGet89FUdoUNcrQkIqItFHZowf3BsUeAG69YAXeglrwLnzeNFWlfONLV_wxK2rAj7wYj7D8xa8hRp3lsfTUvtN1YDB16pRmaq7gS3xpHCt-bLarX-MDnNV1HCyr0P0fDN9mtwFs8fb-8l4FmgekiaITB6aUMdMgjIgkwgyCokACpkSCWQ8jxMK3efGUAFECKpZrGWiSMZlxDgfovPd3sq71xbqJl251pfdyZQJKaOYhpHoqMsdpb2raw95Wnm7Vn6TUpJuc0y3Oab7HDuc_cK1bVRjXdl4ZYu_pIudtLSlUe_2vxNnOxo6BnL1Q7NuKmL-CZ5Wjbk
CitedBy_id crossref_primary_10_3390_math11132948
crossref_primary_10_1109_ACCESS_2019_2949782
crossref_primary_10_1109_ACCESS_2021_3117733
crossref_primary_10_1007_s11036_021_01836_z
crossref_primary_10_1109_TSC_2020_3023393
crossref_primary_10_1109_ACCESS_2021_3082139
Cites_doi 10.1109/TC.2015.2498606
10.1016/j.ins.2017.05.004
10.1109/TC.2013.154
10.1109/TPDS.2015.2448095
10.1007/3-540-44670-2_6
10.1016/j.jnca.2014.07.001
10.1109/TSC.2017.2687459
10.1007/978-3-642-01001-9_13
10.1109/TSC.2016.2633260
10.1016/j.knosys.2014.04.010
10.1109/TIFS.2016.2585121
10.1109/TIFS.2016.2520886
10.1109/TIFS.2016.2647222
10.1109/TSC.2014.1
10.1109/TIFS.2015.2435697
10.1002/cpe.2992
10.1109/TIFS.2013.2288131
10.1007/s10623-015-0095-1
10.1016/j.future.2015.11.006
10.1109/TIFS.2017.2675864
ContentType Journal Article
Copyright Copyright © 2018 Guoxiu Liu et al.
Copyright © 2018 Guoxiu Liu et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0
Copyright_xml – notice: Copyright © 2018 Guoxiu Liu et al.
– notice: Copyright © 2018 Guoxiu Liu et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0
DBID ADJCN
AHFXO
RHU
RHW
RHX
AAYXX
CITATION
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
DOI 10.1155/2018/7383514
DatabaseName الدوريات العلمية والإحصائية - e-Marefa Academic and Statistical Periodicals
معرفة - المحتوى العربي الأكاديمي المتكامل - e-Marefa Academic Complete
Hindawi Publishing Complete
Hindawi Publishing Subscription Journals
Hindawi Publishing Open Access
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList
Technology Research Database

CrossRef
Database_xml – sequence: 1
  dbid: RHX
  name: Hindawi Publishing Open Access
  url: http://www.hindawi.com/journals/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1939-0122
Editor Maiorana, Emanuele
Editor_xml – sequence: 1
  givenname: Emanuele
  surname: Maiorana
  fullname: Maiorana, Emanuele
EndPage 15
ExternalDocumentID 10_1155_2018_7383514
1214348
GrantInformation_xml – fundername: National Natural Science Foundation of China
  grantid: 61572263; 61502251; 61502243; 61602263
– fundername: Natural Science Foundation of the Jiangsu Higher Education Institutions of China
  grantid: 14KJB520031; 15KJB520027
– fundername: China Postdoctoral Science Foundation
  grantid: 2016M601859; 2015M581794
– fundername: NUPTSF
  grantid: NY216001
– fundername: Qing Lan Project of Jiangsu Province
– fundername: Natural Science Foundation of Jiangsu Province
  grantid: BK20161516; BK20151511
– fundername: Natural Science Foundation of Anhui Province
  grantid: 1608085MF127
– fundername: Natural Science Foundation of Educational Commission of Anhui Province
  grantid: KJ2016B17; KJ2015B19; KJ2017B15
– fundername: 1311 Talent Plan Foundation of NUPT
GroupedDBID .4S
.DC
05W
0R~
123
24P
31~
3SF
4.4
52U
5DZ
66C
8-1
8UM
AAESR
AAEVG
AAFWJ
AAMMB
AANHP
AAONW
AAZKR
ACBWZ
ACCMX
ACGFO
ACRPL
ACXQS
ACYXJ
ADBBV
ADIZJ
ADJCN
ADMLS
ADNMO
AEFGJ
AEIMD
AENEX
AFBPY
AGQPQ
AGXDD
AHFXO
AIDQK
AIDYY
AJXKR
ALMA_UNASSIGNED_HOLDINGS
AMBMR
ARCSS
ASPBG
ATUGU
AVWKF
AZFZN
AZVAB
BCNDV
BDRZF
BHBCM
BNHUX
BOGZA
BRXPI
CS3
DR2
DU5
EBS
EIS
EJD
F1Z
FEDTE
G-S
GODZA
H13
HVGLF
HZ~
IX1
LH4
LITHE
LW6
MY.
MY~
NNB
O9-
OIG
OK1
P2P
PUEGO
ROL
SUPJJ
TH9
TUS
W99
WBKPD
XV2
1OC
AAJEY
AFKRA
ARAPS
BENPR
BGLVJ
CCPQU
GROUPED_DOAJ
HCIFZ
IAO
ICD
ITC
K7-
PIMPY
RHU
RHW
RHX
AAYXX
ALUQN
CITATION
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c360t-7df6d6c825eade597eb1e94e1eba49eb3f891e061dd14e0441c28c59a0b357233
IEDL.DBID RHX
ISICitedReferencesCount 7
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000438898200001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1939-0114
IngestDate Fri Jul 25 20:52:58 EDT 2025
Sat Nov 29 02:59:30 EST 2025
Tue Nov 18 22:16:02 EST 2025
Sun Jun 02 18:54:25 EDT 2024
Thu Sep 25 15:12:26 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 2018
Language English
License This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
http://creativecommons.org/licenses/by/4.0
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c360t-7df6d6c825eade597eb1e94e1eba49eb3f891e061dd14e0441c28c59a0b357233
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0001-7740-2401
0000-0003-2465-8977
OpenAccessLink https://dx.doi.org/10.1155/2018/7383514
PQID 2455781674
PQPubID 1046363
PageCount 15
ParticipantIDs proquest_journals_2455781674
crossref_primary_10_1155_2018_7383514
crossref_citationtrail_10_1155_2018_7383514
hindawi_primary_10_1155_2018_7383514
emarefa_primary_1214348
PublicationCentury 2000
PublicationDate 2018-01-01
PublicationDateYYYYMMDD 2018-01-01
PublicationDate_xml – month: 01
  year: 2018
  text: 2018-01-01
  day: 01
PublicationDecade 2010
PublicationPlace Cairo, Egypt
PublicationPlace_xml – name: Cairo, Egypt
– name: London
PublicationTitle Security and communication networks
PublicationYear 2018
Publisher Hindawi Publishing Corporation
Hindawi
John Wiley & Sons, Inc
Publisher_xml – name: Hindawi Publishing Corporation
– name: Hindawi
– name: John Wiley & Sons, Inc
References (27) 2001; 2146
25
26
29
(4) 2013
(2) 2011; 2011
(6) 2009; 9
(8) 2016; 99
(39) 2015; 8
31
10
11
14
15
37
38
16
18
19
1
(30) 2015; 9056
5
7
(35) 2011
41
(28) 2012
21
References_xml – ident: 29
  doi: 10.1109/TC.2015.2498606
– volume: 2011
  start-page: 97
  year: 2011
  ident: 2
  publication-title: Foundations of Computer Science IEEE
– ident: 16
  doi: 10.1016/j.ins.2017.05.004
– ident: 18
  doi: 10.1109/TC.2013.154
– volume-title: Approximate common divisors via lattices
  year: 2011
  ident: 35
– ident: 1
  doi: 10.1109/TPDS.2015.2448095
– volume: 2146
  start-page: 51
  volume-title: Cryptography and lattices
  year: 2001
  ident: 27
  doi: 10.1007/3-540-44670-2_6
– ident: 19
  doi: 10.1016/j.jnca.2014.07.001
– ident: 41
  doi: 10.1109/TSC.2017.2687459
– ident: 26
  doi: 10.1007/978-3-642-01001-9_13
– ident: 11
  doi: 10.1109/TSC.2016.2633260
– ident: 38
  doi: 10.1016/j.knosys.2014.04.010
– ident: 25
  doi: 10.1109/TIFS.2016.2585121
– ident: 21
  doi: 10.1109/TIFS.2016.2520886
– ident: 10
  doi: 10.1109/TIFS.2016.2647222
– volume: 8
  start-page: 328
  issue: 2
  year: 2015
  ident: 39
  publication-title: IEEE Transactions on Services Computing
  doi: 10.1109/TSC.2014.1
– volume-title: A note for the ideal order-preserving encryption object and generalized order-preserving encryption
  year: 2012
  ident: 28
– ident: 5
  doi: 10.1109/TIFS.2015.2435697
– ident: 15
  doi: 10.1002/cpe.2992
– volume: 9056
  start-page: 513
  volume-title: Fully homomophic encryption over the integers revisited
  year: 2015
  ident: 30
– volume: 99
  year: 2016
  ident: 8
  publication-title: IEEE Transactions on Dependable and Secure Computing
– ident: 37
  doi: 10.1109/TIFS.2013.2288131
– year: 2013
  ident: 4
– ident: 14
  doi: 10.1007/s10623-015-0095-1
– ident: 31
  doi: 10.1016/j.future.2015.11.006
– ident: 7
  doi: 10.1109/TIFS.2017.2675864
– volume: 9
  start-page: 169
  volume-title: Fully homomorphic encryption using ideal lattices
  year: 2009
  ident: 6
SSID ssj0061474
Score 2.1449432
Snippet With the advance of database-as-a-service (DaaS) and cloud computing, increasingly more data owners are motivated to outsource their data to cloud database for...
SourceID proquest
crossref
hindawi
emarefa
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 1
SubjectTerms Aggregates
Cloud computing
Data encryption
Efficiency
Encryption
Equality
Medical records
Medical research
Multiplication
Onions
Operators
Queries
Query languages
Query processing
Title A Novel Secure Scheme for Supporting Complex SQL Queries over Encrypted Databases in Cloud Computing
URI https://search.emarefa.net/detail/BIM-1214348
https://dx.doi.org/10.1155/2018/7383514
https://www.proquest.com/docview/2455781674
Volume 2018
WOSCitedRecordID wos000438898200001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVWIB
  databaseName: Wiley Online Library Open Access
  customDbUrl:
  eissn: 1939-0122
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0061474
  issn: 1939-0114
  databaseCode: 24P
  dateStart: 20170101
  isFulltext: true
  titleUrlDefault: https://authorservices.wiley.com/open-science/open-access/browse-journals.html
  providerName: Wiley-Blackwell
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT8MwDI5gAgkOiDeDgXKAE6roI2mbI-KhHdA0XtJuVZoHTBodWrcB_x67y3hNCG6tlORgx_bnxPlMyKFOokjkTANyE9xjTAVensQcDE9aa5nIpakeCl8lrVba6Yi2I0kqZ6_wIdpBeh6kJwlkUhwbVs-nHDfvTbMzdbgQYBJ3eYylPwGb1rf_mPst8iyaJwkfEI4WHzH5fenOOOMqwlyukhUHDenpRJdrZM4U62T5C2HgBtGntNUfmx6tjskNvQWRPxkKwJNie84-UgI8ULTxnnmlt9dX9HqETMYlxUpNelGowdszYEx6LocSA1hJuwU96_VHmk76O8D8TXJ_eXF31vRcnwRPRbE_9BJtYx0ryPWw-hkyBPC_RjATmFwyAdmyTUVgQE5aB8z4AIBUmCoupJ9HPAmjaIvUin5hdgiNLeAtX_nayhwJQqW0SjAbI-uNAkXWyfFUhplyJOLYy6KXVckE5xlKPHMSr5Ojj9HPE_KMX8ZtO3V8DgsByLG0Tg6dev5YoDHVXeZssMxCxsEd4SuL3f-tskeW8HdywNIgteFgZPbJghoPu-XggMyHrH1Q7bx3Di_Ocw
linkProvider Hindawi Publishing
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Novel+Secure+Scheme+for+Supporting+Complex+SQL+Queries+over+Encrypted+Databases+in+Cloud+Computing&rft.jtitle=Security+and+communication+networks&rft.au=Liu%2C+Guoxiu&rft.au=Yang%2C+Geng&rft.au=Wang%2C+Huaqun&rft.au=Yang%2C+Xiang&rft.date=2018-01-01&rft.pub=John+Wiley+%26+Sons%2C+Inc&rft.issn=1939-0114&rft.eissn=1939-0122&rft.volume=2018&rft_id=info:doi/10.1155%2F2018%2F7383514&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1939-0114&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1939-0114&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1939-0114&client=summon