A Novel Secure Scheme for Supporting Complex SQL Queries over Encrypted Databases in Cloud Computing
With the advance of database-as-a-service (DaaS) and cloud computing, increasingly more data owners are motivated to outsource their data to cloud database for great convenience and economic savings. Many encryption schemes have been proposed to process SQL queries over encrypted data in the databas...
Uložené v:
| Vydané v: | Security and communication networks Ročník 2018; číslo 2018; s. 1 - 15 |
|---|---|
| Hlavní autori: | , , , , |
| Médium: | Journal Article |
| Jazyk: | English |
| Vydavateľské údaje: |
Cairo, Egypt
Hindawi Publishing Corporation
01.01.2018
Hindawi John Wiley & Sons, Inc |
| Predmet: | |
| ISSN: | 1939-0114, 1939-0122 |
| On-line prístup: | Získať plný text |
| Tagy: |
Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
|
| Abstract | With the advance of database-as-a-service (DaaS) and cloud computing, increasingly more data owners are motivated to outsource their data to cloud database for great convenience and economic savings. Many encryption schemes have been proposed to process SQL queries over encrypted data in the database. In order to obtain the desired data, the SQL queries contain some statements to describe the requirement, e.g., arithmetic and comparison operators (+, -, ×, <, >, and =). However, to support different operators (+, -, ×, <, >, and =) in SQL queries over encrypted data, multiple encryption schemes need to be combined and adjusted to work together. Moreover, repeated encryptions will reduce the efficiency of execution. This paper presents a practical and secure homomorphic order-preserving encryption (FHOPE) scheme, which allows cloud server to perform complex SQL queries that contain different operators (such as addition, multiplication, order comparison, and equality checks) over encrypted data without repeated encryption. These operators are data interoperable, so they can be combined to formulate complex SQL queries. We conduct security analysis and efficiency evaluation of the proposed scheme FHOPE. The experiment results show that, compared with the existing approaches, the FHOPE scheme incurs less overhead on computation and communication. It is suitable for large batch complex SQL queries over encrypted data in cloud environment. |
|---|---|
| AbstractList | With the advance of database-as-a-service (DaaS) and cloud computing, increasingly more data owners are motivated to outsource their data to cloud database for great convenience and economic savings. Many encryption schemes have been proposed to process SQL queries over encrypted data in the database. In order to obtain the desired data, the SQL queries contain some statements to describe the requirement, e.g., arithmetic and comparison operators (+, -, ×, <, >, and =). However, to support different operators (+, -, ×, <, >, and =) in SQL queries over encrypted data, multiple encryption schemes need to be combined and adjusted to work together. Moreover, repeated encryptions will reduce the efficiency of execution. This paper presents a practical and secure homomorphic order-preserving encryption (FHOPE) scheme, which allows cloud server to perform complex SQL queries that contain different operators (such as addition, multiplication, order comparison, and equality checks) over encrypted data without repeated encryption. These operators are data interoperable, so they can be combined to formulate complex SQL queries. We conduct security analysis and efficiency evaluation of the proposed scheme FHOPE. The experiment results show that, compared with the existing approaches, the FHOPE scheme incurs less overhead on computation and communication. It is suitable for large batch complex SQL queries over encrypted data in cloud environment. With the advance of database-as-a-service (DaaS) and cloud computing, increasingly more data owners are motivated to outsource their data to cloud database for great convenience and economic savings. Many encryption schemes have been proposed to process SQL queries over encrypted data in the database. In order to obtain the desired data, the SQL queries contain some statements to describe the requirement, e.g., arithmetic and comparison operators ( + , - , × , < , > , and = ). However, to support different operators ( + , - , × , < , > , and = ) in SQL queries over encrypted data, multiple encryption schemes need to be combined and adjusted to work together. Moreover, repeated encryptions will reduce the efficiency of execution. This paper presents a practical and secure homomorphic order-preserving encryption (FHOPE) scheme, which allows cloud server to perform complex SQL queries that contain different operators (such as addition, multiplication, order comparison, and equality checks) over encrypted data without repeated encryption. These operators are data interoperable, so they can be combined to formulate complex SQL queries. We conduct security analysis and efficiency evaluation of the proposed scheme FHOPE. The experiment results show that, compared with the existing approaches, the FHOPE scheme incurs less overhead on computation and communication. It is suitable for large batch complex SQL queries over encrypted data in cloud environment. |
| Author | Dai, Hua Wang, Huaqun Liu, Guoxiu Xiang, Yang Yang, Geng |
| Author_xml | – sequence: 1 fullname: Xiang, Yang – sequence: 2 fullname: Wang, Huaqun – sequence: 3 fullname: Yang, Geng – sequence: 4 fullname: Liu, Guoxiu – sequence: 5 fullname: Dai, Hua |
| BookMark | eNqFkMtLw0AQhxepYFu9eZYFjxq7zzyOpdYHFKVUz2GzO7Fb0mzcJGr_e1NbFATxNAPzfTPDb4B6pSsBoVNKriiVcsQIjUcRj7mk4gD1acKTgFDGet89FUdoUNcrQkIqItFHZowf3BsUeAG69YAXeglrwLnzeNFWlfONLV_wxK2rAj7wYj7D8xa8hRp3lsfTUvtN1YDB16pRmaq7gS3xpHCt-bLarX-MDnNV1HCyr0P0fDN9mtwFs8fb-8l4FmgekiaITB6aUMdMgjIgkwgyCokACpkSCWQ8jxMK3efGUAFECKpZrGWiSMZlxDgfovPd3sq71xbqJl251pfdyZQJKaOYhpHoqMsdpb2raw95Wnm7Vn6TUpJuc0y3Oab7HDuc_cK1bVRjXdl4ZYu_pIudtLSlUe_2vxNnOxo6BnL1Q7NuKmL-CZ5Wjbk |
| CitedBy_id | crossref_primary_10_3390_math11132948 crossref_primary_10_1109_ACCESS_2019_2949782 crossref_primary_10_1109_ACCESS_2021_3117733 crossref_primary_10_1007_s11036_021_01836_z crossref_primary_10_1109_TSC_2020_3023393 crossref_primary_10_1109_ACCESS_2021_3082139 |
| Cites_doi | 10.1109/TC.2015.2498606 10.1016/j.ins.2017.05.004 10.1109/TC.2013.154 10.1109/TPDS.2015.2448095 10.1007/3-540-44670-2_6 10.1016/j.jnca.2014.07.001 10.1109/TSC.2017.2687459 10.1007/978-3-642-01001-9_13 10.1109/TSC.2016.2633260 10.1016/j.knosys.2014.04.010 10.1109/TIFS.2016.2585121 10.1109/TIFS.2016.2520886 10.1109/TIFS.2016.2647222 10.1109/TSC.2014.1 10.1109/TIFS.2015.2435697 10.1002/cpe.2992 10.1109/TIFS.2013.2288131 10.1007/s10623-015-0095-1 10.1016/j.future.2015.11.006 10.1109/TIFS.2017.2675864 |
| ContentType | Journal Article |
| Copyright | Copyright © 2018 Guoxiu Liu et al. Copyright © 2018 Guoxiu Liu et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0 |
| Copyright_xml | – notice: Copyright © 2018 Guoxiu Liu et al. – notice: Copyright © 2018 Guoxiu Liu et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0 |
| DBID | ADJCN AHFXO RHU RHW RHX AAYXX CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D |
| DOI | 10.1155/2018/7383514 |
| DatabaseName | الدوريات العلمية والإحصائية - e-Marefa Academic and Statistical Periodicals معرفة - المحتوى العربي الأكاديمي المتكامل - e-Marefa Academic Complete Hindawi Publishing Complete Hindawi Publishing Subscription Journals Hindawi Publishing Open Access CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
| DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | Technology Research Database CrossRef |
| Database_xml | – sequence: 1 dbid: RHX name: Hindawi Publishing Open Access url: http://www.hindawi.com/journals/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 1939-0122 |
| Editor | Maiorana, Emanuele |
| Editor_xml | – sequence: 1 givenname: Emanuele surname: Maiorana fullname: Maiorana, Emanuele |
| EndPage | 15 |
| ExternalDocumentID | 10_1155_2018_7383514 1214348 |
| GrantInformation_xml | – fundername: National Natural Science Foundation of China grantid: 61572263; 61502251; 61502243; 61602263 – fundername: Natural Science Foundation of the Jiangsu Higher Education Institutions of China grantid: 14KJB520031; 15KJB520027 – fundername: China Postdoctoral Science Foundation grantid: 2016M601859; 2015M581794 – fundername: NUPTSF grantid: NY216001 – fundername: Qing Lan Project of Jiangsu Province – fundername: Natural Science Foundation of Jiangsu Province grantid: BK20161516; BK20151511 – fundername: Natural Science Foundation of Anhui Province grantid: 1608085MF127 – fundername: Natural Science Foundation of Educational Commission of Anhui Province grantid: KJ2016B17; KJ2015B19; KJ2017B15 – fundername: 1311 Talent Plan Foundation of NUPT |
| GroupedDBID | .4S .DC 05W 0R~ 123 24P 31~ 3SF 4.4 52U 5DZ 66C 8-1 8UM AAESR AAEVG AAFWJ AAMMB AANHP AAONW AAZKR ACBWZ ACCMX ACGFO ACRPL ACXQS ACYXJ ADBBV ADIZJ ADJCN ADMLS ADNMO AEFGJ AEIMD AENEX AFBPY AGQPQ AGXDD AHFXO AIDQK AIDYY AJXKR ALMA_UNASSIGNED_HOLDINGS AMBMR ARCSS ASPBG ATUGU AVWKF AZFZN AZVAB BCNDV BDRZF BHBCM BNHUX BOGZA BRXPI CS3 DR2 DU5 EBS EIS EJD F1Z FEDTE G-S GODZA H13 HVGLF HZ~ IX1 LH4 LITHE LW6 MY. MY~ NNB O9- OIG OK1 P2P PUEGO ROL SUPJJ TH9 TUS W99 WBKPD XV2 1OC AAJEY AFKRA ARAPS BENPR BGLVJ CCPQU GROUPED_DOAJ HCIFZ IAO ICD ITC K7- PIMPY RHU RHW RHX AAYXX ALUQN CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D |
| ID | FETCH-LOGICAL-c360t-7df6d6c825eade597eb1e94e1eba49eb3f891e061dd14e0441c28c59a0b357233 |
| IEDL.DBID | RHX |
| ISICitedReferencesCount | 7 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000438898200001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1939-0114 |
| IngestDate | Fri Jul 25 20:52:58 EDT 2025 Sat Nov 29 02:59:30 EST 2025 Tue Nov 18 22:16:02 EST 2025 Sun Jun 02 18:54:25 EDT 2024 Thu Sep 25 15:12:26 EDT 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 2018 |
| Language | English |
| License | This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. http://creativecommons.org/licenses/by/4.0 |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c360t-7df6d6c825eade597eb1e94e1eba49eb3f891e061dd14e0441c28c59a0b357233 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0001-7740-2401 0000-0003-2465-8977 |
| OpenAccessLink | https://dx.doi.org/10.1155/2018/7383514 |
| PQID | 2455781674 |
| PQPubID | 1046363 |
| PageCount | 15 |
| ParticipantIDs | proquest_journals_2455781674 crossref_primary_10_1155_2018_7383514 crossref_citationtrail_10_1155_2018_7383514 hindawi_primary_10_1155_2018_7383514 emarefa_primary_1214348 |
| PublicationCentury | 2000 |
| PublicationDate | 2018-01-01 |
| PublicationDateYYYYMMDD | 2018-01-01 |
| PublicationDate_xml | – month: 01 year: 2018 text: 2018-01-01 day: 01 |
| PublicationDecade | 2010 |
| PublicationPlace | Cairo, Egypt |
| PublicationPlace_xml | – name: Cairo, Egypt – name: London |
| PublicationTitle | Security and communication networks |
| PublicationYear | 2018 |
| Publisher | Hindawi Publishing Corporation Hindawi John Wiley & Sons, Inc |
| Publisher_xml | – name: Hindawi Publishing Corporation – name: Hindawi – name: John Wiley & Sons, Inc |
| References | (27) 2001; 2146 25 26 29 (4) 2013 (2) 2011; 2011 (6) 2009; 9 (8) 2016; 99 (39) 2015; 8 31 10 11 14 15 37 38 16 18 19 1 (30) 2015; 9056 5 7 (35) 2011 41 (28) 2012 21 |
| References_xml | – ident: 29 doi: 10.1109/TC.2015.2498606 – volume: 2011 start-page: 97 year: 2011 ident: 2 publication-title: Foundations of Computer Science IEEE – ident: 16 doi: 10.1016/j.ins.2017.05.004 – ident: 18 doi: 10.1109/TC.2013.154 – volume-title: Approximate common divisors via lattices year: 2011 ident: 35 – ident: 1 doi: 10.1109/TPDS.2015.2448095 – volume: 2146 start-page: 51 volume-title: Cryptography and lattices year: 2001 ident: 27 doi: 10.1007/3-540-44670-2_6 – ident: 19 doi: 10.1016/j.jnca.2014.07.001 – ident: 41 doi: 10.1109/TSC.2017.2687459 – ident: 26 doi: 10.1007/978-3-642-01001-9_13 – ident: 11 doi: 10.1109/TSC.2016.2633260 – ident: 38 doi: 10.1016/j.knosys.2014.04.010 – ident: 25 doi: 10.1109/TIFS.2016.2585121 – ident: 21 doi: 10.1109/TIFS.2016.2520886 – ident: 10 doi: 10.1109/TIFS.2016.2647222 – volume: 8 start-page: 328 issue: 2 year: 2015 ident: 39 publication-title: IEEE Transactions on Services Computing doi: 10.1109/TSC.2014.1 – volume-title: A note for the ideal order-preserving encryption object and generalized order-preserving encryption year: 2012 ident: 28 – ident: 5 doi: 10.1109/TIFS.2015.2435697 – ident: 15 doi: 10.1002/cpe.2992 – volume: 9056 start-page: 513 volume-title: Fully homomophic encryption over the integers revisited year: 2015 ident: 30 – volume: 99 year: 2016 ident: 8 publication-title: IEEE Transactions on Dependable and Secure Computing – ident: 37 doi: 10.1109/TIFS.2013.2288131 – year: 2013 ident: 4 – ident: 14 doi: 10.1007/s10623-015-0095-1 – ident: 31 doi: 10.1016/j.future.2015.11.006 – ident: 7 doi: 10.1109/TIFS.2017.2675864 – volume: 9 start-page: 169 volume-title: Fully homomorphic encryption using ideal lattices year: 2009 ident: 6 |
| SSID | ssj0061474 |
| Score | 2.1449432 |
| Snippet | With the advance of database-as-a-service (DaaS) and cloud computing, increasingly more data owners are motivated to outsource their data to cloud database for... |
| SourceID | proquest crossref hindawi emarefa |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 1 |
| SubjectTerms | Aggregates Cloud computing Data encryption Efficiency Encryption Equality Medical records Medical research Multiplication Onions Operators Queries Query languages Query processing |
| Title | A Novel Secure Scheme for Supporting Complex SQL Queries over Encrypted Databases in Cloud Computing |
| URI | https://search.emarefa.net/detail/BIM-1214348 https://dx.doi.org/10.1155/2018/7383514 https://www.proquest.com/docview/2455781674 |
| Volume | 2018 |
| WOSCitedRecordID | wos000438898200001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVWIB databaseName: Wiley Online Library Open Access customDbUrl: eissn: 1939-0122 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0061474 issn: 1939-0114 databaseCode: 24P dateStart: 20170101 isFulltext: true titleUrlDefault: https://authorservices.wiley.com/open-science/open-access/browse-journals.html providerName: Wiley-Blackwell |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT8MwDI5gAgkOiDeDgXKAE6roI2mbI-KhHdA0XtJuVZoHTBodWrcB_x67y3hNCG6tlORgx_bnxPlMyKFOokjkTANyE9xjTAVensQcDE9aa5nIpakeCl8lrVba6Yi2I0kqZ6_wIdpBeh6kJwlkUhwbVs-nHDfvTbMzdbgQYBJ3eYylPwGb1rf_mPst8iyaJwkfEI4WHzH5fenOOOMqwlyukhUHDenpRJdrZM4U62T5C2HgBtGntNUfmx6tjskNvQWRPxkKwJNie84-UgI8ULTxnnmlt9dX9HqETMYlxUpNelGowdszYEx6LocSA1hJuwU96_VHmk76O8D8TXJ_eXF31vRcnwRPRbE_9BJtYx0ryPWw-hkyBPC_RjATmFwyAdmyTUVgQE5aB8z4AIBUmCoupJ9HPAmjaIvUin5hdgiNLeAtX_nayhwJQqW0SjAbI-uNAkXWyfFUhplyJOLYy6KXVckE5xlKPHMSr5Ojj9HPE_KMX8ZtO3V8DgsByLG0Tg6dev5YoDHVXeZssMxCxsEd4SuL3f-tskeW8HdywNIgteFgZPbJghoPu-XggMyHrH1Q7bx3Di_Ocw |
| linkProvider | Hindawi Publishing |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Novel+Secure+Scheme+for+Supporting+Complex+SQL+Queries+over+Encrypted+Databases+in+Cloud+Computing&rft.jtitle=Security+and+communication+networks&rft.au=Liu%2C+Guoxiu&rft.au=Yang%2C+Geng&rft.au=Wang%2C+Huaqun&rft.au=Yang%2C+Xiang&rft.date=2018-01-01&rft.pub=John+Wiley+%26+Sons%2C+Inc&rft.issn=1939-0114&rft.eissn=1939-0122&rft.volume=2018&rft_id=info:doi/10.1155%2F2018%2F7383514&rft.externalDBID=NO_FULL_TEXT |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1939-0114&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1939-0114&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1939-0114&client=summon |