Loading…

Search Condition-Hiding Query Evaluation on Encrypted Databases

Private database query (PDQ) is a protocol between a client and a database server, designed for processing queries to encrypted databases. Specifically, PDQ enables a client to submit a search query and to learn a resulting set satisfying its search condition, without revealing sensitive information...

Full description

Saved in:
Bibliographic Details
Published in:IEEE access 2019, Vol.7, p.161283-161295
Main Authors: Kim, Myungsun, Lee, Hyung Tae, Ling, San, Ren, Shu Qin, Tan, Benjamin Hong Meng, WANG, Huaxiong
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c474t-cbc51ef1bcfa0e0ec2c8997864a0d6b090ca9aa3d61e5a2b5b2c29200fd63f43
cites cdi_FETCH-LOGICAL-c474t-cbc51ef1bcfa0e0ec2c8997864a0d6b090ca9aa3d61e5a2b5b2c29200fd63f43
container_end_page 161295
container_issue
container_start_page 161283
container_title IEEE access
container_volume 7
creator Kim, Myungsun
Lee, Hyung Tae
Ling, San
Ren, Shu Qin
Tan, Benjamin Hong Meng
WANG, Huaxiong
description Private database query (PDQ) is a protocol between a client and a database server, designed for processing queries to encrypted databases. Specifically, PDQ enables a client to submit a search query and to learn a resulting set satisfying its search condition, without revealing sensitive information about a query statement. The whole query can be protected from the server, but for efficiency reasons known PDQ solutions generally consider to hide the constants only in a query statement. In this paper, we provide two fully homomorphic encryption (FHE)-based PDQ protocols that hide type of queries as well as the constants of a query statement. Particularly, our constructions focus on conjunctive, disjunctive, and threshold conjunctive queries. To this end, we first build a single compact logical expression to cover both conjunctive and disjunctive queries. On top of the logical expression, we design a PDQ protocol that enables to evaluate conjunctive and disjunctive queries without revealing any information on a given query. The second PDQ protocol comes from our observation that if a threshold conjunctive query has a particular threshold value, it results in either a conjunctive query or a disjunctive query. Because the PDQ protocol writes the three types of queries into a single polynomial expression, the resulting protocol can evaluate the three types of query statements without revealing any information on queries. To demonstrate their efficiency, we provide proof-of-concept implementation results of our proposed PDQ protocols. According to our rudimentary experiments, it takes 37.57 seconds to perform a query on 316 elements consisting of 16 attributes of 64 bits using Brakerski-Gentry-Vaikuntanathan's leveled FHE with SIMD techniques for 149-bit security, yielding an amortized rate of just 0.119 seconds per element
doi_str_mv 10.1109/ACCESS.2019.2951695
format article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2455610093</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>8891605</ieee_id><doaj_id>oai_doaj_org_article_a284e7ed37aa4eb599a18787d00c53ee</doaj_id><sourcerecordid>2455610093</sourcerecordid><originalsourceid>FETCH-LOGICAL-c474t-cbc51ef1bcfa0e0ec2c8997864a0d6b090ca9aa3d61e5a2b5b2c29200fd63f43</originalsourceid><addsrcrecordid>eNpNUNFKw0AQDKJgqf2CvgR8Tt27yyW5Jykx2kJBpH0_NnebmlKTekmE_r2JKcVlYZdhZnYZz5szWDAG6mmZptl2u-DA1IIrySIlb7wJ72cgpIhu_-333qxpDtBXMtDiife8JXTm00_rypZtWVfBqrRltfc_OnJnP_vBY4cD7vedVcadTy1Z_wVbzLGh5sG7K_DY0Owyp97uNdulq2Dz_rZOl5vAhHHYBiY3klHBclMgEJDhJlEqTqIQwUY5KDCoEIWNGEnkucy54YoDFDYSRSim3nq0tTUe9MmVX-jOusZS_wG122t0bWmOpJEnIcVkRYwYUi6VQpbESWwBjBREvdfj6HVy9XdHTasPdeeq_nvNQykjBqBEzxIjy7i6aRwV16sM9JC7HnPXQ-76knuvmo-qkoiuiiRRLAIpfgGynX5Y</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2455610093</pqid></control><display><type>article</type><title>Search Condition-Hiding Query Evaluation on Encrypted Databases</title><source>IEEE Xplore Open Access Journals</source><creator>Kim, Myungsun ; Lee, Hyung Tae ; Ling, San ; Ren, Shu Qin ; Tan, Benjamin Hong Meng ; WANG, Huaxiong</creator><creatorcontrib>Kim, Myungsun ; Lee, Hyung Tae ; Ling, San ; Ren, Shu Qin ; Tan, Benjamin Hong Meng ; WANG, Huaxiong</creatorcontrib><description>Private database query (PDQ) is a protocol between a client and a database server, designed for processing queries to encrypted databases. Specifically, PDQ enables a client to submit a search query and to learn a resulting set satisfying its search condition, without revealing sensitive information about a query statement. The whole query can be protected from the server, but for efficiency reasons known PDQ solutions generally consider to hide the constants only in a query statement. In this paper, we provide two fully homomorphic encryption (FHE)-based PDQ protocols that hide type of queries as well as the constants of a query statement. Particularly, our constructions focus on conjunctive, disjunctive, and threshold conjunctive queries. To this end, we first build a single compact logical expression to cover both conjunctive and disjunctive queries. On top of the logical expression, we design a PDQ protocol that enables to evaluate conjunctive and disjunctive queries without revealing any information on a given query. The second PDQ protocol comes from our observation that if a threshold conjunctive query has a particular threshold value, it results in either a conjunctive query or a disjunctive query. Because the PDQ protocol writes the three types of queries into a single polynomial expression, the resulting protocol can evaluate the three types of query statements without revealing any information on queries. To demonstrate their efficiency, we provide proof-of-concept implementation results of our proposed PDQ protocols. According to our rudimentary experiments, it takes 37.57 seconds to perform a query on 316 elements consisting of 16 attributes of 64 bits using Brakerski-Gentry-Vaikuntanathan's leveled FHE with SIMD techniques for 149-bit security, yielding an amortized rate of just 0.119 seconds per element</description><identifier>ISSN: 2169-3536</identifier><identifier>EISSN: 2169-3536</identifier><identifier>DOI: 10.1109/ACCESS.2019.2951695</identifier><identifier>CODEN: IAECCG</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Cloud computing ; Encrypted database ; Encryption ; homomorphic encryption ; Polynomials ; Privacy ; private queries ; Protocol ; Protocols ; Queries ; Query processing ; Searching ; Servers</subject><ispartof>IEEE access, 2019, Vol.7, p.161283-161295</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2019</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c474t-cbc51ef1bcfa0e0ec2c8997864a0d6b090ca9aa3d61e5a2b5b2c29200fd63f43</citedby><cites>FETCH-LOGICAL-c474t-cbc51ef1bcfa0e0ec2c8997864a0d6b090ca9aa3d61e5a2b5b2c29200fd63f43</cites><orcidid>0000-0002-0461-3053 ; 0000-0002-0920-2026 ; 0000-0002-8629-9052</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/8891605$$EHTML$$P50$$Gieee$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,4024,27633,27923,27924,27925,54933</link.rule.ids></links><search><creatorcontrib>Kim, Myungsun</creatorcontrib><creatorcontrib>Lee, Hyung Tae</creatorcontrib><creatorcontrib>Ling, San</creatorcontrib><creatorcontrib>Ren, Shu Qin</creatorcontrib><creatorcontrib>Tan, Benjamin Hong Meng</creatorcontrib><creatorcontrib>WANG, Huaxiong</creatorcontrib><title>Search Condition-Hiding Query Evaluation on Encrypted Databases</title><title>IEEE access</title><addtitle>Access</addtitle><description>Private database query (PDQ) is a protocol between a client and a database server, designed for processing queries to encrypted databases. Specifically, PDQ enables a client to submit a search query and to learn a resulting set satisfying its search condition, without revealing sensitive information about a query statement. The whole query can be protected from the server, but for efficiency reasons known PDQ solutions generally consider to hide the constants only in a query statement. In this paper, we provide two fully homomorphic encryption (FHE)-based PDQ protocols that hide type of queries as well as the constants of a query statement. Particularly, our constructions focus on conjunctive, disjunctive, and threshold conjunctive queries. To this end, we first build a single compact logical expression to cover both conjunctive and disjunctive queries. On top of the logical expression, we design a PDQ protocol that enables to evaluate conjunctive and disjunctive queries without revealing any information on a given query. The second PDQ protocol comes from our observation that if a threshold conjunctive query has a particular threshold value, it results in either a conjunctive query or a disjunctive query. Because the PDQ protocol writes the three types of queries into a single polynomial expression, the resulting protocol can evaluate the three types of query statements without revealing any information on queries. To demonstrate their efficiency, we provide proof-of-concept implementation results of our proposed PDQ protocols. According to our rudimentary experiments, it takes 37.57 seconds to perform a query on 316 elements consisting of 16 attributes of 64 bits using Brakerski-Gentry-Vaikuntanathan's leveled FHE with SIMD techniques for 149-bit security, yielding an amortized rate of just 0.119 seconds per element</description><subject>Cloud computing</subject><subject>Encrypted database</subject><subject>Encryption</subject><subject>homomorphic encryption</subject><subject>Polynomials</subject><subject>Privacy</subject><subject>private queries</subject><subject>Protocol</subject><subject>Protocols</subject><subject>Queries</subject><subject>Query processing</subject><subject>Searching</subject><subject>Servers</subject><issn>2169-3536</issn><issn>2169-3536</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><sourceid>ESBDL</sourceid><sourceid>DOA</sourceid><recordid>eNpNUNFKw0AQDKJgqf2CvgR8Tt27yyW5Jykx2kJBpH0_NnebmlKTekmE_r2JKcVlYZdhZnYZz5szWDAG6mmZptl2u-DA1IIrySIlb7wJ72cgpIhu_-333qxpDtBXMtDiife8JXTm00_rypZtWVfBqrRltfc_OnJnP_vBY4cD7vedVcadTy1Z_wVbzLGh5sG7K_DY0Owyp97uNdulq2Dz_rZOl5vAhHHYBiY3klHBclMgEJDhJlEqTqIQwUY5KDCoEIWNGEnkucy54YoDFDYSRSim3nq0tTUe9MmVX-jOusZS_wG122t0bWmOpJEnIcVkRYwYUi6VQpbESWwBjBREvdfj6HVy9XdHTasPdeeq_nvNQykjBqBEzxIjy7i6aRwV16sM9JC7HnPXQ-76knuvmo-qkoiuiiRRLAIpfgGynX5Y</recordid><startdate>2019</startdate><enddate>2019</enddate><creator>Kim, Myungsun</creator><creator>Lee, Hyung Tae</creator><creator>Ling, San</creator><creator>Ren, Shu Qin</creator><creator>Tan, Benjamin Hong Meng</creator><creator>WANG, Huaxiong</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>ESBDL</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7SR</scope><scope>8BQ</scope><scope>8FD</scope><scope>JG9</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0002-0461-3053</orcidid><orcidid>https://orcid.org/0000-0002-0920-2026</orcidid><orcidid>https://orcid.org/0000-0002-8629-9052</orcidid></search><sort><creationdate>2019</creationdate><title>Search Condition-Hiding Query Evaluation on Encrypted Databases</title><author>Kim, Myungsun ; Lee, Hyung Tae ; Ling, San ; Ren, Shu Qin ; Tan, Benjamin Hong Meng ; WANG, Huaxiong</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c474t-cbc51ef1bcfa0e0ec2c8997864a0d6b090ca9aa3d61e5a2b5b2c29200fd63f43</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Cloud computing</topic><topic>Encrypted database</topic><topic>Encryption</topic><topic>homomorphic encryption</topic><topic>Polynomials</topic><topic>Privacy</topic><topic>private queries</topic><topic>Protocol</topic><topic>Protocols</topic><topic>Queries</topic><topic>Query processing</topic><topic>Searching</topic><topic>Servers</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Kim, Myungsun</creatorcontrib><creatorcontrib>Lee, Hyung Tae</creatorcontrib><creatorcontrib>Ling, San</creatorcontrib><creatorcontrib>Ren, Shu Qin</creatorcontrib><creatorcontrib>Tan, Benjamin Hong Meng</creatorcontrib><creatorcontrib>WANG, Huaxiong</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE Xplore Open Access Journals</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Xplore (Online service)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Engineered Materials Abstracts</collection><collection>METADEX</collection><collection>Technology Research Database</collection><collection>Materials Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>IEEE access</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Kim, Myungsun</au><au>Lee, Hyung Tae</au><au>Ling, San</au><au>Ren, Shu Qin</au><au>Tan, Benjamin Hong Meng</au><au>WANG, Huaxiong</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Search Condition-Hiding Query Evaluation on Encrypted Databases</atitle><jtitle>IEEE access</jtitle><stitle>Access</stitle><date>2019</date><risdate>2019</risdate><volume>7</volume><spage>161283</spage><epage>161295</epage><pages>161283-161295</pages><issn>2169-3536</issn><eissn>2169-3536</eissn><coden>IAECCG</coden><abstract>Private database query (PDQ) is a protocol between a client and a database server, designed for processing queries to encrypted databases. Specifically, PDQ enables a client to submit a search query and to learn a resulting set satisfying its search condition, without revealing sensitive information about a query statement. The whole query can be protected from the server, but for efficiency reasons known PDQ solutions generally consider to hide the constants only in a query statement. In this paper, we provide two fully homomorphic encryption (FHE)-based PDQ protocols that hide type of queries as well as the constants of a query statement. Particularly, our constructions focus on conjunctive, disjunctive, and threshold conjunctive queries. To this end, we first build a single compact logical expression to cover both conjunctive and disjunctive queries. On top of the logical expression, we design a PDQ protocol that enables to evaluate conjunctive and disjunctive queries without revealing any information on a given query. The second PDQ protocol comes from our observation that if a threshold conjunctive query has a particular threshold value, it results in either a conjunctive query or a disjunctive query. Because the PDQ protocol writes the three types of queries into a single polynomial expression, the resulting protocol can evaluate the three types of query statements without revealing any information on queries. To demonstrate their efficiency, we provide proof-of-concept implementation results of our proposed PDQ protocols. According to our rudimentary experiments, it takes 37.57 seconds to perform a query on 316 elements consisting of 16 attributes of 64 bits using Brakerski-Gentry-Vaikuntanathan's leveled FHE with SIMD techniques for 149-bit security, yielding an amortized rate of just 0.119 seconds per element</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/ACCESS.2019.2951695</doi><tpages>13</tpages><orcidid>https://orcid.org/0000-0002-0461-3053</orcidid><orcidid>https://orcid.org/0000-0002-0920-2026</orcidid><orcidid>https://orcid.org/0000-0002-8629-9052</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 2169-3536
ispartof IEEE access, 2019, Vol.7, p.161283-161295
issn 2169-3536
2169-3536
language eng
recordid cdi_proquest_journals_2455610093
source IEEE Xplore Open Access Journals
subjects Cloud computing
Encrypted database
Encryption
homomorphic encryption
Polynomials
Privacy
private queries
Protocol
Protocols
Queries
Query processing
Searching
Servers
title Search Condition-Hiding Query Evaluation on Encrypted Databases
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-20T14%3A04%3A16IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Search%20Condition-Hiding%20Query%20Evaluation%20on%20Encrypted%20Databases&rft.jtitle=IEEE%20access&rft.au=Kim,%20Myungsun&rft.date=2019&rft.volume=7&rft.spage=161283&rft.epage=161295&rft.pages=161283-161295&rft.issn=2169-3536&rft.eissn=2169-3536&rft.coden=IAECCG&rft_id=info:doi/10.1109/ACCESS.2019.2951695&rft_dat=%3Cproquest_cross%3E2455610093%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c474t-cbc51ef1bcfa0e0ec2c8997864a0d6b090ca9aa3d61e5a2b5b2c29200fd63f43%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2455610093&rft_id=info:pmid/&rft_ieee_id=8891605&rfr_iscdi=true