Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1109/SP.2007.29guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Multi-Dimensional Range Query over Encrypted Data

Published: 20 May 2007 Publication History
  • Get Citation Alerts
  • Abstract

    We design an encryption scheme called Multi-dimensional Range Query over Encrypted Data (MRQED), to address the privacy concerns related to the sharing of network audit logs and various other applications. Our scheme allows a network gateway to encrypt summaries of network flows before submitting them to an untrusted repository. When network intrusions are suspected, an authority can release a key to an auditor, allowing the auditor to decrypt flows whose attributes (e.g., source and destination addresses, port numbers, etc.) fall within specific ranges. However, the privacy of all irrelevant flows are still preserved. We formally define the security for MRQED and prove the security of our construction under the decision bilinear Diffie-Hellman and decision linear assumptions in certain bilinear groups. We study the practical performance of our construction in the context of network audit logs. Apart from network audit logs, our scheme also has interesting applications for financial audit logs, medical privacy, untrusted remote storage, etc. In particular, we show that MRQED implies a solution to its dual problem, which enables investors to trade stocks through a broker in a privacypreserving manner.

    Cited By

    View all
    • (2024)A Secure and Fast Range Query Scheme for Encrypted Multi-Dimensional DataInternational Journal of Web Services Research10.4018/IJWSR.34039121:1(1-17)Online publication date: 9-Apr-2024
    • (2023)Longshot: Indexing Growing Databases Using MPC and Differential PrivacyProceedings of the VLDB Endowment10.14778/3594512.359452916:8(2005-2018)Online publication date: 1-Apr-2023
    • (2023)Level Up: Private Non-Interactive Decision Tree Evaluation using Levelled Homomorphic EncryptionProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3623095(2945-2958)Online publication date: 15-Nov-2023
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Guide Proceedings
    SP '07: Proceedings of the 2007 IEEE Symposium on Security and Privacy
    May 2007
    362 pages
    ISBN:0769528481

    Publisher

    IEEE Computer Society

    United States

    Publication History

    Published: 20 May 2007

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)A Secure and Fast Range Query Scheme for Encrypted Multi-Dimensional DataInternational Journal of Web Services Research10.4018/IJWSR.34039121:1(1-17)Online publication date: 9-Apr-2024
    • (2023)Longshot: Indexing Growing Databases Using MPC and Differential PrivacyProceedings of the VLDB Endowment10.14778/3594512.359452916:8(2005-2018)Online publication date: 1-Apr-2023
    • (2023)Level Up: Private Non-Interactive Decision Tree Evaluation using Levelled Homomorphic EncryptionProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3623095(2945-2958)Online publication date: 15-Nov-2023
    • (2022)IncShrink: Architecting Efficient Outsourced Databases using Incremental MPC and Differential PrivacyProceedings of the 2022 International Conference on Management of Data10.1145/3514221.3526151(818-832)Online publication date: 10-Jun-2022
    • (2021)A Privacy-Preserving Attribute-Based Encryption System for Data Sharing in Smart CitiesWireless Communications & Mobile Computing10.1155/2021/66866752021Online publication date: 8-Oct-2021
    • (2021)A Blockchain-Based Medical Data Sharing Mechanism with Attribute-Based Access Control and Privacy ProtectionWireless Communications & Mobile Computing10.1155/2021/66857622021Online publication date: 1-Jan-2021
    • (2021)Reconstructing with Less: Leakage Abuse Attacks in Two DimensionsProceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security10.1145/3460120.3484552(2243-2261)Online publication date: 12-Nov-2021
    • (2021)DP-Sync: Hiding Update Patterns in Secure Outsourced Databases with Differential PrivacyProceedings of the 2021 International Conference on Management of Data10.1145/3448016.3457306(1892-1905)Online publication date: 9-Jun-2021
    • (2020)TimeCryptProceedings of the 17th Usenix Conference on Networked Systems Design and Implementation10.5555/3388242.3388302(835-850)Online publication date: 25-Feb-2020
    • (2019)MixGeoProceedings of the International Symposium on Quality of Service10.1145/3326285.3329064(1-10)Online publication date: 24-Jun-2019
    • Show More Cited By

    View Options

    View options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media