Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Secure Ordered Bucketization

Published: 01 May 2014 Publication History

Abstract

This study examines the ordered bucketization (OB) as a cryptographic object. In OB, plaintextspace is divided into $p$ disjoint buckets, numbered from $1$ to $p$, based on the order of the ranges that they cover. OB is quite useful in that a range query can be performed over encrypted data without the need to decrypt by attaching a bucket number to each ciphertext. Unfortunately, no research has been carried out on the security of OB in a cryptographic sense. This paper defines an encryption scheme with OB (EOB) and suggests a new security model for EOB, IND-OCPA-P, which assumes an adversary has reasonable power. Previous constructions proposed for efficient range queries were not secure in this model. Finally, an OB construction, in which the EOB implementation is secure on the IND-OCPA-P model, is proposed. In the proposed OB, $p$ - $1$ points are selected on the uniform distribution in the plaintext-space and the plaintext-space is divided based on the selected points. A bucket number is assigned to each divided range in ascending range order. With regard to the efficiency of a range query, the proposed OB guarantees reasonably good efficiency on range queries by showing that the distribution of a bucket size is not skewed.

Cited By

View all
  • (2024)A Secure and Fast Range Query Scheme for Encrypted Multi-Dimensional DataInternational Journal of Web Services Research10.4018/IJWSR.34039121:1(1-17)Online publication date: 9-Apr-2024
  • (2023)Secure Cloud Storage and Retrieval of Personal Health Data From Smart Wearable Devices With Privacy-Preserving TechniquesInternational Journal of Web Services Research10.4018/IJWSR.33138820:1(1-18)Online publication date: 5-Oct-2023
  • (2023)Towards Efficient and Privacy-Preserving User-Defined Skyline Query Over Single CloudIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2022.315379020:2(1319-1334)Online publication date: 1-Mar-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image IEEE Transactions on Dependable and Secure Computing
IEEE Transactions on Dependable and Secure Computing  Volume 11, Issue 3
May 2014
97 pages

Publisher

IEEE Computer Society Press

Washington, DC, United States

Publication History

Published: 01 May 2014

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 09 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)A Secure and Fast Range Query Scheme for Encrypted Multi-Dimensional DataInternational Journal of Web Services Research10.4018/IJWSR.34039121:1(1-17)Online publication date: 9-Apr-2024
  • (2023)Secure Cloud Storage and Retrieval of Personal Health Data From Smart Wearable Devices With Privacy-Preserving TechniquesInternational Journal of Web Services Research10.4018/IJWSR.33138820:1(1-18)Online publication date: 5-Oct-2023
  • (2023)Towards Efficient and Privacy-Preserving User-Defined Skyline Query Over Single CloudIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2022.315379020:2(1319-1334)Online publication date: 1-Mar-2023
  • (2023)Secure and Fast Query Approach for High-Precision Multi-dimensional Satellite Remote Sensing DataEdge Computing – EDGE 2023 10.1007/978-3-031-51826-3_7(69-81)Online publication date: 17-Dec-2023
  • (2015)Fast Order-Preserving Encryption from Uniform Distribution SamplingProceedings of the 2015 ACM Workshop on Cloud Computing Security Workshop10.1145/2808425.2808431(41-52)Online publication date: 16-Oct-2015

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media