Skip to main content

Privacy-Aware Search and Computation Over Encrypted Data Stores

  • Chapter
  • First Online:
Guide to Big Data Applications

Part of the book series: Studies in Big Data ((SBD,volume 26))

Abstract

Systems today often handle massive amount of data with little regard to privacy or security issues that may arise. As corporations and governments increasingly monitor many aspects of our lives, the security and privacy concerns that surround big data has also become apparent. While anonymization is suggested for protecting user privacy, it has shown to be unreliable. In contrast, cryptographic techniques are well studied, and have provable and quantifiable security. There have been many works on enabling search over encrypted data. In this chapter, we look at some of the most important results in the area of searchable encryption and encrypted data processing, including encrypted indexes, Bloom filters and Boneh’s IBE based searchable encryption scheme. We’ll also discuss some of the most promising developments in recent years: performing range query through the use of order-preserving encryption and computing over ciphertext using homomorphic encryption. To better illustrate the techniques, the schemes are described in various sample applications involving text and media search.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 109.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 139.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Agrawal, R., Kiernan, J., Srikant, R., & Xu, Y. (2004). Order preserving encryption for numeric data. In Proceedings of the 2004 ACM Sigmod International Conference on Management of Data (pp. 563–574).

    Google Scholar 

  • Boldyreva, A., Chenette, N., Lee, Y., & O’Neill, A. (2009). Order-preserving symmetric encryption. In Proceedings of the 28th Annual International Conference on Advances in Cryptology: The Theory and Applications of Cryptographic Techniques (pp. 224–241).

    Google Scholar 

  • Boldyreva, A., Chenette, N., & O’Neill, A. (2011). Order-preserving encryption revisited: improved security analysis and alternative solutions. In Proceedings of the 31st Annual Conference on Advances in Cryptology (pp. 578–595).

    Google Scholar 

  • Boneh, D., & Franklin, M. (2001). Identity-based encryption from the weil pairing. In Advances in Cryptology - Crypto 2001: 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19–23, 2001 Proceedings (pp. 213–229).

    Google Scholar 

  • Boneh, D., Crescenzo, G. D., Ostrovsky, R., & Persiano, G. (2004). Public key encryption with keyword search. In Proceedings of Eurocrypt (pp. 506–522).

    Google Scholar 

  • Gentry, C. (2009). Fully homomorphic encryption using ideal lattices. In Proceedings of the Forty-First Annual ACM Symposium on Theory of Computing (pp. 169–178).

    Google Scholar 

  • Goh, E.-J. (2003). Secure indexes. Cryptology ePrint Archive, Report 2003/216.

    Google Scholar 

  • Gymrek, M., McGuire, A. L., Golan, D., Halperin, E., & Erlich, Y. (2013). Identifying personal genomes by surname inference. Science, 339(6117), 321–324.

    Article  Google Scholar 

  • How hard is it to ‘de-anonymize’ cellphone data? (n.d.). http://news.mit.edu/2013/how-hard-it-de-anonymize-cellphone-data. Accessed 10 September 2016.

  • Lowe, D. G. (1999). Object recognition from local scale-invariant features. In Proceedings of the International Conference on Computer Vision.

    Google Scholar 

  • Lu, W., Swaminathan, A., Varna, A. L., & Wu, M. (2009). Enabling search over encrypted multimedia databases. In Proceedings of SPIE, Media Forensics and Security (pp. 7254–7318).

    Google Scholar 

  • Narayanan, A., & Shmatikov, V. (2008). Robust de-anonymization of large sparse data set. In 2008 IEEE Symposium on Security and Privacy (pp. 111–125).

    Google Scholar 

  • Nister, D., & Stewenius, H. (2006). Scalable recognition with a vocabulary tree. In Proceedings of the 2006 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (pp. 2161–2168).

    Google Scholar 

  • Paillier, P. (1999). Public-key cryptosystems based on composite degree residuosity classes. Lecture Notes in Computer Science, 1592, 223–238.

    Article  MathSciNet  MATH  Google Scholar 

  • Poon, H., & Miri, A. (2016). Scanning for viruses on encrypted cloud storage. In IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (pp. 954–959).

    Google Scholar 

  • Waters, B., Balfanz, D., Durfee, G., & Smetters, D. K. (2004). Building an encrypted and searchable audit log. In Network and Distributed System Security Symposium (pp. 215–224).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ali Miri .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this chapter

Cite this chapter

Poon, H.T., Miri, A. (2018). Privacy-Aware Search and Computation Over Encrypted Data Stores. In: Srinivasan, S. (eds) Guide to Big Data Applications. Studies in Big Data, vol 26. Springer, Cham. https://doi.org/10.1007/978-3-319-53817-4_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-53817-4_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-53816-7

  • Online ISBN: 978-3-319-53817-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics