Privacy-Preserving Range Queries from Keyword Queries
We consider the problem of a client performing privacy-preserving range queries to a server’s database. We propose a cryptographic model for the study of such protocols, by expanding previous well-studied models of keyword search and private information retrieval to the range query type and to incor...
Saved in:
| Published in | Data and Applications Security and Privacy XXIX Vol. 9149; pp. 35 - 50 |
|---|---|
| Main Authors | , |
| Format | Book Chapter |
| Language | English |
| Published |
Switzerland
Springer International Publishing AG
2015
Springer International Publishing |
| Series | Lecture Notes in Computer Science |
| Subjects | |
| Online Access | Get full text |
| ISBN | 3319208098 9783319208091 |
| ISSN | 0302-9743 1611-3349 1611-3349 |
| DOI | 10.1007/978-3-319-20810-7_3 |
Cover
| Abstract | We consider the problem of a client performing privacy-preserving range queries to a server’s database. We propose a cryptographic model for the study of such protocols, by expanding previous well-studied models of keyword search and private information retrieval to the range query type and to incorporate a multiple-occurrence attribute column in the database table.
Our first two results are 2-party privacy-preserving range query protocols, where either (a) the value domain is linear in the number of database records and the database size is only increased by a small constant factor; or (b) the value domain is exponential (thus, essentially of arbitrarily large size) in the number of database records and the database size is increased by a factor logarithmic in the value domain size. Like all previous work in private information retrieval and keyword search, this protocol still satisfies server time complexity linear in the number of database payloads.
We discuss how to adapt these results to a 3-party model where encrypted data is outsourced to a third party (i.e., a cloud server). The result is a private database retrieval protocol satisfying a highly desirable tradeoff of privacy and efficiency properties; most notably: (1) no unintended information is leaked to clients or servers, and the information leaked to the third party is characterized as ‘access pattern’ on encrypted data; (2) for each query, all parties run in time only logarithmic in the number of database records and linear in the answer size; (3) the protocol’s query runtime is practical for real-life applications. |
|---|---|
| AbstractList | We consider the problem of a client performing privacy-preserving range queries to a server’s database. We propose a cryptographic model for the study of such protocols, by expanding previous well-studied models of keyword search and private information retrieval to the range query type and to incorporate a multiple-occurrence attribute column in the database table.
Our first two results are 2-party privacy-preserving range query protocols, where either (a) the value domain is linear in the number of database records and the database size is only increased by a small constant factor; or (b) the value domain is exponential (thus, essentially of arbitrarily large size) in the number of database records and the database size is increased by a factor logarithmic in the value domain size. Like all previous work in private information retrieval and keyword search, this protocol still satisfies server time complexity linear in the number of database payloads.
We discuss how to adapt these results to a 3-party model where encrypted data is outsourced to a third party (i.e., a cloud server). The result is a private database retrieval protocol satisfying a highly desirable tradeoff of privacy and efficiency properties; most notably: (1) no unintended information is leaked to clients or servers, and the information leaked to the third party is characterized as ‘access pattern’ on encrypted data; (2) for each query, all parties run in time only logarithmic in the number of database records and linear in the answer size; (3) the protocol’s query runtime is practical for real-life applications. |
| Author | Ghosh, Abhrajit Di Crescenzo, Giovanni |
| Author_xml | – sequence: 1 givenname: Giovanni surname: Di Crescenzo fullname: Di Crescenzo, Giovanni email: gdicrescenzo@appcomsci.com – sequence: 2 givenname: Abhrajit surname: Ghosh fullname: Ghosh, Abhrajit |
| BookMark | eNqNkElOAzEQRc0oQuAEbHIBQ7nL4xIhJoHEIFhbjl0JgdAd7AzK7ekQYAurUg2vpP_22Xbd1MTYkYBjAWBOnLEcOQrHK7ACuPG4wfaxHXz1YpN1hBaCI0q39bsAZ7dZBxAq7ozEXdZxorIatYI9dljKKwAIpay02GHqPo_mIS75faZCeT6qh73HUA-p9zCjPKLSG-TmvXdDy0WT08_wgO0MwrjQ4XftsueL86ezK357d3l9dnrLX1BXU06oktMm6QiRDKCTZKKkRKSMVilGF5xVCR2lKhprZH_QR0zSSa1kgIRdJtd_Z_UkLBdhPPaTPHoPeekF-JUj3zry6Nvk_suJbx21mFhjpb1us2Tfb5q38gdTrZlJbj5mVKaeVlCkeprDOL6EyZRy8bqyBp3yaLxU_4Va2Qak_oY-AfS1h2Y |
| ContentType | Book Chapter |
| Copyright | IFIP International Federation for Information Processing 2015 |
| Copyright_xml | – notice: IFIP International Federation for Information Processing 2015 |
| DBID | FFUUA ABOKW UNPAY |
| DEWEY | 005.8 |
| DOI | 10.1007/978-3-319-20810-7_3 |
| DatabaseName | ProQuest Ebook Central - Book Chapters - Demo use only Unpaywall for CDI: Monographs and Miscellaneous Content Unpaywall |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: UNPAY name: Unpaywall url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/ sourceTypes: Open Access Repository |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISBN | 3319208101 9783319208107 |
| EISSN | 1611-3349 |
| Editor | Samarati, Pierangela |
| Editor_xml | – sequence: 1 fullname: Samarati, Pierangela |
| EndPage | 50 |
| ExternalDocumentID | oai:HAL:hal-01745815v1 EBC6287395_37_45 EBC5587046_37_45 |
| GroupedDBID | 0D6 0DA 38. AABBV AAGZE AAZAK AAZUS ABBVZ ABFTD ABMNI ACKNT ACRRC AEDXK AEJLV AEKFX AETDV AEZAY ALMA_UNASSIGNED_HOLDINGS APFYR AZZ BBABE CZZ FFUUA I4C IEZ IY- LDH SBO SFQCF TMQGW TPJZQ TSXQS TWXRB Z7R Z7S Z7U Z7X Z7Y Z7Z Z81 Z83 Z84 Z85 Z88 -DT -GH -~X 1SB 29L 2HA 2HV 5QI 875 AASHB ACGFS ADCXD AEFIE EJD F5P FEDTE HVGLF LAS P2P RNI RSU SVGTG VI1 ~02 ABOKW UNPAY |
| ID | FETCH-LOGICAL-h362t-e35d967d6c0ce70394e7c4edee5765dcc9a985d39ed2c7874bfb33d494654a0d3 |
| IEDL.DBID | UNPAY |
| ISBN | 3319208098 9783319208091 |
| ISSN | 0302-9743 1611-3349 |
| IngestDate | Sun Oct 26 04:09:55 EDT 2025 Wed Sep 17 04:00:57 EDT 2025 Thu May 29 01:00:15 EDT 2025 Wed May 28 23:42:57 EDT 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| LCCallNum | QA76.9.A25QA76.9.D3Q |
| Language | English |
| License | cc-by |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-h362t-e35d967d6c0ce70394e7c4edee5765dcc9a985d39ed2c7874bfb33d494654a0d3 |
| OCLC | 912863650 |
| OpenAccessLink | https://proxy.k.utb.cz/login?url=https://inria.hal.science/hal-01745815 |
| PQID | EBC5587046_37_45 |
| PageCount | 16 |
| ParticipantIDs | unpaywall_primary_10_1007_978_3_319_20810_7_3 springer_books_10_1007_978_3_319_20810_7_3 proquest_ebookcentralchapters_6287395_37_45 proquest_ebookcentralchapters_5587046_37_45 |
| PublicationCentury | 2000 |
| PublicationDate | 2015 |
| PublicationDateYYYYMMDD | 2015-01-01 |
| PublicationDate_xml | – year: 2015 text: 2015 |
| PublicationDecade | 2010 |
| PublicationPlace | Switzerland |
| PublicationPlace_xml | – name: Switzerland – name: Cham |
| PublicationSeriesSubtitle | Information Systems and Applications, incl. Internet/Web, and HCI |
| PublicationSeriesTitle | Lecture Notes in Computer Science |
| PublicationSeriesTitleAlternate | Lect.Notes Computer |
| PublicationSubtitle | 29th Annual IFIP WG 11. 3 Working Conference, DBSec 2015, Fairfax, VA, USA, July 13-15, 2015, Proceedings |
| PublicationTitle | Data and Applications Security and Privacy XXIX |
| PublicationYear | 2015 |
| Publisher | Springer International Publishing AG Springer International Publishing |
| Publisher_xml | – name: Springer International Publishing AG – name: Springer International Publishing |
| RelatedPersons | Kleinberg, Jon M. Mattern, Friedemann Naor, Moni Mitchell, John C. Terzopoulos, Demetri Steffen, Bernhard Pandu Rangan, C. Kanade, Takeo Kittler, Josef Weikum, Gerhard Hutchison, David Tygar, Doug |
| RelatedPersons_xml | – sequence: 1 givenname: David surname: Hutchison fullname: Hutchison, David – sequence: 2 givenname: Takeo surname: Kanade fullname: Kanade, Takeo – sequence: 3 givenname: Josef surname: Kittler fullname: Kittler, Josef – sequence: 4 givenname: Jon M. surname: Kleinberg fullname: Kleinberg, Jon M. – sequence: 5 givenname: Friedemann surname: Mattern fullname: Mattern, Friedemann – sequence: 6 givenname: John C. surname: Mitchell fullname: Mitchell, John C. – sequence: 7 givenname: Moni surname: Naor fullname: Naor, Moni – sequence: 8 givenname: C. surname: Pandu Rangan fullname: Pandu Rangan, C. – sequence: 9 givenname: Bernhard surname: Steffen fullname: Steffen, Bernhard – sequence: 10 givenname: Demetri surname: Terzopoulos fullname: Terzopoulos, Demetri – sequence: 11 givenname: Doug surname: Tygar fullname: Tygar, Doug – sequence: 12 givenname: Gerhard surname: Weikum fullname: Weikum, Gerhard |
| SSID | ssj0001558483 ssj0002792 |
| Score | 1.7700448 |
| Snippet | We consider the problem of a client performing privacy-preserving range queries to a server’s database. We propose a cryptographic model for the study of such... |
| SourceID | unpaywall springer proquest |
| SourceType | Open Access Repository Publisher |
| StartPage | 35 |
| SubjectTerms | Canonical Interval Computer security Information architecture Keyword Queries Linear Domain Size Private Information Retrieval (PIR) Range Queries |
| Title | Privacy-Preserving Range Queries from Keyword Queries |
| URI | http://ebookcentral.proquest.com/lib/SITE_ID/reader.action?docID=5587046&ppg=45 http://ebookcentral.proquest.com/lib/SITE_ID/reader.action?docID=6287395&ppg=45 http://link.springer.com/10.1007/978-3-319-20810-7_3 https://inria.hal.science/hal-01745815 |
| UnpaywallVersion | submittedVersion |
| Volume | 9149 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LTwIxEG4MHIwe8BkxSvbgSbOI28fSIzEgQSVoxOCp6WvFSFYCrAR_vVN2l6gHjbdmM4duv05nJp3vK0In6qKmQqyNHxglfSJJHXzOdQBECvxS41oq13TbZe0-6QzoIGuQXXJhYlj36hDyziwCnMMY6t2Q0LrjkhcZhZy7gIr9bq_xlF4RBD7POumZ0-TDhK_khVIFWccg47Af6nDmhAJ_SyZX958baD2Jx3Ixl6PRlxDTKqGrfHJpZ8lrNZmpqv74odv49-y30KYjMHiOWQCLto3WbLyDSvnzDV7mzbuI9iYv71IvfNeG4Y6M-Nm7d1wD7y5x8sdTz3FPvGu7mEOFmn_cQ_1W8-Gy7WevKPhDCE4z32JqOAsN0zVtwb85saEm1lgLpQY1WnPJ69Rgbk2gwX2JihTGhnCntCZrBu-jQvwW2wPkac54SAMFMZ0RExopo8BgADTiMIh0GZ3lCyuWd71Zg6lOf3gqKIXjgTCBQ0Hon9YMqjnMaW59miMlnPFU5ILLgLDAAhAWS4QFIFxG_gpLMU5lO36zP_yn_REqzCaJPYZ8ZKYqqNhodm4eK9mm_AQLPd1x |
| linkProvider | Unpaywall |
| linkToUnpaywall | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LS8NAEF6kPYge6hMrKjl4UlJj9pHsUcRaFEsVC_W07CsqlljaxFJ_vbNNUtSDxdsS5rDZb2dnhp3vW4SO1XmgIqyNHxolfSJJDD7nOgASBX6pcVDINd11WadPbgZ0UDbIzrkwKax76wXyzjICnMEY6t2I0NhxyeuMQs5dQ_V-t3fxVFwRhD4vO-mZ0-TDhC_khQoFWccg47AfYjhzIoF_JJOL-881tJqnIzmbyuHwW4hpN9B1Nbmis-StlWeqpT9_6TYun_0GWncEBs8xC2DRNtGKTbdQo3q-wSu9eRvR3vj1Q-qZ79ow3JGRPnsPjmvg3edO_njiOe6Jd2tnU6hQq487qN--erzs-OUrCv4LBKfMt5gaziLDdKAt-DcnNtLEGmuh1KBGay55TA3m1oQa3JeoRGFsCHdKazIweBfV0vfU7iFPc8YjGiqI6YyYyEiZhAYDoAmHQaKb6LRaWDG_6y0bTHXxwxNBKRwPhAkcCUKXWjOo5jCnlfVJhZRwxhNRCS4DwgILQFjMERaAcBP5CyzFqJDt-Mt-_5_2B6iWjXN7CPlIpo7KzfgFJ5nb3A |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Data+and+Applications+Security+and+Privacy+XXIX&rft.atitle=Privacy-Preserving+Range+Queries+from+Keyword+Queries&rft.date=2015-01-01&rft.pub=Springer+International+Publishing+AG&rft.isbn=9783319208091&rft.volume=9149&rft_id=info:doi/10.1007%2F978-3-319-20810-7_3&rft.externalDBID=45&rft.externalDocID=EBC6287395_37_45 |
| thumbnail_s | http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Febookcentral.proquest.com%2Fcovers%2F5587046-l.jpg http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Febookcentral.proquest.com%2Fcovers%2F6287395-l.jpg |