Privacy-Preserving Range Queries from Keyword Queries

We consider the problem of a client performing privacy-preserving range queries to a server’s database. We propose a cryptographic model for the study of such protocols, by expanding previous well-studied models of keyword search and private information retrieval to the range query type and to incor...

Full description

Saved in:
Bibliographic Details
Published inData and Applications Security and Privacy XXIX Vol. 9149; pp. 35 - 50
Main Authors Di Crescenzo, Giovanni, Ghosh, Abhrajit
Format Book Chapter
LanguageEnglish
Published Switzerland Springer International Publishing AG 2015
Springer International Publishing
SeriesLecture Notes in Computer Science
Subjects
Online AccessGet full text
ISBN3319208098
9783319208091
ISSN0302-9743
1611-3349
1611-3349
DOI10.1007/978-3-319-20810-7_3

Cover

Abstract We consider the problem of a client performing privacy-preserving range queries to a server’s database. We propose a cryptographic model for the study of such protocols, by expanding previous well-studied models of keyword search and private information retrieval to the range query type and to incorporate a multiple-occurrence attribute column in the database table. Our first two results are 2-party privacy-preserving range query protocols, where either (a) the value domain is linear in the number of database records and the database size is only increased by a small constant factor; or (b) the value domain is exponential (thus, essentially of arbitrarily large size) in the number of database records and the database size is increased by a factor logarithmic in the value domain size. Like all previous work in private information retrieval and keyword search, this protocol still satisfies server time complexity linear in the number of database payloads. We discuss how to adapt these results to a 3-party model where encrypted data is outsourced to a third party (i.e., a cloud server). The result is a private database retrieval protocol satisfying a highly desirable tradeoff of privacy and efficiency properties; most notably: (1) no unintended information is leaked to clients or servers, and the information leaked to the third party is characterized as ‘access pattern’ on encrypted data; (2) for each query, all parties run in time only logarithmic in the number of database records and linear in the answer size; (3) the protocol’s query runtime is practical for real-life applications.
AbstractList We consider the problem of a client performing privacy-preserving range queries to a server’s database. We propose a cryptographic model for the study of such protocols, by expanding previous well-studied models of keyword search and private information retrieval to the range query type and to incorporate a multiple-occurrence attribute column in the database table. Our first two results are 2-party privacy-preserving range query protocols, where either (a) the value domain is linear in the number of database records and the database size is only increased by a small constant factor; or (b) the value domain is exponential (thus, essentially of arbitrarily large size) in the number of database records and the database size is increased by a factor logarithmic in the value domain size. Like all previous work in private information retrieval and keyword search, this protocol still satisfies server time complexity linear in the number of database payloads. We discuss how to adapt these results to a 3-party model where encrypted data is outsourced to a third party (i.e., a cloud server). The result is a private database retrieval protocol satisfying a highly desirable tradeoff of privacy and efficiency properties; most notably: (1) no unintended information is leaked to clients or servers, and the information leaked to the third party is characterized as ‘access pattern’ on encrypted data; (2) for each query, all parties run in time only logarithmic in the number of database records and linear in the answer size; (3) the protocol’s query runtime is practical for real-life applications.
Author Ghosh, Abhrajit
Di Crescenzo, Giovanni
Author_xml – sequence: 1
  givenname: Giovanni
  surname: Di Crescenzo
  fullname: Di Crescenzo, Giovanni
  email: gdicrescenzo@appcomsci.com
– sequence: 2
  givenname: Abhrajit
  surname: Ghosh
  fullname: Ghosh, Abhrajit
BookMark eNqNkElOAzEQRc0oQuAEbHIBQ7nL4xIhJoHEIFhbjl0JgdAd7AzK7ekQYAurUg2vpP_22Xbd1MTYkYBjAWBOnLEcOQrHK7ACuPG4wfaxHXz1YpN1hBaCI0q39bsAZ7dZBxAq7ozEXdZxorIatYI9dljKKwAIpay02GHqPo_mIS75faZCeT6qh73HUA-p9zCjPKLSG-TmvXdDy0WT08_wgO0MwrjQ4XftsueL86ezK357d3l9dnrLX1BXU06oktMm6QiRDKCTZKKkRKSMVilGF5xVCR2lKhprZH_QR0zSSa1kgIRdJtd_Z_UkLBdhPPaTPHoPeekF-JUj3zry6Nvk_suJbx21mFhjpb1us2Tfb5q38gdTrZlJbj5mVKaeVlCkeprDOL6EyZRy8bqyBp3yaLxU_4Va2Qak_oY-AfS1h2Y
ContentType Book Chapter
Copyright IFIP International Federation for Information Processing 2015
Copyright_xml – notice: IFIP International Federation for Information Processing 2015
DBID FFUUA
ABOKW
UNPAY
DEWEY 005.8
DOI 10.1007/978-3-319-20810-7_3
DatabaseName ProQuest Ebook Central - Book Chapters - Demo use only
Unpaywall for CDI: Monographs and Miscellaneous Content
Unpaywall
DatabaseTitleList
Database_xml – sequence: 1
  dbid: UNPAY
  name: Unpaywall
  url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/
  sourceTypes: Open Access Repository
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISBN 3319208101
9783319208107
EISSN 1611-3349
Editor Samarati, Pierangela
Editor_xml – sequence: 1
  fullname: Samarati, Pierangela
EndPage 50
ExternalDocumentID oai:HAL:hal-01745815v1
EBC6287395_37_45
EBC5587046_37_45
GroupedDBID 0D6
0DA
38.
AABBV
AAGZE
AAZAK
AAZUS
ABBVZ
ABFTD
ABMNI
ACKNT
ACRRC
AEDXK
AEJLV
AEKFX
AETDV
AEZAY
ALMA_UNASSIGNED_HOLDINGS
APFYR
AZZ
BBABE
CZZ
FFUUA
I4C
IEZ
IY-
LDH
SBO
SFQCF
TMQGW
TPJZQ
TSXQS
TWXRB
Z7R
Z7S
Z7U
Z7X
Z7Y
Z7Z
Z81
Z83
Z84
Z85
Z88
-DT
-GH
-~X
1SB
29L
2HA
2HV
5QI
875
AASHB
ACGFS
ADCXD
AEFIE
EJD
F5P
FEDTE
HVGLF
LAS
P2P
RNI
RSU
SVGTG
VI1
~02
ABOKW
UNPAY
ID FETCH-LOGICAL-h362t-e35d967d6c0ce70394e7c4edee5765dcc9a985d39ed2c7874bfb33d494654a0d3
IEDL.DBID UNPAY
ISBN 3319208098
9783319208091
ISSN 0302-9743
1611-3349
IngestDate Sun Oct 26 04:09:55 EDT 2025
Wed Sep 17 04:00:57 EDT 2025
Thu May 29 01:00:15 EDT 2025
Wed May 28 23:42:57 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
LCCallNum QA76.9.A25QA76.9.D3Q
Language English
License cc-by
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-h362t-e35d967d6c0ce70394e7c4edee5765dcc9a985d39ed2c7874bfb33d494654a0d3
OCLC 912863650
OpenAccessLink https://proxy.k.utb.cz/login?url=https://inria.hal.science/hal-01745815
PQID EBC5587046_37_45
PageCount 16
ParticipantIDs unpaywall_primary_10_1007_978_3_319_20810_7_3
springer_books_10_1007_978_3_319_20810_7_3
proquest_ebookcentralchapters_6287395_37_45
proquest_ebookcentralchapters_5587046_37_45
PublicationCentury 2000
PublicationDate 2015
PublicationDateYYYYMMDD 2015-01-01
PublicationDate_xml – year: 2015
  text: 2015
PublicationDecade 2010
PublicationPlace Switzerland
PublicationPlace_xml – name: Switzerland
– name: Cham
PublicationSeriesSubtitle Information Systems and Applications, incl. Internet/Web, and HCI
PublicationSeriesTitle Lecture Notes in Computer Science
PublicationSeriesTitleAlternate Lect.Notes Computer
PublicationSubtitle 29th Annual IFIP WG 11. 3 Working Conference, DBSec 2015, Fairfax, VA, USA, July 13-15, 2015, Proceedings
PublicationTitle Data and Applications Security and Privacy XXIX
PublicationYear 2015
Publisher Springer International Publishing AG
Springer International Publishing
Publisher_xml – name: Springer International Publishing AG
– name: Springer International Publishing
RelatedPersons Kleinberg, Jon M.
Mattern, Friedemann
Naor, Moni
Mitchell, John C.
Terzopoulos, Demetri
Steffen, Bernhard
Pandu Rangan, C.
Kanade, Takeo
Kittler, Josef
Weikum, Gerhard
Hutchison, David
Tygar, Doug
RelatedPersons_xml – sequence: 1
  givenname: David
  surname: Hutchison
  fullname: Hutchison, David
– sequence: 2
  givenname: Takeo
  surname: Kanade
  fullname: Kanade, Takeo
– sequence: 3
  givenname: Josef
  surname: Kittler
  fullname: Kittler, Josef
– sequence: 4
  givenname: Jon M.
  surname: Kleinberg
  fullname: Kleinberg, Jon M.
– sequence: 5
  givenname: Friedemann
  surname: Mattern
  fullname: Mattern, Friedemann
– sequence: 6
  givenname: John C.
  surname: Mitchell
  fullname: Mitchell, John C.
– sequence: 7
  givenname: Moni
  surname: Naor
  fullname: Naor, Moni
– sequence: 8
  givenname: C.
  surname: Pandu Rangan
  fullname: Pandu Rangan, C.
– sequence: 9
  givenname: Bernhard
  surname: Steffen
  fullname: Steffen, Bernhard
– sequence: 10
  givenname: Demetri
  surname: Terzopoulos
  fullname: Terzopoulos, Demetri
– sequence: 11
  givenname: Doug
  surname: Tygar
  fullname: Tygar, Doug
– sequence: 12
  givenname: Gerhard
  surname: Weikum
  fullname: Weikum, Gerhard
SSID ssj0001558483
ssj0002792
Score 1.7700448
Snippet We consider the problem of a client performing privacy-preserving range queries to a server’s database. We propose a cryptographic model for the study of such...
SourceID unpaywall
springer
proquest
SourceType Open Access Repository
Publisher
StartPage 35
SubjectTerms Canonical Interval
Computer security
Information architecture
Keyword Queries
Linear Domain Size
Private Information Retrieval (PIR)
Range Queries
Title Privacy-Preserving Range Queries from Keyword Queries
URI http://ebookcentral.proquest.com/lib/SITE_ID/reader.action?docID=5587046&ppg=45
http://ebookcentral.proquest.com/lib/SITE_ID/reader.action?docID=6287395&ppg=45
http://link.springer.com/10.1007/978-3-319-20810-7_3
https://inria.hal.science/hal-01745815
UnpaywallVersion submittedVersion
Volume 9149
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LTwIxEG4MHIwe8BkxSvbgSbOI28fSIzEgQSVoxOCp6WvFSFYCrAR_vVN2l6gHjbdmM4duv05nJp3vK0In6qKmQqyNHxglfSJJHXzOdQBECvxS41oq13TbZe0-6QzoIGuQXXJhYlj36hDyziwCnMMY6t2Q0LrjkhcZhZy7gIr9bq_xlF4RBD7POumZ0-TDhK_khVIFWccg47Af6nDmhAJ_SyZX958baD2Jx3Ixl6PRlxDTKqGrfHJpZ8lrNZmpqv74odv49-y30KYjMHiOWQCLto3WbLyDSvnzDV7mzbuI9iYv71IvfNeG4Y6M-Nm7d1wD7y5x8sdTz3FPvGu7mEOFmn_cQ_1W8-Gy7WevKPhDCE4z32JqOAsN0zVtwb85saEm1lgLpQY1WnPJ69Rgbk2gwX2JihTGhnCntCZrBu-jQvwW2wPkac54SAMFMZ0RExopo8BgADTiMIh0GZ3lCyuWd71Zg6lOf3gqKIXjgTCBQ0Hon9YMqjnMaW59miMlnPFU5ILLgLDAAhAWS4QFIFxG_gpLMU5lO36zP_yn_REqzCaJPYZ8ZKYqqNhodm4eK9mm_AQLPd1x
linkProvider Unpaywall
linkToUnpaywall http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LS8NAEF6kPYge6hMrKjl4UlJj9pHsUcRaFEsVC_W07CsqlljaxFJ_vbNNUtSDxdsS5rDZb2dnhp3vW4SO1XmgIqyNHxolfSJJDD7nOgASBX6pcVDINd11WadPbgZ0UDbIzrkwKax76wXyzjICnMEY6t2I0NhxyeuMQs5dQ_V-t3fxVFwRhD4vO-mZ0-TDhC_khQoFWccg47AfYjhzIoF_JJOL-881tJqnIzmbyuHwW4hpN9B1Nbmis-StlWeqpT9_6TYun_0GWncEBs8xC2DRNtGKTbdQo3q-wSu9eRvR3vj1Q-qZ79ow3JGRPnsPjmvg3edO_njiOe6Jd2tnU6hQq487qN--erzs-OUrCv4LBKfMt5gaziLDdKAt-DcnNtLEGmuh1KBGay55TA3m1oQa3JeoRGFsCHdKazIweBfV0vfU7iFPc8YjGiqI6YyYyEiZhAYDoAmHQaKb6LRaWDG_6y0bTHXxwxNBKRwPhAkcCUKXWjOo5jCnlfVJhZRwxhNRCS4DwgILQFjMERaAcBP5CyzFqJDt-Mt-_5_2B6iWjXN7CPlIpo7KzfgFJ5nb3A
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Data+and+Applications+Security+and+Privacy+XXIX&rft.atitle=Privacy-Preserving+Range+Queries+from+Keyword+Queries&rft.date=2015-01-01&rft.pub=Springer+International+Publishing+AG&rft.isbn=9783319208091&rft.volume=9149&rft_id=info:doi/10.1007%2F978-3-319-20810-7_3&rft.externalDBID=45&rft.externalDocID=EBC6287395_37_45
thumbnail_s http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Febookcentral.proquest.com%2Fcovers%2F5587046-l.jpg
http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Febookcentral.proquest.com%2Fcovers%2F6287395-l.jpg