DOI QR코드

DOI QR Code

Query with SUM Aggregate Function on Encrypted Floating-Point Numbers in Cloud

  • Zhu, Taipeng (Dept. of Computer Science, Jinan University) ;
  • Zou, Xianxia (Dept. of Computer Science, Jinan University) ;
  • Pan, Jiuhui (Dept. of Computer Science, Jinan University)
  • Received : 2016.07.01
  • Accepted : 2016.12.14
  • Published : 2017.06.30

Abstract

Cloud computing is an attractive solution that can provide low cost storage and powerful processing capabilities for government agencies or enterprises of small and medium size. Yet the confidentiality of information should be considered by any organization migrating to cloud, which makes the research on relational database system based on encryption schemes to preserve the integrity and confidentiality of data in cloud be an interesting subject. So far there have been various solutions for realizing SQL queries on encrypted data in cloud without decryption in advance, where generally homomorphic encryption algorithm is applied to support queries with aggregate functions or numerical computation. But the existing homomorphic encryption algorithms cannot encrypt floating-point numbers. So in this paper, we present a mechanism to enable the trusted party to encrypt the floating-points by homomorphic encryption algorithm and partial trusty server to perform summation on their ciphertexts without revealing the data itself. In the first step, we encode floating-point numbers to hide the decimal points and the positive or negative signs. Then, the codes of floating-point numbers are encrypted by homomorphic encryption algorithm and stored as sequences in cloud. Finally, we use the data structure of DoubleListTree to implement the aggregate function of SUM and later do some extra processes to accomplish the summation.

Keywords

References

  1. C. Wang, S. S. Chow, Q. Wang, K. Ren, and W. Lou, "Privacy-preserving public auditing for secure cloud storage," IEEE Transactions on Computers, vol. 62, no. 2, pp. 362-375, 2013. https://doi.org/10.1109/TC.2011.245
  2. N. H. Yu, Z. Hao, J. J. Xu, W. M. Zhang, and C. Zhang, "Review of cloud computing security," Dianzi Xuebao (Acta Electronica Sinica), vol. 41, no. 2, pp. 371-381, 2013.
  3. R. A. Popa, C. Redfield, N. Zeldovich, and H. Balakrishnan, "CryptDB: protecting confidentiality with encrypted query processing," in Proceedings of the 23rd ACM Symposium on Operating Systems Principles, Cascais, Portugal, 2011, pp. 85-100.
  4. R. A. Popa, F. H. Li, and N. Zeldovich, "An ideal-security protocol for order-preserving encoding," in Proceedings of 2013 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, 2013, pp. 463-477.
  5. R. A. Popa and N. Zeldovich, "Cryptographic treatment of CryptDB's adjustable join," Massachusetts Institute of Technology, Cambridge, MA, Technical Report No. MIT-CSAIL-TR-2012-006, 2012.
  6. C. Curino, E. P. Jones, R. A. Popa, N. Malviya, E. Wu, S. Madden, H. Balakrishna, and N. Zeldovich, "Relational cloud: a database-as-a-service for the cloud," in Proceedings of 5th Biennial Conference on Innovation Data Systems Research (CIDR), Asilomar, CA, 2011, pp. 235-240.
  7. R. A. Popa, N. Zeldovich, and H. Balakrishnan, "CryptDB: a practical encrypted relational DBMS," Massachusetts Institute of Technology, Cambridge, MA, Technical Report No. MIT-CSAIL-TR-2011-005, 2011.
  8. S. Tu, M. F. Kaashoek, S. Madden, and N. Zeldovich, "Processing analytical queries over encrypted data," Proceedings of the VLDB Endowment, vol. 6, no. 5, pp. 289-300, 2013. https://doi.org/10.14778/2535573.2488336
  9. W. K. Wong, B. Kao, D. W. L. Cheung, R. Li, and S. M. Yiu, "Secure query processing with data interoperability in a cloud database environment," in Proceedings of the 2014 ACM SIGMOD International Conference on Management of Data, Snowbird, UT, 2014, pp. 1395-1406.
  10. Z. He, W. K. Wong, B. Kao, D. W. L. Cheung, R. Li, S. M. Yiu, and E. Lo, "SDB: a secure query processing system with data interoperability," Proceedings of the VLDB Endowment, vol. 8, no. 12, pp. 1876-1879, 2015. https://doi.org/10.14778/2824032.2824090
  11. S. Bajaj and R. Sion, "Trusteddb: a trusted hardware-based database with privacy and data confidentiality," IEEE Transactions on Knowledge and Data Engineering, vol. 26, no. 3, pp. 752-765, 2014. https://doi.org/10.1109/TKDE.2013.38
  12. R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, "Order preserving encryption for numeric data," in Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data, Paris, France, 2004, pp. 563-574.
  13. H. Hacigumus, B. Iyer, C. Li, and S. Mehrotra, "Executing SQL over encrypted data in the database-service-provider model," in Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data, Madison, WI, 2002, pp. 216-227.
  14. A. C. Yao, "Protocols for secure computations," in Proceedings of 23rd Annual Symposium on Foundations of Computer Science (SFCS), Chicago, IL, 1982, pp. 160-164.
  15. D. Bogdanov, R. Jagomagis, and S. Laur, "A universal toolkit for cryptographically secure privacy-preserving data mining," in Pacific-Asia Workshop on Intelligence and Security Informatics. Heidelberg: Springer, 2012, pp. 112-126.
  16. H. Hacigumus, B. Iyer, and S. Mehrotra, "Providing database as a service," in Proceedings of 18th International Conference on Data Engineering, San Jose, CA, 2002, pp. 29-38.
  17. K. Kaur, K. S. Dhindsa, and G. Singh, "Numeric to numeric encryption of databases: using 3Kdec algorithm," in Proceedings of IEEE International Advance Computing Conference, Patiala, India, 2009, pp. 1501-1505.
  18. G. L. Xiang, X. M. Chen, P. Zhu, and J. Ma, "A method of homomorphic encryption," Wuhan University Journal of Natural Sciences, vol. 11, no. 1, pp. 181-184, 2006. https://doi.org/10.1007/BF02831727
  19. C. Gentry, "Fully homomorphic encryption using ideal lattices," in Proceedings of the 41st Annual ACM Symposium on Theory of Computing (STOC), Bethesda, MD, 2009, pp. 169-178.
  20. M. Van Dijk, C. Gentry, S. Halevi, and V. Vaikuntanathan, "Fully homomorphic encryption over the integers," in Annual International Conference on the Theory and Applications of Cryptographic Techniques. Heidelberg: Springer, 2010, pp. 24-43.
  21. Z. Brakerski, C. Gentry, and S. Halevi, "Packed ciphertexts in LWE-based homomorphic encryption," in Public-Key Cryptography-PKC 2013. Heidelberg: Springer, 2013, pp. 1-13.
  22. Z. Brakerski and V. Vaikuntanathan, "Efficient fully homomorphic encryption from (standard) LWE," SIAM Journal on Computing, vol. 43, no. 2, pp. 831-871, 2014. https://doi.org/10.1137/120868669
  23. C. Gentry, A. Sahai, and B. Waters, "Homomorphic encryption from learning with errors: conceptually-simpler, asymptotically-faster, attribute-based," in Advances in Cryptology-CRYPTO 2013. Heidelberg: Springer, 2013, pp. 75-92.
  24. P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes," in Advances in Cryptology-EUROCRYPT '99. Heidelberg: Springer, 1999, pp. 223-238.