Securing Databases by using Diagonal-based Order Preserving Symmetric Encryption
Issue date
2014Suggested citation
Martínez Rodríguez, Santi;
Miret, Josep M. (Josep Maria);
Valls Marsal, Magda;
Tomàs, Rosana;
.
(2014)
.
Securing Databases by using Diagonal-based Order Preserving Symmetric Encryption.
Applied Mathematics & Information Sciences, 2014, vol. 8, núm. 5, p. 2085-2094.
https://doi.org/10.12785/amis/080501.
Metadata
Show full item recordAbstract
The amount of information stored in databases is constantly increasing. Databases contain multiple records, each of them divided in several data fields. And some of these fields may contain sensitive information, so there is a need to prevent free access to it. Traditionally, cryptography has been used to conceal this kind of information, but conventional cryptography has the problem that, for queries that need access to a specific field for all the records, it requires the decryption of the entire data field. Order preserving encryption ensures that comparing encrypted data returns the same result than comparing the original data. This permits to order encrypted data without the need of decryption. In this way, databases using this kind of cryptosystems admit encrypted record fields while still allowing searches and range queries. In this paper, we propose an order preserving symmetric encryption scheme whose encryption function is recursively constructed. Starting with the trivial order preserving encryption function, which is the identity, a function is constructed in a series of steps by making it more and more complex until the the desired security level is reached. The security of the proposed cryptosystem is also analyzed.
Is part of
Applied Mathematics & Information Sciences, 2014, vol. 8, núm. 5, p. 2085-2094European research projects
Collections
Related items
Showing items related by title, author, creator and subject.
-
A Secure Elliptic Curve-Based RFID Protocol
Martínez Rodríguez, Santi; Valls Marsal, Magda; Roig Mateu, Concepció; Miret, Josep M. (Josep Maria); Giné, Francesc (Springer Verlag, 2009)Nowadays, the use of Radio Frequency Identification (RFID) systems in industry and stores has increased. Nevertheless, some of these systems present privacy problems that may discourage potential users. Hence, high ... -
Improving a smart metering system using elliptic curves and removing the trusted dealer
Garra Oronich, Ricard; Martínez Rodríguez, Santi; Miret, Josep M. (Josep Maria); Sebé Feixas, Francesc (2018)Fine-grained electricity consumption information has been proven to allow to infer people’s habits from their consumption patterns. Hence, smart metering systems need a secure way to regularly transmit the electricity ... -
Exploiting isogeny cordillera structure to obtain cryptographically good elliptic curves
Miret, Josep M. (Josep Maria); Tomàs, Rosana; Valls Marsal, Magda; Sadornil Renedo, Daniel; Tena Ayuso, Juan (Australian Computer Society Inc, 2008)The security of most elliptic curve cryptosystems is based on the intractability of the Elliptic Curve Discrete Logarithm Problem (ECDLP). Such a problem turns out to be computationally unfeasible when elliptic curves ...