Securing Databases by using Diagonal-based Order Preserving Symmetric Encryption
MetadataShow full item record
The amount of information stored in databases is constantly increasing. Databases contain multiple records, each of them divided in several data fields. And some of these fields may contain sensitive information, so there is a need to prevent free access to it. Traditionally, cryptography has been used to conceal this kind of information, but conventional cryptography has the problem that, for queries that need access to a specific field for all the records, it requires the decryption of the entire data field. Order preserving encryption ensures that comparing encrypted data returns the same result than comparing the original data. This permits to order encrypted data without the need of decryption. In this way, databases using this kind of cryptosystems admit encrypted record fields while still allowing searches and range queries. In this paper, we propose an order preserving symmetric encryption scheme whose encryption function is recursively constructed. Starting with the trivial order preserving encryption function, which is the identity, a function is constructed in a series of steps by making it more and more complex until the the desired security level is reached. The security of the proposed cryptosystem is also analyzed.
Is part ofApplied Mathematics & Information Sciences, 2014, vol. 8, núm. 5, p. 2085-2094
European research projects
Showing items related by title, author, creator and subject.
Martínez Rodríguez, Santi; Valls Marsal, Magda; Roig Mateu, Concepció; Miret, Josep M. (Josep Maria); Giné, Francesc (Springer Verlag, 2009)Nowadays, the use of Radio Frequency Identification (RFID) systems in industry and stores has increased. Nevertheless, some of these systems present privacy problems that may discourage potential users. Hence, high ...
Garra Oronich, Ricard; Martínez Rodríguez, Santi; Miret, Josep M. (Josep Maria); Sebé Feixas, Francesc (2018)Fine-grained electricity consumption information has been proven to allow to infer people’s habits from their consumption patterns. Hence, smart metering systems need a secure way to regularly transmit the electricity ...
Miret, Josep M. (Josep Maria); Tomàs, Rosana; Valls Marsal, Magda; Sadornil Renedo, Daniel; Tena Ayuso, Juan (Australian Computer Society Inc, 2008)The security of most elliptic curve cryptosystems is based on the intractability of the Elliptic Curve Discrete Logarithm Problem (ECDLP). Such a problem turns out to be computationally unfeasible when elliptic curves ...