encrypted, thereby increasing overhead for the update
query.
Many researchers have investigated the problem
of keywords searching on encrypted data using either
symmetric encryption (Song et al., 2000), asymmet-
ric encryption (Boneh et al., 2004) or a combination
of symmetric, asymmetric encryption and hash func-
tions (Dong et al., 2008). In spite of security vul-
nerabilities (like statistical attack (Song et al., 2000))
and significant overhead (Boneh et al., 2004; Dong
et al., 2008), these encryption schemes are possibly
useful in searching for keywords in a file, document
or email. However, these solutions can not be applied
to the problem of efficiently querying encrypted re-
lational databases. Especially, we discuss in this pa-
per the problem of encrypting integer data, executing
range queries and implementing relational operations
over encrypted database.
9 CONCLUSIONS
We propose a novel order preserving encryption
scheme (MV-POPES) that is robust against known
plaintext attack and statistical attack. In MV-POPES,
we change the order of the plaintext values by por-
tioning the domain into many partitions and assign a
unique random number to each partition that repre-
sents the order in the encrypted domain. MV-POPES
allows one integer to be encrypted to many different
values using the same encryption key. It also pre-
serves the order of the integer values within each par-
tition to allow comparison operation to be directly
applied to the encrypted data. We have developed
techniques so that most processes in executing SQL
queries can be done on encrypted databases. In some
cases, a small amount of work to filter false positives
or perform relational operations is needed on the de-
crypted data. Experiments on MV-POPES showed
that security for sensitive data can be achieved with
reasonable overhead, confirming the feasibility of the
scheme. In the future, we will investigate the opti-
mal algorithm for domain partitioning that minimize
performance overhead in query processing and ensure
high privacy. We also plan to study the encryption of
non-integer data such as strings.
ACKNOWLEDGEMENTS
This research has been supported in part by the
Graint-in-Aid for Scientific Research from MEXT
(#21013004) and Grant-in-Aid for Young Scientists
(B) (#21700093) by JSPS.
REFERENCES
AES (2001). Advanced encryption standard. National In-
stitute of Science and Technology, FIPS 197.
Agrawal, R., Kiernan, J., Srikant, R., and Xu, Y. (2004).
Order preserving encryption for numeric data. In
SIGMOD ’04: Proceedings of the 2004 ACM SIG-
MOD international conference on Management of
data, pages 563–574, New York, NY, USA. ACM.
Blum, M. and Micali, S. (1984). How to generate crypto-
graphically strong sequences of pseudo-random bits.
SIAM J. Comput., 13(4):850–864.
Boneh, D., Crescenzo, G. D., Ostrovsky, R., and Per-
siano, G. (2004). Public key encryption with key-
word search. In EUROCRYPT 2004: Proceedings
of International Conference on the Theory and Appli-
cations of Cryptographic Techniques, pages 506–522.
Springer.
Chung, S. S. and Ozsoyoglu, G. (2006). Anti-tamper
databases: Processing aggregate queries over en-
crypted databases. In ICDEW ’06: Proceedings of
International Conference on Data Engineering Work-
shops, page 98, Washington, DC, USA. IEEE Com-
puter Society.
DES (1977). Data encryption standard. Federal Information
Processing Standards Publication, FIPS PUB 46.
Dong, C., Russello, G., and Dulay, N. (2008). Shared
and searchable encrypted data for untrusted servers.
In Proceeedings of the 22nd annual IFIP working
conference on Data and Applications Security, pages
127–143, Berlin, Heidelberg. Springer-Verlag.
Hacig¨um¨us¸, H., Iyer, B., Li, C., and Mehrotra, S. (2002).
Executing SQL over encrypted data in the database-
service-provider model. In SIGMOD ’02: Proceed-
ings of the 2002 ACM SIGMOD international confer-
ence on Management of data, pages 216–227, New
York, NY, USA. ACM.
Hore, B., Mehrotra, S., and Tsudik, G. (2004). A privacy-
preserving index for range queries. In VLDB ’04: Pro-
ceedings of the 30th international conference on Very
large databases, pages 720–731. VLDB Endowment.
Hsueh, S. (February 2008). Database encryption in SQL
server 2008 enterprise edition. Microsoft White Pa-
pers, SQL Server 2008.
Kadhem, H., Amagasa, T., and Kitagawa, H. (2010).
MV-OPES: Multivalued - order preserving encryption
scheme: A novel scheme for encrypting integer value
to many different values. IEICE Transactions, 93-
D(9):accepted.
Menezes, A. J., Vanstone, S. A., and Oorschot, P. C. V.
(1996). Handbook of Applied Cryptography. CRC
Press, Inc., Boca Raton, FL, USA.
Ozsoyoglu, G., Singer, D. A., and Chung, S. S.
(2003). Anti-tamper databases: Querying encrypted
databases. In 17th Annual IFIP Working Conference
on Database and Applications Security, Estes Park,
pages 4–6.
KMIS 2010 - International Conference on Knowledge Management and Information Sharing
34