5 RELATED WORK
We reviewed the literature in the area of searchable
encrypted database systems. The design of such sys-
tems always trades off between the level of security,
the query functionalities preserved in spite of encryp-
tion and the performance.
Boolean Queries. In (Hacig
¨
um
¨
us¸ et al., 2002), the
authors proposed a heuristic to execute SQL queries
over encrypted data where the querier user is requi-
red to perform a heavy processing of the search re-
sults, whereas in our case, query and retrieval are lig-
htweight operations. Besides, this solution encrypts
records as a whole whereas our construction encrypts
records attribute-wise. The authors do not provide
any security guarantee. In (Cash et al., 2013), an
SSE scheme for boolean queries, named OXT, is tes-
ted with a MySQL database. This solution builds two
indexes, which increases the storage overhead at the
server. This scheme supposes the knowledge of the
frequency of the keywords to perform efficient search.
The user first queries the least frequent keyword of a
conjunctive keyword query and then filters the results
for the other keywords. In (Pappas et al., 2014), Blind
Seer is proposed as a system which enables boolean
SQL queries via a tree-based search index. It resorts
to Yao’s garbled circuit (Yao, 1986), which requires
the user and the server to jointly parse the tree to pro-
cess the search query. Our construction only incurs a
single round of interaction between the user and the
server.
Range Queries. In (Agrawal et al., 2004), the
authors defined order-preserving encryption (OPE)
which enables range queries, but reveals the order
of numeric data. Our scheme avoids this leakage
by using a semantically secure encryption algorithm.
ARX (Poddar et al., 2016) is based on a tree to evalu-
ate range queries over encrypted data, and uses Yao’s
garbled circuit to traverse the tree to respond to range
queries. Whenever such a query is computed, nodes
of the tree must be updated, which incurs complexity
overhead at the user-side. Besides, the authors tested
this solution on a NoSQL database, which does not
store structured data as in MySQL or PostgreSQL.
CryptDB. Proposed by (Popa et al., 2012), this sy-
stem allows equality, range and boolean queries over
encrypted SQL databases, thanks to onion encryp-
tion, that encrypts each attribute with one or more on-
ion layers. Each of the encryption layers preserves a
particular functionality. For simple keyword search,
CryptDB applies a deterministic encryption, disclo-
sing to the server the occurrences of a particular ke-
yword. CryptDB also preserves the functionality of
range queries by adding a layer of OPE, which also
leaks some information to adversaries. As opposed
to CryptDB, even if the same data is queried several
times, our solution preserves data and query privacy.
6 CONCLUSION
This paper proposes an SSE scheme for SQL data-
bases. The proposed solution builds upon the alre-
ady existing searchable encryption proposed by Curt-
mola et al. (Curtmola et al., 2006), which is trans-
formed to an SQL-compatible scheme. Our solu-
tion supports several query functionalities including
range and Boolean queries. Fruthermore, thanks to
the use of cuckoo hashing, the search operation beco-
mes more efficient. We finally present a framework
for implementation which embeds the search algo-
rithm into PostgreSQL and that converts plain SQL
queries into “encrypted” SQL queries directly execu-
table by the Postgres server. This framework is evalu-
ated in terms of performance using an e-health data-
base.
Our future work consists in developing an optimi-
zed system for databases with million of records. We
plan to conduct an in-depth performance evaluation
including comparison with existing -comparable- im-
plementations, if any, to show its practicality in real-
world scenarios.
ACKNOWLEDGMENTS
This work was partially funded by European Com-
mission through the H2020 project CLARUS (grant
No. 644024). We particularly thank the Fundaci
´
o
Cl
´
ınic per a la Recerca Biom
`
edica (FCRB) for pro-
viding our test e-health database. The authors also
would like to thank Mr. Yiadh Tlijani for his help in
simulations.
REFERENCES
Agrawal, R., Kiernan, J., Srikant, R., and Xu, Y. (2004).
Order Preserving Encryption for Numeric Data. In
Proceedings of the 2004 ACM SIGMOD international
conference on Management of data, pages 563–574.
ACM.
Cash, D., Jarecki, S., Jutla, C., Krawczyk, H., Ros¸u, M.-
C., and Steiner, M. (2013). Highly-Scalable Searcha-
ble Symmetric Encryption with Support for Boolean
Queries. In Advances in Cryptology–CRYPTO 2013,
pages 353–373. Springer.
Chamberlin, D. D. and Boyce, R. F. (1974). SEQUEL: A
Structured English Query Language. In Proceedings
CLOSER 2018 - 8th International Conference on Cloud Computing and Services Science
66