SlideShare a Scribd company logo
Enhancing Access Privacy of Range Retrievals over B+Trees
Abstract:
Users of databases that are hosted on shared servers cannot take for granted that their
queries will not be disclosed to unauthorized parties. Even if the database is encrypted, an
adversary who is monitoring the I/O activity on the server may still be able to infer some
information about a user query. For the particular case of a B+
-tree that has its nodes encrypted,
we identify properties that enable the ordering among the leaf nodes to be deduced. These
properties allow us to construct adversarial algorithms to recover the B+
-tree structure from the
I/O traces generated by range queries. Combining this structure with knowledge of the key
distribution (or the plaintext database itself), the adversary can infer the selection range of user
queries. To counter the threat, we propose a privacy-enhancing PB+
-tree index which ensures
that there is high uncertainty about what data the user has worked on, even to a knowledgeable
adversary who has observed numerous query executions. The core idea in PB+
-tree is to conceal
the order of the leaf nodes in an encrypted B+-tree. In particular, it groups the nodes of the
tree into buckets, and employs homomorphic encryption techniques to prevent the adversary
from pinpointing the exact nodes retrieved by range queries. PB+
-tree can be tuned to balance
its privacy strength with the computational and I/O overheads incurred. Moreover, it can be
adapted to protect access privacy in cases where the attacker additionally knows a priori
the access frequencies of key values. Experiments demonstrate that PB+
-tree effectively impairs
the adversary's ability to recover the B+
-tree structure and deduce the query ranges in all
considered scenarios.

More Related Content

DOCX
PDF
Enhancing access privacy of range retrievals over b+trees
PDF
Channeling insights to the right people
DOCX
ENABLING FINE-GRAINED MULTI-KEYWORD SEARCH SUPPORTING CLASSIFIED SUB-DICTIONA...
PPTX
PhD Research Topics in IoT Research Ideas
PPTX
PhD Projects in Learning Technologies Research Guidance
DOCX
A secure and dynamic multi keyword ranked
PPTX
Privacy preserving multi-keyword ranked search over encrypted cloud data
Enhancing access privacy of range retrievals over b+trees
Channeling insights to the right people
ENABLING FINE-GRAINED MULTI-KEYWORD SEARCH SUPPORTING CLASSIFIED SUB-DICTIONA...
PhD Research Topics in IoT Research Ideas
PhD Projects in Learning Technologies Research Guidance
A secure and dynamic multi keyword ranked
Privacy preserving multi-keyword ranked search over encrypted cloud data

What's hot (19)

PDF
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
DOC
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
DOCX
A distributed fault intrusion tolerant sensor
DOCX
privacy preserving multi keyword ranked search over encrypted cloud data
DOCX
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
PDF
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
PPTX
Privacy preserving multi-keyword ranked search over encrypted cloud data
PPT
Privacy preserving multi-keyword ranked search over encrypted cloud data
PDF
Privacy preserving multi-keyword ranked search over encrypted cloud data 2
PDF
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
PDF
Fuzzy Keyword Search Over Encrypted Data in Cloud Computing
PDF
International Journal of Engineering Research and Development (IJERD)
PDF
Privacy Preserving Distributed Association Rule Mining Algorithm for Vertical...
DOCX
Privacy preserving multi-keyword ranked search over encrypted cloud data
PDF
Ib3514141422
PDF
K nearest neighbor classification over semantically secure encrypted relation...
PDF
IRJET- Proficient Recovery Over Records using Encryption in Cloud Computing
DOCX
K-NEAREST NEIGHBOR CLASSIFICATION OVER SEMANTICALLY SECURE ENCRYPTED RELATION...
PDF
A Muilt-Keyword Ranked Based Search and Privacy Preservation of Distributed D...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
A distributed fault intrusion tolerant sensor
privacy preserving multi keyword ranked search over encrypted cloud data
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data 2
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Fuzzy Keyword Search Over Encrypted Data in Cloud Computing
International Journal of Engineering Research and Development (IJERD)
Privacy Preserving Distributed Association Rule Mining Algorithm for Vertical...
Privacy preserving multi-keyword ranked search over encrypted cloud data
Ib3514141422
K nearest neighbor classification over semantically secure encrypted relation...
IRJET- Proficient Recovery Over Records using Encryption in Cloud Computing
K-NEAREST NEIGHBOR CLASSIFICATION OVER SEMANTICALLY SECURE ENCRYPTED RELATION...
A Muilt-Keyword Ranked Based Search and Privacy Preservation of Distributed D...
Ad

Similar to Enhancing Access Privacy of Range Retrievals over B+Trees (20)

PDF
Firewall architectures
PDF
Protecting Global Records Sharing with Identity Based Access Control List
PDF
Protecting Global Records Sharing with Identity Based Access Control List
DOCX
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
PDF
[IJET-V2I2P9] Authors:Reshma A. Hegde1, Madhura Prakash
PDF
Acquisition of Secured Data from Cloud
PDF
PROVABLE DATA PROCESSING (PDP) A MODEL FOR CLIENT'S SECURED DATA ON CLOUD
PDF
Ijcatr04051007
PPTX
Secure data retrieval for decentralized disruption tolerant military networks
PDF
Enabling Integrity for the Compressed Files in Cloud Server
DOCX
Providing user security guarantees in public infrastructure clouds
PDF
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...
PDF
Authentic Data Access Scheme for Variant Disruption- Tolerant Networks
PDF
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
PDF
Provable data possession for securing the data from untrusted server
PDF
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
PDF
Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable D...
PDF
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
PDF
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
PDF
An efficient, secure deduplication data storing in cloud storage environment
Firewall architectures
Protecting Global Records Sharing with Identity Based Access Control List
Protecting Global Records Sharing with Identity Based Access Control List
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
[IJET-V2I2P9] Authors:Reshma A. Hegde1, Madhura Prakash
Acquisition of Secured Data from Cloud
PROVABLE DATA PROCESSING (PDP) A MODEL FOR CLIENT'S SECURED DATA ON CLOUD
Ijcatr04051007
Secure data retrieval for decentralized disruption tolerant military networks
Enabling Integrity for the Compressed Files in Cloud Server
Providing user security guarantees in public infrastructure clouds
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...
Authentic Data Access Scheme for Variant Disruption- Tolerant Networks
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
Provable data possession for securing the data from untrusted server
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable D...
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
An efficient, secure deduplication data storing in cloud storage environment
Ad

More from Migrant Systems (16)

PDF
Secure Mining of Association Rules in Horizontally Distributed Databases
PDF
m-Privacy for Collaborative Data Publishing
PDF
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Net...
PDF
Supporting Privacy Protection in Personalized Web Search
PDF
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...
PDF
Exploiting Service Similarity for Privacy in Location Based Search Queries
PDF
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
PDF
Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
PPT
Java introduction
PPTX
Business Intelligence
PPT
Voyage planet
PPTX
User friendly pattern search paradigm
PPT
Cloud Computing in migrant
PPT
Business intelligent
PDF
Fingerprint combination for privacy protection
Secure Mining of Association Rules in Horizontally Distributed Databases
m-Privacy for Collaborative Data Publishing
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Net...
Supporting Privacy Protection in Personalized Web Search
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...
Exploiting Service Similarity for Privacy in Location Based Search Queries
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
Java introduction
Business Intelligence
Voyage planet
User friendly pattern search paradigm
Cloud Computing in migrant
Business intelligent
Fingerprint combination for privacy protection

Recently uploaded (20)

PDF
My India Quiz Book_20210205121199924.pdf
PPTX
Introduction to pro and eukaryotes and differences.pptx
PDF
FORM 1 BIOLOGY MIND MAPS and their schemes
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
PDF
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
PPTX
Unit 4 Computer Architecture Multicore Processor.pptx
PDF
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PPTX
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
PDF
Empowerment Technology for Senior High School Guide
PDF
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
PDF
Hazard Identification & Risk Assessment .pdf
PDF
LDMMIA Reiki Yoga Finals Review Spring Summer
PPTX
TNA_Presentation-1-Final(SAVE)) (1).pptx
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPTX
History, Philosophy and sociology of education (1).pptx
PDF
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
PDF
IGGE1 Understanding the Self1234567891011
My India Quiz Book_20210205121199924.pdf
Introduction to pro and eukaryotes and differences.pptx
FORM 1 BIOLOGY MIND MAPS and their schemes
202450812 BayCHI UCSC-SV 20250812 v17.pptx
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
Unit 4 Computer Architecture Multicore Processor.pptx
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
Empowerment Technology for Senior High School Guide
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
Hazard Identification & Risk Assessment .pdf
LDMMIA Reiki Yoga Finals Review Spring Summer
TNA_Presentation-1-Final(SAVE)) (1).pptx
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
History, Philosophy and sociology of education (1).pptx
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
IGGE1 Understanding the Self1234567891011

Enhancing Access Privacy of Range Retrievals over B+Trees

  • 1. Enhancing Access Privacy of Range Retrievals over B+Trees Abstract: Users of databases that are hosted on shared servers cannot take for granted that their queries will not be disclosed to unauthorized parties. Even if the database is encrypted, an adversary who is monitoring the I/O activity on the server may still be able to infer some information about a user query. For the particular case of a B+ -tree that has its nodes encrypted, we identify properties that enable the ordering among the leaf nodes to be deduced. These properties allow us to construct adversarial algorithms to recover the B+ -tree structure from the I/O traces generated by range queries. Combining this structure with knowledge of the key distribution (or the plaintext database itself), the adversary can infer the selection range of user queries. To counter the threat, we propose a privacy-enhancing PB+ -tree index which ensures that there is high uncertainty about what data the user has worked on, even to a knowledgeable adversary who has observed numerous query executions. The core idea in PB+ -tree is to conceal the order of the leaf nodes in an encrypted B+-tree. In particular, it groups the nodes of the tree into buckets, and employs homomorphic encryption techniques to prevent the adversary from pinpointing the exact nodes retrieved by range queries. PB+ -tree can be tuned to balance its privacy strength with the computational and I/O overheads incurred. Moreover, it can be adapted to protect access privacy in cases where the attacker additionally knows a priori the access frequencies of key values. Experiments demonstrate that PB+ -tree effectively impairs the adversary's ability to recover the B+ -tree structure and deduce the query ranges in all considered scenarios.