Skip to main content

A Review of Order Preserving Encryption Schemes

  • Conference paper
  • First Online:
Advances in Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD 2020)

Abstract

Cloud computing and Database as a service have gaining rapid interest by many organizations today because of its cost effectiveness but it faced a lot of security issued in protecting client business sensitive data, the traditional encryption techniques for database security cannot ensure that a database is safe for intrusion, unauthorized access and queries processes over encrypted data in the present technological evolution. This paper presents a review of Order Preserving Encryption schemes (OPES) a technique for database encryption which execute range queries in an efficient manner, the existing approaches of database encryption techniques using OPE, Principles, and Application of OPE, various types of Attack on OPE and overview of Mutable order Preserving Encoding mOPE.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 299.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ahmed, S., Annisa, A., Zaman, A., Zhang, Z., Md. Rokibul Alam, K., Morimoto, Y.: Semi-order preserving encryption technique for numeric database. Int. J. Network. Comput. 9(1). www.ijnc.org, ISSN 2185–2847, pages 111,129, January 2019

  2. Liang, J., Qin, Z., Xiao, S., Zhang, J., Yin, H., Li, K.: Privacy-preserving range query over multi-source electronic health records in public clouds. J. Parallel Distrib. Comput. 135, 127–139 (2020)

    Article  Google Scholar 

  3. Moghadam, S.S., Fayoumi, A.: Toward securing cloud-based data analytics: a discussion on current solutions and open issues", IEEE Access 7 (2019)

    Google Scholar 

  4. Ali, N.D., Ahmed, A.K.: Enhancing performance of search over encrypted data in cloud computing. Int. J. Comput. Sci. Trends Technol. (IJCST) 7(6), November–December 2019

    Google Scholar 

  5. Lai, S., Patranabis, S., Sakzad, A., Liu, J.K., Mukhopadhyay, D., Steinfeld, R., Sun, S.-F., Liu, D., Zuo, C.: Result pattern hiding searchable encryption for conjunctive queries. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 745–762 (2018)

    Google Scholar 

  6. Chowdhury, A.R., Ramanathan, P.: Public order preserving cipher generation scheme for distributed computing. In: Association for Computing Machinery, Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 2273–2275 (2018)

    Google Scholar 

  7. Grubbs, P., Sekniqi, K., Bindschaedler, V., Naveed, M., Ristenpart, T.: Leakage-abuse attacks against order-revealing encryption. In: 2017 IEEE Symposium on Security and Privacy (SP), San Jose, CA, pp. 655-672 (2017)

    Google Scholar 

  8. Garcia-Alfaro, J., Navarro-Arribas, G., Hartenstein, H., Herrera-Joancomartí, J. (eds.): ESORICS/DPM/CBT -2017. LNCS, vol. 10436. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-67816-0

    Book  Google Scholar 

  9. Chenette, N., Lewi, K., Weis, S.A., Wu, D.J.: Practical Order-Revealing Encryption with Limited Leakage, Fast Software Encryption, March 2016

    Google Scholar 

  10. Lewi, K., David, J.: Order-revealing encryption: new constructions, applications, and lower bounds. IACR Cryptology ePrint Archive 2016, 612 (2016)

    Google Scholar 

  11. Yang, C., Zhang, W., Yu, N.: Semi-Order Preserving Encryption. Information Sciences 387 (2016). https://doi.org/10.1016/j.ins.2016.12.025

  12. Li, K., Zhang, W., Yang, C., Yu, N.: Security analysis on oneto-many order preserving encryption-based cloud data search. In: IEEE Trans. Inf. Forens. Secur. 10(9), 1918–1926 (2015)

    Google Scholar 

  13. Mavroforakis, C., Chenette, N., O’Neill, A., Kollios, G., Canetti, R.: Modular order-preserving encryption. In: Association for Computing Machinery, Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, pp. 763–777 (2015)

    Google Scholar 

  14. Naveed, M., Kamara, S., Wright, C.V.: Inference attacks on property-preserving encrypted databases. Computer Science Faculty Publications and Presentations. 153 (2015)

    Google Scholar 

  15. Kerschbaum, F.: Frequency-hiding order-preserving encryption. In: Association for Computing Machinery, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 656–667 (2015)

    Google Scholar 

  16. Reddy, K.S., Ramachandram, S.: A novel dynamic order preserving encryption scheme. In: 2014 First International Conference on Networks and Soft Computing (ICNSC2014), Guntur, 2014, pp. 92–96 (2014). https://doi.org/10.1109/CNSC.2014.6906720

  17. Popa, R.A., Li, F.H., Zeldovich, N.: An ideal security protocol for order-preserving encoding. In: IEEE Symposium on Security and Privacy, pp. 463–477 (2013)

    Google Scholar 

  18. Liu, D., Wang, S.: Nonlinear order preserving index for encrypted database query in service cloud environments. Concurr. Comput. Practice Exp. Wiley Online Library 25(13), 1967–1984 (2013)

    Article  Google Scholar 

  19. Xiao, L., Yen, I.-L., Huynh, D.T. Extending order preserving encryption for multi-user systems. Cryptology ePrint Archive, Report 2012/192 (2012)

    Google Scholar 

  20. Boldyreva, A., Chenette, N., O’Neill, A.: Order-preserving encryption revisited: improved security analysis and alternative solutions. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 578–595. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-22792-9_33

    Chapter  Google Scholar 

  21. Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Order-preserving encryption for numeric data. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, pp. 563–574 (2004). https://doi.org/10.1145/1007568.1007632

Download references

Acknowledgements

We thank anonymous reviewers for their valuable comments. This research was supported in part by the Tianjin Natural Science Foundation (16JCYBJC15800) and the Fundamental Research Funds Nankai University (z1a2085588) for the Central Universities and the Foreign Aid program funded by the Ministry of Commerce (MOFCOM) of P. R. China.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xudong Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kamara, M.A., Li, X. (2021). A Review of Order Preserving Encryption Schemes. In: Meng, H., Lei, T., Li, M., Li, K., Xiong, N., Wang, L. (eds) Advances in Natural Computation, Fuzzy Systems and Knowledge Discovery. ICNC-FSKD 2020. Lecture Notes on Data Engineering and Communications Technologies, vol 88. Springer, Cham. https://doi.org/10.1007/978-3-030-70665-4_77

Download citation

Publish with us

Policies and ethics