skip to main content
10.1145/2457317.2457338acmotherconferencesArticle/Chapter ViewAbstractPublication PagesedbtConference Proceedingsconference-collections
research-article

Efficient tree pattern queries on encrypted XML documents

Published: 18 March 2013 Publication History

Abstract

Outsourcing XML documents is a challenging task, because it encrypts the documents, while still requiring efficient query processing. Past approaches on this topic either leak structural information or fail to support searching that has constraints on XML node content. In addition, they adopt a filtering-and-refining framework, which requires the users to prune false positives from the query results. To address these problems, we present a solution for efficient evaluation of tree pattern queries (TPQs) on encrypted XML documents. We create a domain hierarchy, such that each XML document can be embedded in it. By assigning each node in the hierarchy a position, we create for each document a vector, which encodes both the structural and textual information about the document. Similarly, a vector is created also for a TPQ. Then, the matching between a TPQ and a document is reduced to calculating the distance between their vectors. For the sake of privacy, such vectors are encrypted before being outsourced. To improve the matching efficiency, we use a k-d tree to partition the vectors into non-overlapping subsets, such that non-matchable documents are pruned as early as possible. The extensive evaluation shows that our solution is efficient and scalable to large dataset.

References

[1]
S. Al-Khalifa, H. V. Jagadish, N. Koudas, J. M. Patel, D. Srivastava, and Y. Wu. Structural joins: A primitive for efficient xml query pattern matching. In In ICDE, pages 141--152, 2002.
[2]
A. Berglund, S. Boag, D. Chamberlin, M. F. Fernández, M. Kay, J. Robie, and J. Siméon. Xml path language (xpath) 2.0 (second edition). Technical report, W3C recommendation, December 2010.
[3]
S. Boag, D. Chamberlin, M. F. Fernádez, D. Florescu, J. Robie, and J. Siméon. Xquery 1.0: An xml query language (second edition). Technical report, W3C Recommendation, December 2010.
[4]
R. Brinkman, L. Feng, J. Doumen, P. H. Hartel, and W. Jonker. Efficient tree search in encrypted data. Information Systems Security, 13(3):14--21, 2004.
[5]
J. Cao, P. Karras, P. Kalnis, and K.-L. Tan. Sabre: a sensitive attribute bucketization and redistribution framework for t-closeness. VLDB J., 20(1):59--81, 2011.
[6]
N. Cao, Z. Yang, C. Wang, K. Ren, and W. Lou. Privacy-preserving query over encrypted graph-structured data in cloud computing. In ICDCS, pages 393--402, 2011.
[7]
Z. Chen, H. V. Jagadish, L. V. S. Lakshmanan, and S. Paparizos. From tree patterns to generalized tree patterns: On efficient evaluation of xquery. In VLDB, pages 237--248, 2003.
[8]
R. Curtmola, J. A. Garay, S. Kamara, and R. Ostrovsky. Searchable symmetric encryption: improved definitions and efficient constructions. In CCS, pages 79--88, 2006.
[9]
E. Damiani, S. D. C. di Vimercati, S. Jajodia, S. Paraboschi, and P. Samarati. Balancing confidentiality and efficiency in untrusted relational dbmss. In CCS, pages 93--102, 2003.
[10]
J. Dibbern, T. Goles, R. Hirschheim, and B. Jayatilaka. Information systems outsourcing: a survey and analysis of the literature. DATA BASE, 35(4):6--102, 2004.
[11]
H. Hacigümüs, B. R. Iyer, C. Li, and S. Mehrotra. Executing sql over encrypted data in the database-service-provider model. In SIGMOD, pages 216--227, 2002.
[12]
B. Hore, S. Mehrotra, and G. Tsudik. A privacy-preserving index for range queries. In VLDB, pages 720--731, 2004.
[13]
P. Kilpeläinen. Tree matching problems with applications to structured text databases. Ph.D. dissertation Report A-1992-6, University of Helsinki, Finland, November 1992.
[14]
A. Kundu and E. Bertino. Structural signatures for tree data structures. PVLDB, 1(1):138--150, 2008.
[15]
DBLP Computer Science Bibliography. http://www.cs.washington.edu/research/xmldatasets/.
[16]
Stock Quotes. http://research.cs.wisc.edu/niagara/data/cq/.
[17]
University Courses. http://www.cs.washington.edu/research/xmldatasets/.
[18]
M. M. Moro, Z. Vagena, and V. J. Tsotras. Tree-pattern queries on a lightweight xml processor. In VLDB, pages 205--216, 2005.
[19]
M. Nabeel, N. Shang, and E. Bertino. Efficient privacy preserving content based publish subscribe systems. In SACMAT, pages 133--144, 2012.
[20]
D. E. Robling Denning. Cryptography and data security. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA, 1982.
[21]
O. Ünay and T. I. Gündem. A survey on querying encrypted xml documents for databases as a service. SIGMOD Record, 37(1):12--20, 2008.
[22]
S. Wang, D. Agrawal, and A. El Abbadi. A comprehensive framework for secure query processing on relational data in the cloud. In Secure Data Management, pages 52--69, 2011.
[23]
W. H. Wang and L. V. S. Lakshmanan. Efficient secure query evaluation over encrypted xml databases. In VLDB, pages 127--138, 2006.
[24]
W. K. Wong, D. W.-L. Cheung, B. Kao, and N. Mamoulis. Secure knn computation on encrypted databases. In SIGMOD, pages 139--152, 2009.
[25]
L. Xu, T. W. Ling, and H. Wu. Labeling dynamic xml documents: An order-centric approach. IEEE Trans. Knowl. Data Eng., 24(1):100--113, 2012.
[26]
Y. Yang, W. Ng, H. L. Lau, and J. Cheng. An efficient approach to support querying secure outsourced xml information. In CAiSE, pages 157--171, 2006.

Cited By

View all
  • (2023)A Framework for Privacy Preserving Localized Graph Pattern Query ProcessingProceedings of the ACM on Management of Data10.1145/35892741:2(1-27)Online publication date: 20-Jun-2023
  • (2021)Privacy Preserving Strong Simulation Queries on Large Graphs2021 IEEE 37th International Conference on Data Engineering (ICDE)10.1109/ICDE51399.2021.00133(1500-1511)Online publication date: Apr-2021
  • (2020)Secrecy and performance models for query processing on outsourced graph dataDistributed and Parallel Databases10.1007/s10619-020-07284-0Online publication date: 29-Jan-2020
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
EDBT '13: Proceedings of the Joint EDBT/ICDT 2013 Workshops
March 2013
423 pages
ISBN:9781450315999
DOI:10.1145/2457317
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 18 March 2013

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article

Conference

EDBT/ICDT '13

Acceptance Rates

EDBT '13 Paper Acceptance Rate 7 of 10 submissions, 70%;
Overall Acceptance Rate 7 of 10 submissions, 70%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)1
Reflects downloads up to 14 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2023)A Framework for Privacy Preserving Localized Graph Pattern Query ProcessingProceedings of the ACM on Management of Data10.1145/35892741:2(1-27)Online publication date: 20-Jun-2023
  • (2021)Privacy Preserving Strong Simulation Queries on Large Graphs2021 IEEE 37th International Conference on Data Engineering (ICDE)10.1109/ICDE51399.2021.00133(1500-1511)Online publication date: Apr-2021
  • (2020)Secrecy and performance models for query processing on outsourced graph dataDistributed and Parallel Databases10.1007/s10619-020-07284-0Online publication date: 29-Jan-2020
  • (2019)Identity management using SAML for mobile clients and Internet of ThingsJournal of High Speed Networks10.3233/JHS-19060625:1(101-126)Online publication date: 19-Feb-2019
  • (2019)Insecurity and Hardness of Nearest Neighbor Queries Over Encrypted Data2019 IEEE 35th International Conference on Data Engineering (ICDE)10.1109/ICDE.2019.00155(1614-1617)Online publication date: Apr-2019
  • (2017)Keyword Search With Access Control Over Encrypted Cloud DataIEEE Sensors Journal10.1109/JSEN.2016.263401817:3(858-868)Online publication date: 1-Feb-2017
  • (2016)Privacy-Preserving Reachability Query Services for Massive NetworksProceedings of the 25th ACM International on Conference on Information and Knowledge Management10.1145/2983323.2983799(145-154)Online publication date: 24-Oct-2016
  • (2015)Structure-Preserving Subgraph Query ServicesIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2015.239929227:8(2275-2290)Online publication date: 1-Aug-2015
  • (2015)Asymmetric structure-preserving subgraph queries for large graphs2015 IEEE 31st International Conference on Data Engineering10.1109/ICDE.2015.7113296(339-350)Online publication date: Apr-2015
  • (2014)Document Attribute-Based Keyword Search over Encrypted DataProceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing10.1109/IIH-MSP.2014.200(787-790)Online publication date: 27-Aug-2014

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media