<efrbr:recordSet xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:efrbr="http://vfrbr.info/efrbr/1.1" xmlns:efrbr-work="http://vfrbr.info/efrbr/1.1/work" xmlns:efrbr-expression="http://vfrbr.info/efrbr/1.1/expression" xmlns:efrbr-manifestation="http://vfrbr.info/efrbr/1.1/manifestation" xmlns:efrbr-person="http://vfrbr.info/efrbr/1.1/person" xmlns:efrbr-corporateBody="http://vfrbr.info/efrbr/1.1/corporateBody" xmlns:efrbr-concept="http://vfrbr.info/efrbr/1.1/concept" xmlns:efrbr-structure="http://vfrbr.info/efrbr/1.1/structure" xmlns:efrbr-responsible="http://vfrbr.info/efrbr/1.1/responsible" xmlns:efrbr-subject="http://vfrbr.info/efrbr/1.1/subject" xmlns:efrbr-other="http://vfrbr.info/efrbr/1.1/other" xsi:schemaLocation="http://vfrbr.info/efrbr/1.1 http://vfrbr.info/schemas/1.1/efrbr.xsd"><efrbr:entities><efrbr-work:work identifier="http://purl.tuc.gr/dl/dias/8A687BA0-5CBB-414F-82E5-1D290D5060F1"><efrbr-work:titleOfTheWork>Practical private range search revisited</efrbr-work:titleOfTheWork></efrbr-work:work><efrbr-expression:expression identifier="http://purl.tuc.gr/dl/dias/8A687BA0-5CBB-414F-82E5-1D290D5060F1"><efrbr-expression:titleOfTheExpression>Practical private range search revisited</efrbr-expression:titleOfTheExpression><efrbr-expression:formOfExpression vocabulary="DIAS:TYPES">
            Πλήρης Δημοσίευση σε Συνέδριο
            Conference Full Paper
         </efrbr-expression:formOfExpression><efrbr-expression:dateOfExpression type="issued">2018-10-11</efrbr-expression:dateOfExpression><efrbr-expression:dateOfExpression type="published">2016</efrbr-expression:dateOfExpression><efrbr-expression:languageOfExpression vocabulary="iso639-1">en</efrbr-expression:languageOfExpression><efrbr-expression:summarizationOfContent>We consider a data owner that outsources its dataset to an untrusted server. The owner wishes to enable the server to answer range queries on a single attribute, without compromising the privacy of the data and the queries. There are several schemes on "practical" private range search (mainly in Databases venues) that attempt to strike a trade-off between efficiency and security. Nevertheless, these methods either lack provable security guarantees, or permit unacceptable privacy leakages. In this paper, we take an interdisciplinary approach, which combines the rigor of Security formulations and proofs with efficient Data Management techniques. We construct a wide set of novel schemes with realistic security/performance trade-offs, adopting the notion of Searchable Symmetric Encryption (SSE) primarily proposed for keyword search. We reduce range search to multi- keyword search using range covering techniques with treelike indexes. We demonstrate that, given any secure SSE scheme, the challenge boils down to (i) formulating leakages that arise from the index structure, and (ii) minimizing false positives incurred by some schemes under heavy data skew. We analytically detail the superiority of our proposals over prior work and experimentally confirm their practicality.</efrbr-expression:summarizationOfContent><efrbr-expression:useRestrictionsOnTheExpression type="creative-commons">http://creativecommons.org/licenses/by/4.0/</efrbr-expression:useRestrictionsOnTheExpression><efrbr-expression:note type="page range">185-198</efrbr-expression:note><efrbr-expression:note type="conference name">ACM SIGMOD International Conference on Management of Data</efrbr-expression:note><efrbr-expression:note type="proceedings title">Proceedings of the ACM SIGMOD International Conference on Management of Data</efrbr-expression:note></efrbr-expression:expression><efrbr-person:person identifier="http://users.isc.tuc.gr/~idemertzis"><efrbr-person:nameOfPerson vocabulary="TUC:LDAP">
            Demertzis Ioannis
            Δεμερτζης Ιωαννης
         </efrbr-person:nameOfPerson></efrbr-person:person><efrbr-person:person identifier="16A2DBB2-EDAF-49E6-8A18-401331C08861"><efrbr-person:nameOfPerson vocabulary="">
            Papadopoulos Stavros
         </efrbr-person:nameOfPerson></efrbr-person:person><efrbr-person:person identifier="http://viaf.org/viaf/171956879"><efrbr-person:nameOfPerson vocabulary="VIAF">
            Papapetrou, Odysseas 1978-
         </efrbr-person:nameOfPerson></efrbr-person:person><efrbr-person:person identifier="http://users.isc.tuc.gr/~adeligiannakis"><efrbr-person:nameOfPerson vocabulary="TUC:LDAP">
            Deligiannakis Antonios
            Δεληγιαννακης Αντωνιος
         </efrbr-person:nameOfPerson></efrbr-person:person><efrbr-person:person identifier="http://users.isc.tuc.gr/~mgarofalakis"><efrbr-person:nameOfPerson vocabulary="TUC:LDAP">
            Garofalakis Minos
            Γαροφαλακης Μινως
         </efrbr-person:nameOfPerson></efrbr-person:person><efrbr-corporateBody:corporateBody identifier="http://www.acm.org/"><efrbr-corporateBody:nameOfTheCorporateBody vocabulary="S/R:PUBLISHERS">
            Association for Computing Machinery
         </efrbr-corporateBody:nameOfTheCorporateBody></efrbr-corporateBody:corporateBody><efrbr-concept:concept identifier="EE775FDE-CFD5-49B0-A068-861C7FEC8F1F"><efrbr-concept:termForTheConcept>
            Information systems
         </efrbr-concept:termForTheConcept></efrbr-concept:concept><efrbr-concept:concept identifier="B47A0435-AEA8-4BAF-BE24-001D5F62C9B6"><efrbr-concept:termForTheConcept>
            Security and privacy
         </efrbr-concept:termForTheConcept></efrbr-concept:concept><efrbr-concept:concept identifier="CABD6E6C-1DED-4E5D-8C8D-EFC30C2A7FFB"><efrbr-concept:termForTheConcept>
            Database and storage security
         </efrbr-concept:termForTheConcept></efrbr-concept:concept><efrbr-concept:concept identifier="F1E26EEC-C552-4237-884F-8261B5BEB017"><efrbr-concept:termForTheConcept>
            Data management systems
         </efrbr-concept:termForTheConcept></efrbr-concept:concept><efrbr-concept:concept identifier="F35D3D5F-08A3-4A95-94B4-EA08083C1B4E"><efrbr-concept:termForTheConcept>
            Security services
         </efrbr-concept:termForTheConcept></efrbr-concept:concept><efrbr-concept:concept identifier="5E900855-24A3-43CF-87A3-1781426BB8C6"><efrbr-concept:termForTheConcept>
            Database and storage security
         </efrbr-concept:termForTheConcept></efrbr-concept:concept></efrbr:entities><efrbr:relationships><efrbr-structure:structureRelations><efrbr-structure:realizedThrough sourceEntity="work" sourceURI="http://purl.tuc.gr/dl/dias/8A687BA0-5CBB-414F-82E5-1D290D5060F1" targetEntity="expression" targetURI="http://purl.tuc.gr/dl/dias/8A687BA0-5CBB-414F-82E5-1D290D5060F1"/></efrbr-structure:structureRelations><efrbr-responsible:responsibleRelations><efrbr-responsible:createdBy sourceEntity="work" sourceURI="http://purl.tuc.gr/dl/dias/8A687BA0-5CBB-414F-82E5-1D290D5060F1" targetEntity="person" targetURI="http://users.isc.tuc.gr/~idemertzis"/><efrbr-responsible:realizedBy sourceEntity="expression" sourceURI="http://purl.tuc.gr/dl/dias/8A687BA0-5CBB-414F-82E5-1D290D5060F1" targetEntity="person" targetURI="http://users.isc.tuc.gr/~idemertzis" role="author"/><efrbr-responsible:realizedBy sourceEntity="expression" sourceURI="http://purl.tuc.gr/dl/dias/8A687BA0-5CBB-414F-82E5-1D290D5060F1" targetEntity="person" targetURI="16A2DBB2-EDAF-49E6-8A18-401331C08861" role="author"/><efrbr-responsible:realizedBy sourceEntity="expression" sourceURI="http://purl.tuc.gr/dl/dias/8A687BA0-5CBB-414F-82E5-1D290D5060F1" targetEntity="person" targetURI="http://viaf.org/viaf/171956879" role="author"/><efrbr-responsible:realizedBy sourceEntity="expression" sourceURI="http://purl.tuc.gr/dl/dias/8A687BA0-5CBB-414F-82E5-1D290D5060F1" targetEntity="person" targetURI="http://users.isc.tuc.gr/~adeligiannakis" role="author"/><efrbr-responsible:realizedBy sourceEntity="expression" sourceURI="http://purl.tuc.gr/dl/dias/8A687BA0-5CBB-414F-82E5-1D290D5060F1" targetEntity="person" targetURI="http://users.isc.tuc.gr/~mgarofalakis" role="author"/><efrbr-responsible:realizedBy sourceEntity="expression" sourceURI="http://purl.tuc.gr/dl/dias/8A687BA0-5CBB-414F-82E5-1D290D5060F1" targetEntity="person" targetURI="http://www.acm.org/" role="publisher"/></efrbr-responsible:responsibleRelations><efrbr-subject:subjectRelations><efrbr-subject:hasSubject sourceEntity="work" sourceURI="http://purl.tuc.gr/dl/dias/8A687BA0-5CBB-414F-82E5-1D290D5060F1" targetEntity="concept" targetURI="EE775FDE-CFD5-49B0-A068-861C7FEC8F1F"/><efrbr-subject:hasSubject sourceEntity="work" sourceURI="http://purl.tuc.gr/dl/dias/8A687BA0-5CBB-414F-82E5-1D290D5060F1" targetEntity="concept" targetURI="B47A0435-AEA8-4BAF-BE24-001D5F62C9B6"/><efrbr-subject:hasSubject sourceEntity="work" sourceURI="http://purl.tuc.gr/dl/dias/8A687BA0-5CBB-414F-82E5-1D290D5060F1" targetEntity="concept" targetURI="CABD6E6C-1DED-4E5D-8C8D-EFC30C2A7FFB"/><efrbr-subject:hasSubject sourceEntity="work" sourceURI="http://purl.tuc.gr/dl/dias/8A687BA0-5CBB-414F-82E5-1D290D5060F1" targetEntity="concept" targetURI="F1E26EEC-C552-4237-884F-8261B5BEB017"/><efrbr-subject:hasSubject sourceEntity="work" sourceURI="http://purl.tuc.gr/dl/dias/8A687BA0-5CBB-414F-82E5-1D290D5060F1" targetEntity="concept" targetURI="F35D3D5F-08A3-4A95-94B4-EA08083C1B4E"/><efrbr-subject:hasSubject sourceEntity="work" sourceURI="http://purl.tuc.gr/dl/dias/8A687BA0-5CBB-414F-82E5-1D290D5060F1" targetEntity="concept" targetURI="5E900855-24A3-43CF-87A3-1781426BB8C6"/></efrbr-subject:subjectRelations><efrbr-other:otherRelations/></efrbr:relationships></efrbr:recordSet>