信息网络安全 ›› 2025, Vol. 25 ›› Issue (11): 1718-1731.doi: 10.3969/j.issn.1671-1122.2025.11.006

• 专题论文:机密计算 • 上一篇    下一篇

基于可信执行环境的加密数据库索引安全增强方案

薛开平1,2, 张淳一1, 柳枫3, 王峰2()   

  1. 1.中国科学技术大学网络空间安全学院合肥 230026
    2.中国科学技术大学网络信息中心合肥 230026
    3.鹏城实验室深圳 518053
  • 收稿日期:2025-04-01 出版日期:2025-11-10 发布日期:2025-12-02
  • 通讯作者: 王峰 wf0229@ustc.edu.cn
  • 作者简介:薛开平(1980—),男,江苏,教授,博士,CCF会员,主要研究方向为下一代网络体系结构、网络安全|张淳一(2000—),男,河南,硕士研究生,主要研究方向为网络安全、应用密码学|柳枫(1995—),男,安徽,助理研究员,博士,主要研究方向为网络安全、应用密码学|王峰(1989—),男,陕西,实验师,硕士,主要研究方向为身份认证、访问控制、区块链
  • 基金资助:
    国家自然科学基金(62372425);中国科学院青年创新促进会优秀会员支持项目(Y202093)

Security-Enhanced Index Scheme in Encrypted Database Based on Trusted Execution Environment

XUE Kaiping1,2, ZHANG Chunyi1, LIU Feng3, WANG Feng2()   

  1. 1. School of Cyber Science and Technology, University of Science and Technology of China, Hefei 230026, China
    2. Network and Information Center, University of Science and Technology of China, Hefei 230026, China
    3. Pengcheng Laboratory, Shenzhen 518053, China
  • Received:2025-04-01 Online:2025-11-10 Published:2025-12-02

摘要:

基于可信执行环境的加密数据库方案相较于其他技术路径具有显著的性能优势,然而在索引结构设计方面仍面临安全挑战。现有方案存在数据顺序信息泄露与解密接口滥用等风险。针对上述问题,文章提出一种基于可信执行环境的加密数据库索引安全增强方案。该方案采用基于动态对称可搜索加密的索引结构,在加快等值查询与范围查询速度的同时,确保索引结构的信息泄露可控。此外,文章设计了一种嵌入索引的验证机制,以防止恶意攻击者通过任意调用接口获取敏感数据的明文信息。安全性分析表明,文章所提方案在保护数据隐私的同时,能够有效抵御恶意接口调用攻击。在Intel SGX环境下的性能测试结果表明,与无索引方案相比,文章所提方案显著提升了查询效率;与存在信息泄露的索引方案相比,文章所提方案在查询效率上保持相当水平,并在更新效率、验证机制轻量化以及可信区内数据处理量等指标上展现出良好的可行性。

关键词: 可信执行环境, 加密数据库, 安全索引, 对称可搜索加密

Abstract:

The scheme of encrypted database based on trusted execution environment has significant performance advantages compared with other schemes, but it faces security challenges in the design of index structure. The existing schemes will leak data sequence information and there is a threat of abuse of decryption interface. To address the above problems, this paper proposed a security-enhanced index scheme in encrypted database based on trusted execution environment. The scheme accelerated equivalent and range queries by using an index structure based on dynamic searchable symmetric encryption to ensure that the index structure leakage was controllable. In addition, this paper designed a verification mechanism for embedded indexes to prevent malicious attackers from obtaining the plaintext information of sensitive data through arbitrary called to the interface. This paper conducted a security analysis, which proved that the scheme in this paper effectively prevented malicious arbitrary call attacks while protecting data privacy. This paper conducted performance tests in the Intel SGX environment, and the results show that the index in this paper significantly improves the query efficiency compared to the no-index scheme. Compared with the leaked index scheme, the efficiency is flat, and it is also feasible in indicators such as update efficiency, verification mechanism lightweight, and trusted area processing data volume.

Key words: trusted execution environment, encrypted database, secure index, searchable symmetric encryption

中图分类号: