scispace - formally typeset
Search or ask a question
Author

Ji-Hong Kim

Bio: Ji-Hong Kim is an academic researcher. The author has contributed to research in topics: Database tuning & Database theory. The author has an hindex of 1, co-authored 1 publications receiving 4 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: This paper proposes the selective tuple encryption method using Bloom Filter which could tell us the existence of the data and compares the search performance between the proposed method and the other encryption methods the authors know.
Abstract: In accordance with the database management, DAS(Database as Service) model is one solution for outsourcing. However, we need some data protection mechanisms in order to maintain the database security The most effective algorithm to secure databases from the security threat of third party attackers is to encrypt the sensitive data within the database. However, once we encrypt the sensitive data, we have difficulties in queries execution on the encrypted database. In this paper, we focus on the search process on the encrypted database. We proposed the selective tuple encryption method using Bloom Filter which could tell us the existence of the data. Finally, we compare the search performance between the proposed method and the other encryption methods we know.

4 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: The aim of this research work is to benchmark both databases (Redis and SSDB) using the Yahoo Cloud Serving Benchmark (YCSB), a platform that has been used to compare and benchmark similar NoSQL database systems.
Abstract: Increasing requirements for scalability and elasticity of data storage for web applications has made Not Structured Query Language NoSQL databases more invaluable to web developers. One of such NoSQL Database solutions is Redis. A budding alternative to Redis database is the SSDB database, which is also a key-value store but is disk-based. The aim of this research work is to benchmark both databases (Redis and SSDB) using the Yahoo Cloud Serving Benchmark (YCSB). YCSB is a platform that has been used to compare and benchmark similar NoSQL database systems. Both databases were given variable workloads to identify the throughput of all given operations. The results obtained shows that SSDB gives a better throughput for majority of operations to Redis’s performance.

5 citations

Proceedings ArticleDOI
01 Aug 2017
TL;DR: It is concluded that the strengths of each security algorithm; adopted under a concept of an identity management model, mitigate the vulnerabilities and risks of the information to be protected.
Abstract: We analyzed the security algorithms considered as more efficient to mitigate the vulnerabilities and risks of the information. The objective is to determine a prototype of an infrastructure with distributed architecture and the advantages and disadvantages of the algorithms most used. The deductive method was used to carry out this research. It resulted from the review of the most efficient algorithms that all authors agree that information security in a public or private organization is strategic for decision making, the importance of algorithms developed or adopted by different authors and advantages and most relevant disadvantages of the revised algorithms with a quantitative rating of 0 to 5. It is conclude that the strengths of each security algorithm; adopted under a concept of an identity management model, mitigate the vulnerabilities and risks of the information to be protected.

3 citations

Proceedings ArticleDOI
01 Jul 2017
TL;DR: It was concluded that to mitigate information vulnerabilities and risks with integrity, confidentiality and availability; it is necessary to have an identity management model to select operational, tactical and strategic security policies, to define mechanisms for compliance with policies, and to develop encryption algorithms using the flow diagram technique.
Abstract: It was analyzed the most frequent security algorithms used for information security to mitigate the integrity, confidentiality and availability of the information. The objective is to have an approach on security algorithms and define a quantitative algorithm using flowchart techniques for a process of Ecuador civil registry database. The deductive method was used to analyze the information of the references and to identify the trends of the security algorithms; which allow mitigation of the security of a database under a distributed environment. Turned out the prototype of a process applying the technique of flowchart algorithms. It was concluded that to mitigate information vulnerabilities and risks with integrity, confidentiality and availability; it is necessary to have an identity management model, to identify a model of threats and risks, to select operational, tactical and strategic security policies, to define mechanisms for compliance with policies, to develop encryption algorithms using the flow diagram technique.

2 citations

Journal ArticleDOI
TL;DR: In this article, the authors proposed an indexing scheme to encode the original table tuples into bit vectors (BVs) prior to the encryption, and the resulting index is then used to narrow the range of retrieved encrypted records from the cloud to a small set of records that are candidates for the user's query.
Abstract: Recently, database users have begun to use cloud database services to outsource their databases. The reason for this is the high computation speed and the huge storage capacity that cloud owners provide at low prices. However, despite the attractiveness of the cloud computing environment to database users, privacy issues remain a cause for concern for database owners since data access is out of their control. Encryption is the only way of assuaging users’ fears surrounding data privacy, but executing Structured Query Language (SQL) queries over encrypted data is a challenging task, especially if the data are encrypted by a randomized encryption algorithm. Many researchers have addressed the privacy issues by encrypting the data using deterministic, onion layer, or homomorphic encryption. Nevertheless, even with these systems, the encrypted data can still be subjected to attack. In this research, we first propose an indexing scheme to encode the original table’s tuples into bit vectors (BVs) prior to the encryption. The resulting index is then used to narrow the range of retrieved encrypted records from the cloud to a small set of records that are candidates for the user’s query. Based on the indexing scheme, we then design a system to execute SQL queries over the encrypted data. The data are encrypted by a single randomized encryption algorithm, namely the Advanced Encryption Standard-Cipher-Block Chaining (AES-CBC). In the proposed scheme, we store the index values (BVs) at user’s side, and we extend the system to support most of relational algebra operators, such as select, join, etc. Implementation and evaluation of the proposed system reveals that it is practical and efficient at reducing both the computation and space overhead when compared with state-of-the-art systems like CryptDB.

1 citations