scispace - formally typeset
Search or ask a question
Author

Jong Su Jang

Bio: Jong Su Jang is an academic researcher. The author has contributed to research in topics: Encryption & Plaintext. The author has an hindex of 2, co-authored 2 publications receiving 6 citations.

Papers
More filters
Proceedings ArticleDOI
21 Nov 2007
TL;DR: An encryption mechanism that can support range queries without exposing the order of plaintext is proposed, which is more powerful than the previous order-preserving methods and is expected to handle data more efficiently than other methods including auxiliary B+-tree.
Abstract: When the traditional encryption algorithms are applied to the database, efficiency degradation occurs because the orders of ciphertext and plaintext are not the same. Therefore, the encryption mechanisms suitable for database environment are required. We propose an encryption mechanism that can support range queries without exposing the order of plaintext. This method is more powerful than the previous order-preserving methods and is expected to handle data more efficiently than other methods including auxiliary B+-tree.

4 citations

Proceedings ArticleDOI
07 Jan 2008
TL;DR: In this paper, the authors proposed an encryption mechanism that can support range queries without exposing the order of plaintext, which is expected to handle data more efficiently than other methods including auxiliary B+-tree.
Abstract: When the traditional encryption algorithms are applied to the database, efficiency degradation occurs because the orders of ciphertext and plaintext are not the same. Therefore, the encryption mechanisms suitable for database environment are required. We propose an encryption mechanism that can support range queries without exposing the order of plaintext. This method is more powerful than the previous order-preserving methods and is expected to handle data more efficiently than other methods including auxiliary B+-tree.

2 citations


Cited by
More filters
Journal Article
TL;DR: This work analyzes issues in storage security and discusses a number of trade-offs between security and efficiency, and proposes a new secure storage model and a key management architecture which enable efficient cryptographic operations while maintaining a very high level of security.
Abstract: With the widespread use of e-business coupled with the public's awareness of data privacy issues and recent database security related legislations, incorporating security features into modern database products has become an increasingly important topic. Several database vendors already offer integrated solutions that provide data privacy within existing products. However, treating security and privacy issues as an afterthought often results in inefficient implementations. Some notable RDBMS storage models (such as the N-ary Storage Model) suffer from this problem. In this work, we analyze issues in storage security and discuss a number of trade-offs between security and efficiency. We then propose a new secure storage model and a key management architecture which enable efficient cryptographic operations while maintaining a very high level of security. We also assess the performance of our proposed model by experimenting with a prototype implementation based on the well-known TPC-H data set.

76 citations

08 Jun 2009
TL;DR: This thesis in the field of cryptography considers secure data storage outsourcing with keyword search capabilities that is possible to efficiently enrol and revoke users for both the searching and the decryption part of the system.
Abstract: This thesis in the field of cryptography considers secure data storage outsourcing with keyword search capabilities. To ensure data confidentiality the data is stored in encrypted format. An efficient solution has been developed to enable conjunctive keyword search. Also, a protocol is applied to enable efficient and secure sharing of encrypted data. It is possible to efficiently enrol and revoke users for both the searching and the decryption part of the system. The newly developed search technique is implemented as well to test its practical performance.

3 citations

Proceedings Article
26 Jul 2010
TL;DR: The purpose of the scheme is to provide a straightforward and efficient encryption that supports data integrity, to investigate the use of HMAC for reversible encryption and key transformation, and to improve upon an existing method.
Abstract: This paper presents a HMAC based Temper Evident Encryption (HTEE) technique for providing confidentiality and integrity of numeric data in a database environment through an encryption scheme based on the keyed Hash Message Authentication Code (HMAC) function The encryption scheme implemented in this project extends and improves an existing HMAC based encryption scheme The result is a symmetric encryption process which detects unauthorized updates to ciphertext data, verifies integrity and provides confidentiality This encryption scheme provides an alternative to standard approaches that offer confidentiality and integrity of data such as combining the Advanced Encryption Standard (AES) algorithm with a hash digest The purpose of the scheme is to provide a straightforward and efficient encryption that supports data integrity, to investigate the use of HMAC for reversible encryption and key transformation, and to improve upon an existing method

1 citations

Journal ArticleDOI
TL;DR: B Bucket ID Transformation is a new encryption mechanism and the scheme can range search without order-preserving and be performed by recursive HMAC as many as a value of Bucket ID.
Abstract: The Maritime Cloud is the term used to describe the concept of an infrastructure that support authorized, seamless information transfer, as requested by the IMO e-navigation strategy, and as derived from testbeds focused on e-navigation. In this paper, we proposed Bucket ID Transformation that is a new encryption mechanism and the scheme can range search without order-preserving. Bucket ID Transformation is performed by recursive HMAC as many as a value of Bucket ID.

1 citations

01 Jan 2009
TL;DR: This thesis in the field of cryptography considers secure data outsourcing with keyword search capabilities that is possible to efficiently enrol and revoke users for both the searching and the decryption part of the system.
Abstract: This thesis in the field of cryptography considers secure data outsourcing with keyword search capabilities. To ensure data confidentiality the data is stored in encrypted format. An efficient solution has been developed to enable conjunctive keyword search. Also, a protocol is applied to enable efficient and secure sharing of encrypted data. It is possible to efficiently enrol and revoke users for both the searching and the decryption part of the system. The newly developed search technique is implemented as well to test its practical performance.