scispace - formally typeset
Open AccessJournal ArticleDOI

A Comparison of the Query Execution Algorithms in Secure Database System

Young-Dal Jang, +1 more
- 01 Feb 2016 - 
- Vol. 6, Iss: 1, pp 337-343
TLDR
This paper proposes the selective tuple encryption method using Bloom Filter which could tell us the existence of the data and compares the search performance between the proposed method and the other encryption methods the authors know.
Abstract
In accordance with the database management, DAS(Database as Service) model is one solution for outsourcing. However, we need some data protection mechanisms in order to maintain the database security The most effective algorithm to secure databases from the security threat of third party attackers is to encrypt the sensitive data within the database. However, once we encrypt the sensitive data, we have difficulties in queries execution on the encrypted database. In this paper, we focus on the search process on the encrypted database. We proposed the selective tuple encryption method using Bloom Filter which could tell us the existence of the data. Finally, we compare the search performance between the proposed method and the other encryption methods we know.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Performance Benchmarking of Key-Value Store NoSQL Databases

TL;DR: The aim of this research work is to benchmark both databases (Redis and SSDB) using the Yahoo Cloud Serving Benchmark (YCSB), a platform that has been used to compare and benchmark similar NoSQL database systems.
Proceedings ArticleDOI

An approach of efficient security algorithms for distribute architectures

TL;DR: It is concluded that the strengths of each security algorithm; adopted under a concept of an identity management model, mitigate the vulnerabilities and risks of the information to be protected.
Proceedings ArticleDOI

A security algorithms approach to apply to the civil registry database of the Ecuador

TL;DR: It was concluded that to mitigate information vulnerabilities and risks with integrity, confidentiality and availability; it is necessary to have an identity management model to select operational, tactical and strategic security policies, to define mechanisms for compliance with policies, and to develop encryption algorithms using the flow diagram technique.
Journal ArticleDOI

An Efficient Secure System for Fetching Data From the Outsourced Encrypted Databases

TL;DR: In this article, the authors proposed an indexing scheme to encode the original table tuples into bit vectors (BVs) prior to the encryption, and the resulting index is then used to narrow the range of retrieved encrypted records from the cloud to a small set of records that are candidates for the user's query.
References
More filters
Journal ArticleDOI

Network Applications of Bloom Filters: A Survey

TL;DR: The aim of this paper is to survey the ways in which Bloom filters have been used and modified in a variety of network problems, with the aim of providing a unified mathematical and practical framework for understanding them and stimulating their use in future applications.
Proceedings ArticleDOI

Executing SQL over encrypted data in the database-service-provider model

TL;DR: The paper explores an algebraic framework to split the query to minimize the computation at the client site, and explores techniques to execute SQL queries over encrypted data.
Book ChapterDOI

A privacy-preserving index for range queries

TL;DR: This paper analyzes the data partitioning (bucketization) technique and algorithmically develops this technique to build privacy-preserving indices on sensitive attributes of a relational table and develops a novel algorithm for achieving the desired balance between privacy and utility of the index.
Book ChapterDOI

Managing and Querying Encrypted Data

TL;DR: This chapter gives an overview of the state-of-the-art in some of these areas using the “Database As a Service” (DAS) as the prototype application and summarizes the basic techniques proposed for SQL queries over encrypted relational data, keyword search over encrypted text data and XPath queries overencrypted XML data.
Book ChapterDOI

Privacy of Outsourced Data

TL;DR: This paper describes such fragmentation-based approaches focusing in particular on the different data fragmentation models proposed in the literature, and discusses on some research directions.