Book ChapterDOI
Efficient Searching Over Encrypted Database: Methodology and Algorithms
Varad Deshpande,Debasis Das +1 more
- pp 327-338
Reads0
Chats0
TLDR
This paper describes a modification to the Secure K-Nearest Neighbours (SkNN) technique to construct an encrypted database system and suggests an approach which combines RSA with the SkNN scheme.Abstract:
Database encryption is a process in which the data stored in the database are converted from plaintext (PT) to ciphertext (CT). The original data can be retrieved from the ciphertext with the help of a predefined key and a decryption scheme. This way, only the appropriate authority that has the key can access the data. Thus, encrypted databases help ensure data confidentiality and avoid data leaks. In this paper, we will describe a modification to the Secure K-Nearest Neighbours (SkNN) [3] technique to construct an encrypted database system. We briefly discuss some of the existing encryption models and the principles involved in their construction and look at some of the issues that plague these models. The motivation behind this paper is to devise a method that allows for strong database encryption, while at the same time facilitating efficient search over the encrypted data. In order to achieve this, we suggest an approach which combines RSA with the SkNN scheme.read more
Citations
More filters
Book ChapterDOI
Comparison Between RSA Algorithm and Modified RSA Algorithm Used in Cloud Computing
Bushra Shaheen,Farheen Siddiqui +1 more
TL;DR: Two mainly concerned algorithms are RSA Algorithm and Modification in RSA Encryption Algorithm (MREA) and one of the modifications in RSA encryption algorithm is named as Homomorphic Enc encryption Algorithm.
References
More filters
Journal ArticleDOI
Security in cloud computing
TL;DR: The security issues that arise due to the very nature of cloud computing are detailed and the recent solutions presented in the literature to counter the security issues are presented.
Proceedings ArticleDOI
Secure k-nearest neighbor query over encrypted data in outsourced environments
TL;DR: Wang et al. as discussed by the authors proposed a secure kNN protocol that protects the confidentiality of the data, user's input query, and data access patterns, and empirically analyzed the efficiency of their protocols through various experiments.
Posted Content
Secure k-Nearest Neighbor Query over Encrypted Data in Outsourced Environments
TL;DR: This paper focuses on solving the k-nearest neighbor (kNN) query problem over encrypted database outsourced to a cloud: a user issues an encrypted query record to the cloud, and the cloud returns the k closest records to the user.
Posted Content
Arx: A Strongly Encrypted Database System.
TL;DR: Arx is proposed, the first practical and functionally rich database system that encrypts the data only with strong encryption schemes, and protects the database with the same level of security as regular AESbased encryption, which by itself is devoid of functionality.
Book ChapterDOI
Designing secure indexes for encrypted databases
TL;DR: The challenges raised when designing a secure index for an encrypted database are outlined; the attacker model is described; possible attacks against secure indexes are discussed; the difficulty posed by multiple users sharing the same index are presented; and the design considerations regarding keys storage and encryption granularity are illustrated.