scispace - formally typeset
Book ChapterDOI

Efficient Searching Over Encrypted Database: Methodology and Algorithms

Reads0
Chats0
TLDR
This paper describes a modification to the Secure K-Nearest Neighbours (SkNN) technique to construct an encrypted database system and suggests an approach which combines RSA with the SkNN scheme.
Abstract
Database encryption is a process in which the data stored in the database are converted from plaintext (PT) to ciphertext (CT). The original data can be retrieved from the ciphertext with the help of a predefined key and a decryption scheme. This way, only the appropriate authority that has the key can access the data. Thus, encrypted databases help ensure data confidentiality and avoid data leaks. In this paper, we will describe a modification to the Secure K-Nearest Neighbours (SkNN) [3] technique to construct an encrypted database system. We briefly discuss some of the existing encryption models and the principles involved in their construction and look at some of the issues that plague these models. The motivation behind this paper is to devise a method that allows for strong database encryption, while at the same time facilitating efficient search over the encrypted data. In order to achieve this, we suggest an approach which combines RSA with the SkNN scheme.

read more

Citations
More filters
Book ChapterDOI

Comparison Between RSA Algorithm and Modified RSA Algorithm Used in Cloud Computing

TL;DR: Two mainly concerned algorithms are RSA Algorithm and Modification in RSA Encryption Algorithm (MREA) and one of the modifications in RSA encryption algorithm is named as Homomorphic Enc encryption Algorithm.
References
More filters
Journal ArticleDOI

Security in cloud computing

TL;DR: The security issues that arise due to the very nature of cloud computing are detailed and the recent solutions presented in the literature to counter the security issues are presented.
Proceedings ArticleDOI

Secure k-nearest neighbor query over encrypted data in outsourced environments

TL;DR: Wang et al. as discussed by the authors proposed a secure kNN protocol that protects the confidentiality of the data, user's input query, and data access patterns, and empirically analyzed the efficiency of their protocols through various experiments.
Posted Content

Secure k-Nearest Neighbor Query over Encrypted Data in Outsourced Environments

TL;DR: This paper focuses on solving the k-nearest neighbor (kNN) query problem over encrypted database outsourced to a cloud: a user issues an encrypted query record to the cloud, and the cloud returns the k closest records to the user.
Posted Content

Arx: A Strongly Encrypted Database System.

TL;DR: Arx is proposed, the first practical and functionally rich database system that encrypts the data only with strong encryption schemes, and protects the database with the same level of security as regular AESbased encryption, which by itself is devoid of functionality.
Book ChapterDOI

Designing secure indexes for encrypted databases

TL;DR: The challenges raised when designing a secure index for an encrypted database are outlined; the attacker model is described; possible attacks against secure indexes are discussed; the difficulty posed by multiple users sharing the same index are presented; and the design considerations regarding keys storage and encryption granularity are illustrated.
Related Papers (5)