Proceedings ArticleDOI
How to Construct a New Encryption Scheme Supporting Range Queries on Encrypted Database
Donghyeok Lee,You Jin Song,Sung Min Lee,Taek Yong Nam,Jong Su Jang +4 more
- pp 1402-1407
TLDR
In this paper, the authors proposed an encryption mechanism that can support range queries without exposing the order of plaintext, which is expected to handle data more efficiently than other methods including auxiliary B+-tree.Abstract:
When the traditional encryption algorithms are applied to the database, efficiency degradation occurs because the orders of ciphertext and plaintext are not the same. Therefore, the encryption mechanisms suitable for database environment are required. We propose an encryption mechanism that can support range queries without exposing the order of plaintext. This method is more powerful than the previous order-preserving methods and is expected to handle data more efficiently than other methods including auxiliary B+-tree.read more
Citations
More filters
Secure Data Storage Outsourcing with Conjunctive Keyword Search
TL;DR: This thesis in the field of cryptography considers secure data storage outsourcing with keyword search capabilities that is possible to efficiently enrol and revoke users for both the searching and the decryption part of the system.
Proceedings Article
HTEE: An HMAC based Tamper Evident Encryption
Bradley Baker,C. Edward Chow +1 more
TL;DR: The purpose of the scheme is to provide a straightforward and efficient encryption that supports data integrity, to investigate the use of HMAC for reversible encryption and key transformation, and to improve upon an existing method.
References
More filters
Proceedings ArticleDOI
Executing SQL over encrypted data in the database-service-provider model
TL;DR: The paper explores an algebraic framework to split the query to minimize the computation at the client site, and explores techniques to execute SQL queries over encrypted data.
Proceedings ArticleDOI
Order preserving encryption for numeric data
TL;DR: This work presents an order-preserving encryption scheme for numeric data that allows any comparison operation to be directly applied on encrypted data, and is robust against estimation of the true value in such environments.
Proceedings ArticleDOI
Balancing confidentiality and efficiency in untrusted relational DBMSs
Ernesto Damiani,S. De Capitani di Vimercati,Sushil Jajodia,Stefano Paraboschi,Pierangela Samarati +4 more
TL;DR: This paper presents a simple yet robust single-server solution for remote querying of encrypted databases on untrusted servers based on the use of indexing information attached to the encrypted database which can be used by the server to select the data to be returned in response to a query without the need of disclosing the database content.
Journal ArticleDOI
A new privacy homomorphism and applications
TL;DR: An application to multilevel statistical computation is presented, namely classified retrieval of exact statistics from unclassified computation on disclosure-protected (perturbed) data.
Proceedings ArticleDOI
Implementation of a Storage Mechanism for Untrusted DBMSs
Ernesto Damiani,S. De Capitani di Vimercati,M. Finetti,S. Paraboschi,Pierangela Samarati,Sushil Jajodia +5 more
TL;DR: The impact on query translation and optimization, and the main components of the software architecture of the prototype of a complete architecture for the management of encrypted databases are illustrated.