




Did you find this useful? Give us your feedback
307 citations
260 citations
198 citations
175 citations
...Homomorphic signature schemes can be employed in electronic business and cloud computing [16], [18], [21], [27], [36]....
[...]
171 citations
3,300 citations
...Another notion related is searchable encryption (SE) [19,20], which provides functionalities to perform keyword search over encrypted data without decrypting them....
[...]
...proposed a keyword search scheme based on SE scheme [19]....
[...]
1,351 citations
...[9] firstly presented a basic framework of how to ensure data security in ‘‘Database-As-Service’’ (DAS) model, in which a coarse query is executed by the database service provider....
[...]
1,310 citations
1,303 citations
1,269 citations
...(1) CryptDB can only partially support fuzzy query....
[...]
...Model L-EncDB CryptDB Fuzzy query Yes Partial Data operation Application DB proxy and UDFs Change DB structure Add fields Anonymize tables and columns Please cite this article in press as: J. Li et al., L-EncDB: A lightweight framework (2014), http://dx.doi.org/10.1016/j.knosys.2014.04.010 scheme and OPEkðxÞ means to encrypt x with OPE scheme using encryption key k....
[...]
...For example, for a SQL sentence like ‘‘Insert into Table 1(Field1) values (String1)’’, where Field1 is for range query, the interpreted SQL sentence will be ‘‘Insert into Table 1(Field1, Field1Extra) values (fpek(String1),OPEk(String1))’’, where Field1Extra is additional field for Field1, OPE is adopted OPE Table 1 FPE for data types in DB. Types Subtypes SQL field type FPE scheme Numeric Integer smallint; int FFSEM [5] Decimal numeric; float Char Finite length nchar;nvarchar FFX [3] Finite space char; varchar MR-FPE Datetime N/A datetime Liu et al. [6] Binary N/A binary; varbinary Block cipher Table 2 Comparison between L-EncDB and CryptDB....
[...]
...However, CryptDB is not designed for existing database applications and the DAS model of cloud storage....
[...]
...(3) On database structure, CryptDB anonymizes each table and column name to achieve confidentiality....
[...]
Finally, the authors also showed how to extend their L-EncDB to realize the privacy-preserving queries over encrypted NoSQL Database. Especially, the authors will extend it to privacy-preserving knowledge extraction for outsourcing database, and further provide some practical data publishing methods suitable for their framework. Finally, the authors also showed how to extend their L-EncDB to realize the privacy-preserving queries over encrypted NoSQL Database. Especially, the authors will extend it to privacy-preserving knowledge extraction for outsourcing database, and further provide some practical data publishing methods suitable for their framework.
For a SQL insert sentence with 30 fields and no range query or fuzzy query, the execution time for each insert operation is about 0.09ms, i.e., the system can interpret 11000 SQL sentences within 1s.
To construct the test platform, the authors use Java language to construct an application, in which the open source library named “HTTPClient” is used to visit the specified webpage in their website.
The simple and popular solutions adopted for data privacy are traditional encryption techniques such as public key encryption or symmetric key encryption.
In cloud computing, users are able to store, modify and retrieve data from anywhere in the world, as long as they have access to the Internet.
To provide dynamic pages and information for user, thousands of read and write requests are produced each second in web2.0 site, and results in high concurrent load of database.
most of character sets are represented using more powerful encoding formats, and different characters may require different byte counts to represent.
for existing database applications, L-EncDB is more suitable and lightweight when enterprises and organizations outsource data storage to third-party cloud providers.
A format-preserving encryption scheme is a function F : K × N ×T ×X → X ×{⊥}, where ⊥ ≠ X , and nonempty sets K, N , T , X denote the key space, format space, tweak space and domain, respectively.
The new proposed FPE can preserve both length and storage size of character strings, which cannot be efficiently achieved in the traditional FPE schemes.
In the cloud computing, more and more enterprises also need to outsource NoSQL database to construct their business applications.
In their FPE for strings with type of varchar, the format space is defined by both length and storage size, that is N [Chars] = {(l(X), s(X))|X ∈ X [Chars]}.
individuals and especially businesses hesitate to entrust their data to cloud storage services since they fear that they will lose control over it.
Experimental results demonstrate that the new L-EncDB is efficient and can be applied to big database for privacy-preserving applications.
As shown in Fig. 3.(a), for SQL data operation sentences, such as to insert, or to update, each constant in the query will be encrypted using FPE.