scispace - formally typeset
Proceedings ArticleDOI

Study on database encryption-based protection mechanism under cloud computing environment

Shu Gong, +1 more
- pp 258-261
Reads0
Chats0
TLDR
The database protection mechanisms proposed in this paper are based on attribute decomposition and encrypted cloud environment, which not only the server to minimize the number of encryption and decryption of the attribute field, but reduce the amount of computation and effectively encrypt the data of database as well.
Abstract
The combination of database and cloud environment prompted changes in the information industry and information service, while there exits any security issues. The database protection mechanisms proposed in this paper are based on attribute decomposition and encrypted cloud environment, which not only the server to minimize the number of encryption and decryption of the attribute field, but reduce the amount of computation and effectively encrypt the data of database as well.

read more

Citations
More filters
Journal Article

Efficient selective identity-based encryption without random oracles

TL;DR: In this article, the authors presented two efficient identity-based encryption (IBE) systems that admit selective-identity security reductions without random oracles in groups equipped with a bilinear map.
Proceedings ArticleDOI

Design and implementation of database encryption system for cloud environment

TL;DR: Experiments show that the cloud data server can still guarantee higher query traffic after using the encryption system to meet the needs of the actual application environment.
References
More filters
Book ChapterDOI

Fuzzy identity-based encryption

TL;DR: In this article, a new type of identity-based encryption called Fuzzy Identity-Based Encryption (IBE) was introduced, where an identity is viewed as set of descriptive attributes, and a private key for an identity can decrypt a ciphertext encrypted with an identity if and only if the identities are close to each other as measured by the set overlap distance metric.
Posted Content

Fuzzy Identity Based Encryption.

TL;DR: In this paper, a new type of identity-based encryption called Fuzzy Identity-Based Encryption (IBE) was introduced, where an identity is viewed as set of descriptive attributes, and a private key for an identity can decrypt a ciphertext encrypted with an identity if and only if the identities are close to each other as measured by the set overlap distance metric.
Book ChapterDOI

Order-Preserving Symmetric Encryption

TL;DR: The notion of order-preserving symmetric encryption (OPE) was introduced by Agrawal et al. as mentioned in this paper, who showed that a straightforward relaxation of standard security notions for encryption such as indistinguishability against chosen-plaintext attack (IND-CPA) is unachievable by a practical OPE scheme.
Journal ArticleDOI

Interconnected Cloud Computing Environments: Challenges, Taxonomy, and Survey

TL;DR: This survey initially discusses all the relevant aspects motivating cloud interoperability, and categorizes and identifies possible cloud interoperable scenarios and architectures, and discusses future directions and trends toward the holistic approach in this regard.

Relational Cloud: A Database-as-a-Service for the Cloud

TL;DR: Relational Cloud as discussed by the authors is a transactional database-as-a-service (DBaaS) system that uses a graph-based data partitioning algorithm to achieve near-linear elastic scalability.
Related Papers (5)