Proceedings ArticleDOI
Study on database encryption-based protection mechanism under cloud computing environment
Shu Gong,Xin Xin Huang +1 more
- pp 258-261
Reads0
Chats0
TLDR
The database protection mechanisms proposed in this paper are based on attribute decomposition and encrypted cloud environment, which not only the server to minimize the number of encryption and decryption of the attribute field, but reduce the amount of computation and effectively encrypt the data of database as well.Abstract:
The combination of database and cloud environment prompted changes in the information industry and information service, while there exits any security issues. The database protection mechanisms proposed in this paper are based on attribute decomposition and encrypted cloud environment, which not only the server to minimize the number of encryption and decryption of the attribute field, but reduce the amount of computation and effectively encrypt the data of database as well.read more
Citations
More filters
Journal Article
Efficient selective identity-based encryption without random oracles
Dan Boneh,Xavier Boyen +1 more
TL;DR: In this article, the authors presented two efficient identity-based encryption (IBE) systems that admit selective-identity security reductions without random oracles in groups equipped with a bilinear map.
Proceedings ArticleDOI
Design and implementation of database encryption system for cloud environment
TL;DR: Experiments show that the cloud data server can still guarantee higher query traffic after using the encryption system to meet the needs of the actual application environment.
References
More filters
Book ChapterDOI
Fuzzy identity-based encryption
Amit Sahai,Brent Waters +1 more
TL;DR: In this article, a new type of identity-based encryption called Fuzzy Identity-Based Encryption (IBE) was introduced, where an identity is viewed as set of descriptive attributes, and a private key for an identity can decrypt a ciphertext encrypted with an identity if and only if the identities are close to each other as measured by the set overlap distance metric.
Posted Content
Fuzzy Identity Based Encryption.
Amit Sahai,Brent Waters +1 more
TL;DR: In this paper, a new type of identity-based encryption called Fuzzy Identity-Based Encryption (IBE) was introduced, where an identity is viewed as set of descriptive attributes, and a private key for an identity can decrypt a ciphertext encrypted with an identity if and only if the identities are close to each other as measured by the set overlap distance metric.
Book ChapterDOI
Order-Preserving Symmetric Encryption
TL;DR: The notion of order-preserving symmetric encryption (OPE) was introduced by Agrawal et al. as mentioned in this paper, who showed that a straightforward relaxation of standard security notions for encryption such as indistinguishability against chosen-plaintext attack (IND-CPA) is unachievable by a practical OPE scheme.
Journal ArticleDOI
Interconnected Cloud Computing Environments: Challenges, Taxonomy, and Survey
TL;DR: This survey initially discusses all the relevant aspects motivating cloud interoperability, and categorizes and identifies possible cloud interoperable scenarios and architectures, and discusses future directions and trends toward the holistic approach in this regard.
Relational Cloud: A Database-as-a-Service for the Cloud
Carlo Curino,Evan P. C. Jones,Raluca Ada Popa,Nirmesh Malviya,Eugene Wu,Samuel Madden,Hari Balakrishnan,Nickolai Zeldovich +7 more
TL;DR: Relational Cloud as discussed by the authors is a transactional database-as-a-service (DBaaS) system that uses a graph-based data partitioning algorithm to achieve near-linear elastic scalability.