Scrambled Database with Encrypted Query Processing: CryptDB A Computational Analysis

被引:0
|
作者
Rauthan, J. S. [1 ]
Vaisla, K. S. [1 ]
机构
[1] Uttarakhand Tech Univ, Comp Sci & Engn, Dehra Dun, Uttar Pradesh, India
关键词
CryptDB; Encrypted Database; Encrypted Query; Cryptographic model; Confidentiality; Proxy Server;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
These days each data moves toward becoming hard-ware and put away as Databases, which thusly may encase most levered private, monetary, and administration truths. As the information have important resources for the clients, it additionally most extreme foreseen to the mean adversaries and in this way, to secure in inconsistency of every single potential adversary activities is basic. These days the most recent provoke development in the convenience and engaging quality of cloud offices, various private and business and administration measurements are currently put away to the Cloud. Because of the capacity this various information which incorporate private and touchy information over cloud, the protection and security of those sort of information turn into a basic issue. For saving and giving classification of client's delicate information over cloud administrations and getting to productively and in secure way, a few techniques have been offered to understand these situations. For giving the defensive information classification while defensive secrecy and achievement of a run of the mill usual of SQL inquiries in a well-organized technique another approach CryptDB was proposed. CryptDB gives off an impression of being hands-on contrasted with different endeavors at taking care of the issue of putting away the information in distributed storage in encoded frame, that is the reason even the database director can't see the information and again the preparing of information is as scrambled, so center assailant additionally can't distinguish the information amid handling. So, this paper, exhibits a cryptographically examination of the CryptDB demonstrate. For that we first, describe the model CryptDB in supplementary fine focuses for solace of comprehension lastly, we highlighted the confinements of CryptDB concerning security and viability perspectives.
引用
收藏
页码:199 / 211
页数:13
相关论文
共 50 条
  • [1] Secure Query Processing Over Encrypted Database Through CryptDB
    Kumar, Ashutosh
    Hussain, Muzzammil
    [J]. RECENT FINDINGS IN INTELLIGENT COMPUTING TECHNIQUES, VOL 3, 2018, 709 : 307 - 319
  • [2] CryptDB: Processing Queries on an Encrypted Database
    Popa, Raluca Ada
    Redfield, Catherine M. S.
    Zeldovich, Nickolai
    Balakrishnan, Hari
    [J]. COMMUNICATIONS OF THE ACM, 2012, 55 (09) : 103 - 111
  • [3] CryptDB: Protecting Confidentiality with Encrypted Query Processing
    Popa, Raluca Ada
    Redfield, Catherine M. S.
    Zeldovich, Nickolai
    Balakrishnan, Hari
    [J]. SOSP 11: PROCEEDINGS OF THE TWENTY-THIRD ACM SYMPOSIUM ON OPERATING SYSTEMS PRINCIPLES, 2011, : 85 - 100
  • [4] A Secure Range Query Processing Algorithm for the Encrypted Database on the Cloud
    Kim, Hyeong-Il
    Choi, Munchul
    Kim, Hyeong-Jin
    Chang, Jae-Woo
    [J]. ADVANCED MULTIMEDIA AND UBIQUITOUS ENGINEERING: FUTURETECH & MUE, 2016, 393 : 101 - 110
  • [5] Query optimization in encrypted database systems
    Hacigümüs, H
    Iyer, B
    Mehrotra, S
    [J]. DATABASE SYSTEMS FOR ADVANCED APPLICATIONS, PROCEEDINGS, 2005, 3453 : 43 - 55
  • [6] Query Execution over Encrypted Database
    Kumar, Raju Ranjan
    Hussain, Muzzammil
    [J]. 2015 SECOND INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING AND COMMUNICATION ENGINEERING ICACCE 2015, 2015, : 459 - 464
  • [7] A kNN Query Processing Algorithm using a Tree Index Structure on the Encrypted Database
    Kim, Hyeong-Il
    Kim, Hyeong-Jin
    Chang, Jae-Woo
    [J]. 2016 INTERNATIONAL CONFERENCE ON BIG DATA AND SMART COMPUTING (BIGCOMP), 2016, : 93 - 100
  • [8] Encrypted XML Data Query Processing with Range Query
    Liu, Baolong
    Chen, Hua
    Guo, Yi
    [J]. MECHATRONIC SYSTEMS AND AUTOMATION SYSTEMS, 2011, 65 : 241 - 245
  • [9] A Method of Query over Encrypted Data in Database
    Liu, Lianzhong
    Gai, Jingfen
    [J]. 2009 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND TECHNOLOGY, VOL I, PROCEEDINGS, 2009, : 23 - 27
  • [10] Information Processing for Encrypted Database
    Sun, Ruxia
    Yin, Chunyong
    [J]. ACC 2009: ETP/IITA WORLD CONGRESS IN APPLIED COMPUTING, COMPUTER SCIENCE, AND COMPUTER ENGINEERING, 2009, : 252 - 255