Scrambled Database with Encrypted Query Processing: CryptDB A Computational Analysis

被引:0
|
作者
Rauthan, J. S. [1 ]
Vaisla, K. S. [1 ]
机构
[1] Uttarakhand Tech Univ, Comp Sci & Engn, Dehra Dun, Uttar Pradesh, India
关键词
CryptDB; Encrypted Database; Encrypted Query; Cryptographic model; Confidentiality; Proxy Server;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
These days each data moves toward becoming hard-ware and put away as Databases, which thusly may encase most levered private, monetary, and administration truths. As the information have important resources for the clients, it additionally most extreme foreseen to the mean adversaries and in this way, to secure in inconsistency of every single potential adversary activities is basic. These days the most recent provoke development in the convenience and engaging quality of cloud offices, various private and business and administration measurements are currently put away to the Cloud. Because of the capacity this various information which incorporate private and touchy information over cloud, the protection and security of those sort of information turn into a basic issue. For saving and giving classification of client's delicate information over cloud administrations and getting to productively and in secure way, a few techniques have been offered to understand these situations. For giving the defensive information classification while defensive secrecy and achievement of a run of the mill usual of SQL inquiries in a well-organized technique another approach CryptDB was proposed. CryptDB gives off an impression of being hands-on contrasted with different endeavors at taking care of the issue of putting away the information in distributed storage in encoded frame, that is the reason even the database director can't see the information and again the preparing of information is as scrambled, so center assailant additionally can't distinguish the information amid handling. So, this paper, exhibits a cryptographically examination of the CryptDB demonstrate. For that we first, describe the model CryptDB in supplementary fine focuses for solace of comprehension lastly, we highlighted the confinements of CryptDB concerning security and viability perspectives.
引用
收藏
页码:199 / 211
页数:13
相关论文
共 50 条
  • [21] QUERY PROCESSING IN DISTRIBUTED DATABASE SYSTEMS
    HEVNER, AR
    YAO, SB
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1979, 5 (03) : 177 - 187
  • [22] Turbocharging Database Query Processing and Testing
    Haritsa, Jayant R.
    Sudarshan, S.
    [J]. COMMUNICATIONS OF THE ACM, 2019, 62 (11) : 48 - 49
  • [23] Query Processing in INM Database System
    Hu, Jie
    Fu, Qingchuan
    Liu, Mengchi
    [J]. WEB-AGE INFORMATION MANAGEMENT, PROCEEDINGS, 2010, 6184 : 525 - 536
  • [24] Smooth Query Processing In Spatial Database
    Gawali, Tukaram
    Wagh, R. B.
    [J]. 2013 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND NETWORKING TECHNOLOGIES (ICCCNT), 2013,
  • [25] OLAP query processing in a database cluster
    Lima, AAB
    Mattoso, M
    Valduriez, P
    [J]. EURO-PAR 2004 PARALLEL PROCESSING, PROCEEDINGS, 2004, 3149 : 355 - 362
  • [26] A New Query Integrity Verification Method for Encrypted Data in Database Outsourcing
    Jang, Miyoung
    Yoon, Min
    Song, Youngho
    Chang, Jae-Woo
    [J]. Advanced Multimedia and Ubiquitous Engineering: Future Information Technology, 2015, 352 : 67 - 72
  • [27] A Privacy-aware Query Authentication Index for Encrypted Database in Cloud
    Jang, Miyoung
    Jo, Ara
    Chang, Jae-Woo
    [J]. 2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2013, : 126 - 131
  • [28] SQL-Based Fuzzy Query Mechanism Over Encrypted Database
    Liu, Zheli
    Li, Jingwei
    Li, Jin
    Jia, Chunfu
    Yang, Jun
    Yuan, Ke
    [J]. INTERNATIONAL JOURNAL OF DATA WAREHOUSING AND MINING, 2014, 10 (04) : 71 - 87
  • [29] Secure and Efficient Query Processing Technique for Encrypted Databases in Cloud
    Almakdi, Sultan
    Panda, Brajendra
    [J]. 2019 2ND INTERNATIONAL CONFERENCE ON DATA INTELLIGENCE AND SECURITY (ICDIS 2019), 2019, : 120 - 127
  • [30] THE COMPUTATIONAL COMPLETENESS OF EXTENDED DATABASE QUERY LANGUAGES
    VARVEL, DA
    SHAPIRO, L
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1989, 15 (05) : 632 - 638