Secure and Efficient Query Processing Technique for Encrypted Databases in Cloud

被引:2
|
作者
Almakdi, Sultan [1 ]
Panda, Brajendra [1 ]
机构
[1] Univ Arkansas, Dept Comp Sci & Comp Engn, Fayetteville, AR 72701 USA
关键词
Cloud Databases; Encrypted Data; Bit Vectors; Domain Value Matrix; Query Processing;
D O I
10.1109/ICDIS.2019.00026
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is an attractive environment for both organizations and individual users, as it provides scalable computing and storage services at an affordable price. However, privacy and confidentiality are two challenges that trouble most users. Data encryption, using a powerful encryption algorithm such as the Advanced Encryption Standard (AES), is one solution that can allay users' concerns, but other challenges with searching over encrypted data have arisen. Researchers have proposed many different schemes to execute Standard Query Language (SQL) queries over encrypted data by encrypting the data with more than one encryption algorithm. However, other researchers have proposed systems based on the fragmentation of encrypted data. In this paper, we propose bit vector-based model (BVM), a secure database system that works as an intermediary between users and the cloud provider. In BVM, before the encryption and outsourcing processes, the query manager (QM) takes each record from the main table, parses it, builds a bit vector for it, and stores it. The BV stores bits, zero and one, and its length equals the total number of sub-columns for all sensitive columns. BVM aims to reduce the range of retrieved encrypted records that are related to a user's query from the cloud. In our model, the cloud provider cannot deduce information from the encrypted data nor can infer which encryption algorithm was used to encrypt data. We implement BVM and run different experiments to compare our model with the methods in which data are not encrypted in the cloud. Our evaluation shows that BVM reduces the range of the retrieved encrypted records from the cloud to less than 35 percent of encrypted records. As a result, our model avoids unnecessary decryption processes that affect delay times.
引用
下载
收藏
页码:120 / 127
页数:8
相关论文
共 50 条
  • [21] Query processing performance on encrypted databases by using the REA algorithm
    Mousa, Ayman
    Nigm, Elsayed
    El-Rabaie, Sayed
    Faragallah, Osama
    International Journal of Network Security, 2012, 14 (05) : 280 - 288
  • [22] Effective and efficient skyline query processing over attribute-order-preserving-free encrypted data in cloud-enabled databases
    Cuzzocrea, Alfredo
    Karras, Panagiotis
    Vlachou, Akrivi
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2022, 126 : 237 - 251
  • [23] Authorized Equality Test of Encrypted Data for Secure Cloud Databases
    Ma, Sha
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 223 - 230
  • [24] Time-Restricted, Verifiable, and Efficient Query Processing Over Encrypted Data on Cloud
    Li, Meng
    Gao, Jianbo
    Zhu, Liehuang
    Zhang, Zijian
    Lal, Chhagan
    Conti, Mauro
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2024, 17 (03) : 1239 - 1251
  • [25] Efficient Query Processing on Graph Databases
    Cheng, James
    Ke, Yiping
    Ng, Wilfred
    ACM TRANSACTIONS ON DATABASE SYSTEMS, 2009, 34 (01):
  • [26] Access control enforcement on query-aware encrypted cloud databases
    Ferretti, Luca
    Colajanni, Michele
    Marchetti, Mirco
    2013 IEEE FIFTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), VOL 2, 2013, : 717 - 722
  • [27] Clustering-based Query Result Authenticaion for Encrypted Databases in Cloud
    Jang, Miyoung
    Yoon, Min
    Youn, Deulnyeok
    Chang, Jae-Woo
    2014 IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2014 IEEE 6TH INTL SYMP ON CYBERSPACE SAFETY AND SECURITY, 2014 IEEE 11TH INTL CONF ON EMBEDDED SOFTWARE AND SYST (HPCC,CSS,ICESS), 2014, : 1076 - 1082
  • [28] Secure Query Processing Over Encrypted Database Through CryptDB
    Kumar, Ashutosh
    Hussain, Muzzammil
    RECENT FINDINGS IN INTELLIGENT COMPUTING TECHNIQUES, VOL 3, 2018, 709 : 307 - 319
  • [29] Efficient privacy-preserving frequent itemset query over semantically secure encrypted cloud database
    Wei Wu
    Ming Xian
    Udaya Parampalli
    Bin Lu
    World Wide Web, 2021, 24 : 607 - 629
  • [30] Efficient privacy-preserving frequent itemset query over semantically secure encrypted cloud database
    Wu, Wei
    Xian, Ming
    Parampalli, Udaya
    Lu, Bin
    WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2021, 24 (02): : 607 - 629