Secure and Efficient Query Processing Technique for Encrypted Databases in Cloud

被引:2
|
作者
Almakdi, Sultan [1 ]
Panda, Brajendra [1 ]
机构
[1] Univ Arkansas, Dept Comp Sci & Comp Engn, Fayetteville, AR 72701 USA
关键词
Cloud Databases; Encrypted Data; Bit Vectors; Domain Value Matrix; Query Processing;
D O I
10.1109/ICDIS.2019.00026
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is an attractive environment for both organizations and individual users, as it provides scalable computing and storage services at an affordable price. However, privacy and confidentiality are two challenges that trouble most users. Data encryption, using a powerful encryption algorithm such as the Advanced Encryption Standard (AES), is one solution that can allay users' concerns, but other challenges with searching over encrypted data have arisen. Researchers have proposed many different schemes to execute Standard Query Language (SQL) queries over encrypted data by encrypting the data with more than one encryption algorithm. However, other researchers have proposed systems based on the fragmentation of encrypted data. In this paper, we propose bit vector-based model (BVM), a secure database system that works as an intermediary between users and the cloud provider. In BVM, before the encryption and outsourcing processes, the query manager (QM) takes each record from the main table, parses it, builds a bit vector for it, and stores it. The BV stores bits, zero and one, and its length equals the total number of sub-columns for all sensitive columns. BVM aims to reduce the range of retrieved encrypted records that are related to a user's query from the cloud. In our model, the cloud provider cannot deduce information from the encrypted data nor can infer which encryption algorithm was used to encrypt data. We implement BVM and run different experiments to compare our model with the methods in which data are not encrypted in the cloud. Our evaluation shows that BVM reduces the range of the retrieved encrypted records from the cloud to less than 35 percent of encrypted records. As a result, our model avoids unnecessary decryption processes that affect delay times.
引用
下载
收藏
页码:120 / 127
页数:8
相关论文
共 50 条
  • [31] New construction of secure range query on encrypted data in cloud computing
    Wang, Shao-Hui
    Han, Zhi-Jie
    Chen, Dan-Wei
    Wang, Ru-Chuan
    Tongxin Xuebao/Journal on Communications, 2015, 36 (02):
  • [32] A SECURE AND EFFICIENT BROADCAST TECHNIQUE FOR ENCRYPTED COMMUNICATION
    OHTA, K
    NTT REVIEW, 1990, 2 (02): : 107 - 115
  • [33] SecureNoSQL: An approach for secure search of encrypted NoSQL databases in the public cloud
    Ahmadian, Mohammad
    Plochan, Frank
    Roessler, Zak
    Marinescu, Dan C.
    INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2017, 37 (02) : 63 - 74
  • [34] Efficient query processing on uncertain graph databases
    School of Computer Science and Technology, Harbin Institute of Technology, Harbin 150001, China
    Jisuanji Xuebao, 2009, 10 (2066-2079): : 2066 - 2079
  • [35] Secure and Efficient K Nearest Neighbor Query Over Encrypted Uncertain Data in Cloud-IoT Ecosystem
    Guo, Cheng
    Zhuang, Ruhan
    Su, Chunhua
    Liu, Charles Zhechao
    Choo, Kim-Kwang Raymond
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (06): : 9868 - 9879
  • [36] Fast query algorithm for encrypted databases
    Huazhong Ligong Daxue Xuebao, 9 (8-10):
  • [37] Adaptive Secure Nearest Neighbor Query Processing Over Encrypted Data
    Li, Rui
    Liu, Alex X.
    Xu, Huanle
    Liu, Ying
    Yuan, Huaqiang
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (01) : 91 - 106
  • [38] A Secure and Efficient Framework for Multi-User Encrypted Cloud Databases Supporting Single and Multiple Keyword Searches
    Arundathi, J.V.S.
    Satyanarayana, K.V.V.
    International Journal of Advanced Computer Science and Applications, 2024, 15 (09) : 537 - 546
  • [39] Secure search scheme for encrypted data in the VANET cloud with random query trapdoor
    Hegde, Nayana
    Manvi, Sunilkumar S.
    Lallie, Harjinder Singh
    INFORMATION SECURITY JOURNAL, 2023, 32 (05): : 383 - 400
  • [40] Secure k-NN Query on Encrypted Cloud Data with Multiple Keys
    Cheng, Ke
    Wang, Liangmin
    Shen, Yulong
    Wang, Hua
    Wang, Yongzhi
    Jiang, Xiaohong
    Zhong, Hong
    IEEE TRANSACTIONS ON BIG DATA, 2021, 7 (04) : 689 - 702