Secure and Efficient Query Processing Technique for Encrypted Databases in Cloud

被引:2
|
作者
Almakdi, Sultan [1 ]
Panda, Brajendra [1 ]
机构
[1] Univ Arkansas, Dept Comp Sci & Comp Engn, Fayetteville, AR 72701 USA
关键词
Cloud Databases; Encrypted Data; Bit Vectors; Domain Value Matrix; Query Processing;
D O I
10.1109/ICDIS.2019.00026
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is an attractive environment for both organizations and individual users, as it provides scalable computing and storage services at an affordable price. However, privacy and confidentiality are two challenges that trouble most users. Data encryption, using a powerful encryption algorithm such as the Advanced Encryption Standard (AES), is one solution that can allay users' concerns, but other challenges with searching over encrypted data have arisen. Researchers have proposed many different schemes to execute Standard Query Language (SQL) queries over encrypted data by encrypting the data with more than one encryption algorithm. However, other researchers have proposed systems based on the fragmentation of encrypted data. In this paper, we propose bit vector-based model (BVM), a secure database system that works as an intermediary between users and the cloud provider. In BVM, before the encryption and outsourcing processes, the query manager (QM) takes each record from the main table, parses it, builds a bit vector for it, and stores it. The BV stores bits, zero and one, and its length equals the total number of sub-columns for all sensitive columns. BVM aims to reduce the range of retrieved encrypted records that are related to a user's query from the cloud. In our model, the cloud provider cannot deduce information from the encrypted data nor can infer which encryption algorithm was used to encrypt data. We implement BVM and run different experiments to compare our model with the methods in which data are not encrypted in the cloud. Our evaluation shows that BVM reduces the range of the retrieved encrypted records from the cloud to less than 35 percent of encrypted records. As a result, our model avoids unnecessary decryption processes that affect delay times.
引用
下载
收藏
页码:120 / 127
页数:8
相关论文
共 50 条
  • [41] Privacy-Preserving Top-k Query Processing Algorithms Using Efficient Secure Protocols over Encrypted Database in Cloud Computing Environment
    Kim, Hyeong-Jin
    Kim, Yong-Ki
    Lee, Hyun-Jo
    Chang, Jae-Woo
    ELECTRONICS, 2022, 11 (18)
  • [42] Secure query processing against encrypted XML data using Query-Aware Decryption
    Lee, Jae-Gil
    Whang, Kyu-Young
    INFORMATION SCIENCES, 2006, 176 (13) : 1928 - 1947
  • [43] Fast and Secure kNN Query Processing in Cloud Computing
    Lei, Xinyu
    Tu, Guan-Hua
    Liu, Alex X.
    Xie, Tian
    2020 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2020,
  • [44] Secure kNN Query Processing in Untrusted Cloud Environments
    Choi, Sunoh
    Ghinita, Gabriel
    Lim, Hyo-Sang
    Bertino, Elisa
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2014, 26 (11) : 2818 - 2831
  • [45] Secure query processing and optimization in cloud environment: a review
    Divya, V. L.
    Job, P. A.
    Preetha, Mathew K.
    INFORMATION SECURITY JOURNAL, 2024, 33 (02): : 172 - 191
  • [46] Encrypted SQL Arithmetic Functions Processing for Secure Cloud Database
    Parbat, Tanusree
    Chatterjee, Ayantika
    SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, SPACE 2021, 2022, 13162 : 207 - 225
  • [47] An Efficient Secure System for Fetching Data From the Outsourced Encrypted Databases
    Almakdi, Sultan
    Panda, Brajendra
    Alshehri, Mohammed S.
    Alazeb, Abdulwahab
    IEEE ACCESS, 2021, 9 : 78474 - 78494
  • [48] Top-k Query Processing on Encrypted Databases with Strong Security Guarantees
    Meng, Xianrui
    Zhu, Haohan
    Kollios, George
    2018 IEEE 34TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE), 2018, : 353 - 364
  • [49] External and Distributed Databases: Efficient and Secure XML Query Assurance
    Clarke, Andrew
    Pardede, Eric
    Steele, Robert
    INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2012, 5 (03) : 421 - 433
  • [50] External and Distributed Databases: Efficient and Secure XML Query Assurance
    Andrew Clarke
    Eric Pardede
    Robert Steele
    International Journal of Computational Intelligence Systems, 2012, 5 : 421 - 433