A security analysis for encrypted database

被引:0
|
作者
Mingsheng, Zhang [1 ]
Chunyong, Yin
机构
[1] Guizhou Univ, Coll Comp Sci & Engn, Guiyang 550025, Peoples R China
[2] Binzhou Coll, Dept Comp Sci, Binzhou 256600, Peoples R China
关键词
encrypted database; query; information exposing; strategy;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Encrypted database is an important area in database safety. The paper analyzes some method in the database currently. A new query algorithm is presented to achieve improved encrypted data. The proposed algorithm uses average-value as principle to conceal the clear statement sequence. For field encryption, this paper conceals the information to reveal by interference factor. The paper analyzes a kind of information exposure for encrypted database in limited value area. A large number of examples are presented to show short time responded.
引用
收藏
页码:987 / 990
页数:4
相关论文
共 50 条
  • [1] PEID: A Perceptually Encrypted Image Database for Visual Security Evaluation
    Guo, Shangwei
    Xiang, Tao
    Li, Xiaoguo
    Yang, Ying
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 1151 - 1163
  • [2] Security Analysis of Encrypted Virtual Machines
    Hetzelt, Felicitas
    Buhren, Robert
    [J]. ACM SIGPLAN NOTICES, 2017, 52 (07) : 129 - 142
  • [3] On a security model of conjunctive keyword search over encrypted relational database
    Byun, Jin Wook
    Lee, Dong Hoon
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (08) : 1364 - 1372
  • [4] Security sensor providing analysis of encrypted network data
    Hamburg, Daniel
    Tuechelmann, York
    [J]. WEBIST 2006: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS AND TECHNOLOGIES: INTERNET TECHNOLOGY / WEB INTERFACE AND APPLICATIONS, 2006, : 172 - +
  • [5] Scrambled Database with Encrypted Query Processing: CryptDB A Computational Analysis
    Rauthan, J. S.
    Vaisla, K. S.
    [J]. 2017 1ST INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND INFORMATION MANAGEMENT (ICISIM), 2017, : 199 - 211
  • [6] Information Processing for Encrypted Database
    Sun, Ruxia
    Yin, Chunyong
    [J]. ACC 2009: ETP/IITA WORLD CONGRESS IN APPLIED COMPUTING, COMPUTER SCIENCE, AND COMPUTER ENGINEERING, 2009, : 252 - 255
  • [7] Security analysis of selectively encrypted MPEG-2 streams
    Lookabaugh, T
    Sicker, DC
    Keaton, DM
    Guo, WY
    Vedula, I
    [J]. MULTIMEDIA SYSTEMS AND APPLICATIONS VI, 2003, 5241 : 10 - 21
  • [8] Perceptual security of encrypted images based on wavelet scaling analysis
    Vargas-Olmos, C.
    Murguia, J. S.
    Ramirez-Torres, M. T.
    Mejia Carlos, M.
    Rosu, H. C.
    Gonzalez-Aguilar, H.
    [J]. PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2016, 456 : 22 - 30
  • [9] Security of compressing encrypted sources
    Jakimoski, G.
    Subbalakshmi, K. P.
    [J]. CONFERENCE RECORD OF THE FORTY-FIRST ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS & COMPUTERS, VOLS 1-5, 2007, : 901 - 903
  • [10] Encrypted database integrity in database service provider model
    Hacigümüs, H
    Iyer, B
    Mehrotra, S
    [J]. CERTIFICATION AND SECURITY IN E-SERVICES: FROM E-GOVERNMENT TO E-BUSINESS, 2003, 127 : 165 - 174