A security analysis for encrypted database

被引:0
|
作者
Mingsheng, Zhang [1 ]
Chunyong, Yin
机构
[1] Guizhou Univ, Coll Comp Sci & Engn, Guiyang 550025, Peoples R China
[2] Binzhou Coll, Dept Comp Sci, Binzhou 256600, Peoples R China
关键词
encrypted database; query; information exposing; strategy;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Encrypted database is an important area in database safety. The paper analyzes some method in the database currently. A new query algorithm is presented to achieve improved encrypted data. The proposed algorithm uses average-value as principle to conceal the clear statement sequence. For field encryption, this paper conceals the information to reveal by interference factor. The paper analyzes a kind of information exposure for encrypted database in limited value area. A large number of examples are presented to show short time responded.
引用
收藏
页码:987 / 990
页数:4
相关论文
共 50 条
  • [21] CryptDB: Processing Queries on an Encrypted Database
    Popa, Raluca Ada
    Redfield, Catherine M. S.
    Zeldovich, Nickolai
    Balakrishnan, Hari
    [J]. COMMUNICATIONS OF THE ACM, 2012, 55 (09) : 103 - 111
  • [22] Security issues in querying encrypted data
    Kantarcioglu, M
    Clifton, C
    [J]. DATA AND APPLICATIONS SECURITY XIX, PROCEEDINGS, 2005, 3654 : 325 - 337
  • [23] Encrypted watermarks and Linux laptop security
    Saarinen, MJO
    [J]. INFORMATION SECURITY APPLICATIONS, 2005, 3325 : 27 - 38
  • [24] Performance evaluation on encrypted - non encrypted database fields containing IoT data
    Asiminidis, Christodoulos
    Georgiadis, Ioannis
    Syndoukas, Dimitrios
    Kokkonis, George
    Kontogiannis, Sotirios
    [J]. IDEAS '19: PROCEEDINGS OF THE 23RD INTERNATIONAL DATABASE APPLICATIONS & ENGINEERING SYMPOSIUM (IDEAS 2019), 2019, : 329 - 330
  • [25] Computer Database Security Management Analysis and Discussion
    Hu, Kai
    [J]. PROCEEDINGS OF THE 2015 3RD INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 35 : 54 - 57
  • [26] On Security Notions for Verifiably Encrypted Signature
    Wang, Xu An
    Yang, Xiaoyuan
    Peng, Qingquan
    [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 37 - 40
  • [27] As an Example in SQL SERVER Database Security Analysis
    Wang, Huanjing
    Zhang, Haiyan
    [J]. ACC 2009: ETP/IITA WORLD CONGRESS IN APPLIED COMPUTING, COMPUTER SCIENCE, AND COMPUTER ENGINEERING, 2009, : 438 - 442
  • [28] Security analysis of civil registry database of Ecuador
    Toapanta, Segundo Moises Toapanta
    Gallegos, Luis Enrique Mafla
    Orizaga Trejo, Jose Antonio
    [J]. 2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 1024 - 1029
  • [29] The Analysis of the Security Strategy of Embedded Mobile Database
    Wang, Huaixiang
    Dang, Deyu
    Min, Shi
    [J]. PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 6, 2010, : 476 - 478
  • [30] Balancing Security and Usability in Encrypted Email
    Bai, Wei
    Kim, Doowon
    Namara, Moses
    Qian, Yichen
    Gage Kelley, Patrick
    Mazurek, Michelle L.
    [J]. IEEE INTERNET COMPUTING, 2017, 21 (03) : 30 - 38