A method of bucket index over encrypted character data in database

被引:0
|
作者
Zhang, Yong [1 ,2 ]
Li, Wei-xin [1 ]
Niu, Xia-mu [2 ,3 ]
机构
[1] Harbin Inst Technol, Shenzhen Grad Sch, Guangdong 518057, Peoples R China
[2] Shenzhen Tech Innovat Intl, Shenzhen Key Lab Network Informat Wiring, Shenzhen 518057, Peoples R China
[3] Harbin Inst Technol, Sch Comp Sci & Technol, Harbin 151001, Peoples R China
基金
中国国家自然科学基金;
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The encryption mechanism is the common method to protect the sensitive data in database from various attacks. But once the data in databases is encrypted the efficiency of DBMS will fall. To enhance the security of the sensitive data and to improve the efficiency of the encrypted database, one effective method is to build index on the encrypted field and firstly executes the query on the index to get fewer records to decrypt in this paper. This paper proposes an index mechanism of bucket index on the character data, which has close relationships with all of its characters. The index tries to translate the character string into a numeric data, on which the primary query will be processed to filtrate the records roughly. Only the rest records need to be decrypted, and it will save lots of time. So the cipher index can improve the query efficiency greatly.
引用
收藏
页码:186 / +
页数:2
相关论文
共 50 条
  • [1] Secure cipher index over encrypted character data in database
    Zhang, Yong
    Li, Wei-Xin
    Niu, Xia-Mu
    [J]. PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2008, : 1111 - +
  • [2] Fast query over encrypted character data in database
    Wang, ZF
    Dai, J
    Wang, W
    Shi, BL
    [J]. COMPUTATIONAL AND INFORMATION SCIENCE, PROCEEDINGS, 2004, 3314 : 1027 - 1033
  • [3] Storage and query over encrypted character and numerical data in database
    Wang, ZF
    Wang, W
    Shi, BL
    [J]. FIFTH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - PROCEEDINGS, 2005, : 77 - 81
  • [4] A Method of Query over Encrypted Data in Database
    Liu, Lianzhong
    Gai, Jingfen
    [J]. 2009 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND TECHNOLOGY, VOL I, PROCEEDINGS, 2009, : 23 - 27
  • [5] A novel approach for query over encrypted data in database
    Al-Saraireh, Jaafer
    [J]. International Journal of Information and Computer Security, 2019, 11 (06) : 621 - 636
  • [6] Executing SQL queries over encrypted character strings in the Database-As-Service model
    Wu, ZongDa
    Xu, GuanDong
    Yu, Zong
    Yi, Xun
    Chen, EnHong
    Zhang, YanChun
    [J]. KNOWLEDGE-BASED SYSTEMS, 2012, 35 : 332 - 348
  • [7] Privacy-aware Character Pattern Matching over Outsourced Encrypted Data
    Mainardi, Nicholas
    Barenghi, Alessandro
    Pelosi, Gerardo
    [J]. DIGITAL THREATS: RESEARCH AND PRACTICE, 2022, 3 (01):
  • [8] Query Execution over Encrypted Database
    Kumar, Raju Ranjan
    Hussain, Muzzammil
    [J]. 2015 SECOND INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING AND COMMUNICATION ENGINEERING ICACCE 2015, 2015, : 459 - 464
  • [9] A New Query Integrity Verification Method for Encrypted Data in Database Outsourcing
    Jang, Miyoung
    Yoon, Min
    Song, Youngho
    Chang, Jae-Woo
    [J]. Advanced Multimedia and Ubiquitous Engineering: Future Information Technology, 2015, 352 : 67 - 72
  • [10] Parallel query execution over encrypted data in database-as-a-service (DaaS)
    Awais Ahmad
    Mudassar Ahmad
    Muhammad Asif Habib
    Shahzad Sarwar
    Junaid Chaudhry
    Muhammad Ahsan Latif
    Saadat Hanif Dar
    Muhammad Shahid
    [J]. The Journal of Supercomputing, 2019, 75 : 2269 - 2288