A method of bucket index over encrypted character data in database

被引:0
|
作者
Zhang, Yong [1 ,2 ]
Li, Wei-xin [1 ]
Niu, Xia-mu [2 ,3 ]
机构
[1] Harbin Inst Technol, Shenzhen Grad Sch, Guangdong 518057, Peoples R China
[2] Shenzhen Tech Innovat Intl, Shenzhen Key Lab Network Informat Wiring, Shenzhen 518057, Peoples R China
[3] Harbin Inst Technol, Sch Comp Sci & Technol, Harbin 151001, Peoples R China
基金
中国国家自然科学基金;
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The encryption mechanism is the common method to protect the sensitive data in database from various attacks. But once the data in databases is encrypted the efficiency of DBMS will fall. To enhance the security of the sensitive data and to improve the efficiency of the encrypted database, one effective method is to build index on the encrypted field and firstly executes the query on the index to get fewer records to decrypt in this paper. This paper proposes an index mechanism of bucket index on the character data, which has close relationships with all of its characters. The index tries to translate the character string into a numeric data, on which the primary query will be processed to filtrate the records roughly. Only the rest records need to be decrypted, and it will save lots of time. So the cipher index can improve the query efficiency greatly.
引用
收藏
页码:186 / +
页数:2
相关论文
共 50 条
  • [41] Efficient wildcard search over encrypted data
    Changhui Hu
    Lidong Han
    International Journal of Information Security, 2016, 15 : 539 - 547
  • [42] Efficient Computations over Encrypted Data Blocks
    Di Crescenzo, Giovanni
    Coan, Brian
    Kirsch, Jonathan
    MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE 2015, PT II, 2015, 9235 : 274 - 286
  • [43] JCrypt: Towards computation over encrypted data
    Rensselaer Polytechnic Institute, Troy
    NY, United States
    不详
    ACM Int. Conf. Proc. Ser.,
  • [44] Intrusion Detection Over Encrypted Network Data
    Karacay, Leyli
    Savas, Erkay
    Alptekin, Halit
    COMPUTER JOURNAL, 2020, 63 (04): : 604 - 619
  • [45] Detecting Data Exfiltration over Encrypted DNS
    Steadman, Jacob
    Scott-Hayward, Sandra
    PROCEEDINGS OF THE 2022 IEEE 8TH INTERNATIONAL CONFERENCE ON NETWORK SOFTWARIZATION (NETSOFT 2022): NETWORK SOFTWARIZATION COMING OF AGE: NEW CHALLENGES AND OPPORTUNITIES, 2022, : 429 - 437
  • [46] Accelerated Search over Encrypted Cloud Data
    Boucenna, Fateh
    Nouali, Omar
    Dabah, Adel
    Kechid, Samir
    2017 IEEE INTERNATIONAL CONFERENCE ON BIG DATA AND SMART COMPUTING (BIGCOMP), 2017, : 170 - 177
  • [47] Expressive query over outsourced encrypted data
    Yang, Yang
    Liu, Ximeng
    Deng, Robert
    INFORMATION SCIENCES, 2018, 442 : 33 - 53
  • [48] Encrypted Data Transmission Over an Open Channel
    Vavrenyuk, Aleksander B.
    Makarov, Viktor V.
    Shurygin, Viktor A.
    Tcibisov, Dmitrii, V
    BIOLOGICALLY INSPIRED COGNITIVE ARCHITECTURES 2018, 2019, 848 : 316 - 325
  • [49] On query result integrity over encrypted data
    Esiner, Ertem
    Datta, Anwitaman
    INFORMATION PROCESSING LETTERS, 2017, 122 : 34 - 39
  • [50] Secure Cloud Auditing over Encrypted Data
    Shaikh, Sarah
    Vora, Deepali
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMMUNICATION AND ELECTRONICS SYSTEMS (ICCES), 2016, : 693 - 697