Parallel query execution over encrypted data in database-as-a-service (DaaS)

被引:3
|
作者
Ahmad, Awais [1 ]
Ahmad, Mudassar [1 ]
Habib, Muhammad Asif [1 ]
Sarwar, Shahzad [2 ]
Chaudhry, Junaid [3 ]
Latif, Muhammad Ahsan [4 ]
Dar, Saadat Hanif [5 ]
Shahid, Muhammad [1 ]
机构
[1] NTU, Dept Comp Sci, Faisalabad, Pakistan
[2] Univ Punjab, PUCIT, Lahore, Pakistan
[3] Edith Cowan Univ, Sch Sci, Perth, WA 6027, Australia
[4] Univ Agr Faisalabad, Dept Comp Sci, Faisalabad, Pakistan
[5] Mirpur Univ Sci & Technol, Dept Software Engn, Mirpur, Ajk, Pakistan
来源
JOURNAL OF SUPERCOMPUTING | 2019年 / 75卷 / 04期
关键词
Database-as-a-service (DaaS); Outsourced database; Querying encrypted data; Parallel processing; Multithreading in DaaS; FULLY HOMOMORPHIC ENCRYPTION;
D O I
10.1007/s11227-019-02831-8
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The main challenge in database-as-a-service is the security and privacy of data because service providers are not usually considered as trustworthy. So, the data must be encrypted before storing into the database. Another challenge arises that the performance is degraded on the deployment of encryption algorithm on runtime. Furthermore, the connectivity through the Internet adds more delay. To tackle this, we have proposed parallel query execution methodology using multithreading technique up to 6 threads. We have conducted experiments up to 1000,000 (1 million) encrypted records. Our results are quite promising. For data encryption/decryption, we have used advance encryption standard with blocking length of 256 bits. We have designed our methodology in the context of parallel computation method proposed in the literature (Ho et al., in: Proceedings of the 2017 international conference on machine learning and soft computing, pp 47-52, 2017). We compared the results with state-of-art algorithms. The state-of-art algorithms execute the experiments on 10,120 encrypted records maximum which took about time of 1000 ms with 2 threads. But the proposed methodology is proved outstanding that executed the experiments which were performed on 100,000 encrypted records. It outperformed with 6 threads which took only 507 ms even with 2 threads, and the proposed methodology is much better which took only 994 ms. So, the efficiency and scalability of the proposed methodology are proved better as compared to state-of-the-art algorithms.
引用
收藏
页码:2269 / 2288
页数:20
相关论文
共 50 条
  • [31] Secure Range Query over Encrypted Data in Outsourced Environments
    Cui, Ningning
    Yang, Xiaochun
    Wang, Leixia
    Wang, Bin
    Li, Jianxin
    [J]. DATABASE SYSTEMS FOR ADVANCED APPLICATIONS (DASFAA 2018), PT II, 2018, 10828 : 112 - 129
  • [32] Query-Biased Preview over Outsourced and Encrypted Data
    Peng, Ningduo
    Luo, Guangchun
    Qin, Ke
    Chen, Aiguo
    [J]. SCIENTIFIC WORLD JOURNAL, 2013,
  • [33] Secure range query over encrypted data in outsourced environments
    Cui, Ningning
    Yang, Xiaochun
    Wang, Bin
    Geng, Jing
    Li, Jianxin
    [J]. WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2020, 23 (01): : 491 - 517
  • [34] Secure range query over encrypted data in outsourced environments
    Ningning Cui
    Xiaochun Yang
    Bin Wang
    Jing Geng
    Jianxin Li
    [J]. World Wide Web, 2020, 23 : 491 - 517
  • [35] Parallel Query Evaluation as a Scientific Data Service
    Doug, Bin
    Byna, Surendra
    Wu, Kesheng
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON CLUSTER COMPUTING (CLUSTER), 2014, : 194 - 202
  • [36] Order-Hiding Range Query Over Encrypted Cloud Data
    Kwon, Hyunsoo
    Hur, Junbeom
    Hahn, Changhee
    [J]. IEEE ACCESS, 2022, 10 : 75604 - 75618
  • [37] Integrated query management system IQMS - (Control of parallel execution of sub-query of database on distributed system)
    Sitohang, B
    [J]. CCCT 2003, VOL 5, PROCEEDINGS: COMPUTER, COMMUNICATION AND CONTROL TECHNOLOGIES: II, 2003, : 198 - 202
  • [38] Verifiable Spatial Range Query Over Encrypted Cloud Data in VANET
    Meng, Qian
    Weng, Jian
    Miao, Yinbin
    Chen, Kefei
    Shen, Zhonghua
    Wang, Fuqun
    Li, Zhijun
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 70 (12) : 12342 - 12357
  • [39] Efficient outsourcing of secure k-nearest neighbour query over encrypted database
    Xu, Rui
    Morozou, Kirill
    Yang, Yanjiang
    Zhou, Jianying
    Takagi, Tsuyoshi
    [J]. COMPUTERS & SECURITY, 2017, 69 : 65 - 83
  • [40] Efficient and Privacy-Preserving Eclipse Query over Encrypted Data
    Song, Weiyu
    Zhang, Yonggang
    Sun, Lili
    Zheng, Yandong
    Lu, Rongxing
    [J]. IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 1 - 6