Information Processing for Encrypted Database

被引:0
|
作者
Sun, Ruxia [1 ]
Yin, Chunyong [1 ]
机构
[1] Nanjing Univ Informat Sci Technol, Dept Comp Sci & Technol, Nanjing 210044, Peoples R China
关键词
Encrypted database; Query; Information exposing; Strategy;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In order to improve database security, and to avoid information exposing of access control strategy, data item was used as the encrypted principle, applying its property of basic granularity to strengthen the database security. Some solved method was given in the database currently. A new query algorithm was used to acquire improved encrypted data. The proposed algorithm uses average-value as principle to conceal the clear statement sequence. For field encryption, the information exposing was avoided by interference factor. A kind of information exposure of encrypted database was given in limited value area. The simulation results proved that the database security of modified method is higher than other method, and modified method has shorter response time.
引用
收藏
页码:252 / 255
页数:4
相关论文
共 50 条
  • [1] CryptDB: Processing Queries on an Encrypted Database
    Popa, Raluca Ada
    Redfield, Catherine M. S.
    Zeldovich, Nickolai
    Balakrishnan, Hari
    [J]. COMMUNICATIONS OF THE ACM, 2012, 55 (09) : 103 - 111
  • [2] Licensed Processing of Encrypted Information
    Rass, Stefan
    Schartner, Peter
    [J]. 2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2015, : 703 - 704
  • [3] A Secure Range Query Processing Algorithm for the Encrypted Database on the Cloud
    Kim, Hyeong-Il
    Choi, Munchul
    Kim, Hyeong-Jin
    Chang, Jae-Woo
    [J]. ADVANCED MULTIMEDIA AND UBIQUITOUS ENGINEERING: FUTURETECH & MUE, 2016, 393 : 101 - 110
  • [4] Secure Query Processing Over Encrypted Database Through CryptDB
    Kumar, Ashutosh
    Hussain, Muzzammil
    [J]. RECENT FINDINGS IN INTELLIGENT COMPUTING TECHNIQUES, VOL 3, 2018, 709 : 307 - 319
  • [5] PARALLEL PROCESSING OF ENCRYPTED XML DOCUMENTS IN DATABASE AS A SERVICE CONCEPT
    Unay, Ozan
    Gundem, Taflan Imre
    [J]. INFORMATION TECHNOLOGY AND CONTROL, 2010, 39 (04): : 301 - 309
  • [6] Scrambled Database with Encrypted Query Processing: CryptDB A Computational Analysis
    Rauthan, J. S.
    Vaisla, K. S.
    [J]. 2017 1ST INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND INFORMATION MANAGEMENT (ICISIM), 2017, : 199 - 211
  • [7] Encrypted SQL Arithmetic Functions Processing for Secure Cloud Database
    Parbat, Tanusree
    Chatterjee, Ayantika
    [J]. SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, SPACE 2021, 2022, 13162 : 207 - 225
  • [8] The processing of discreet information in a database
    De Backer, P
    [J]. REVUE BELGE DE PHILOLOGIE ET D HISTOIRE, 2003, 81 (02): : 391 - 394
  • [9] A kNN Query Processing Algorithm using a Tree Index Structure on the Encrypted Database
    Kim, Hyeong-Il
    Kim, Hyeong-Jin
    Chang, Jae-Woo
    [J]. 2016 INTERNATIONAL CONFERENCE ON BIG DATA AND SMART COMPUTING (BIGCOMP), 2016, : 93 - 100
  • [10] A security analysis for encrypted database
    Mingsheng, Zhang
    Chunyong, Yin
    [J]. 2007 International Symposium on Computer Science & Technology, Proceedings, 2007, : 987 - 990