Information Processing for Encrypted Database

被引:0
|
作者
Sun, Ruxia [1 ]
Yin, Chunyong [1 ]
机构
[1] Nanjing Univ Informat Sci Technol, Dept Comp Sci & Technol, Nanjing 210044, Peoples R China
关键词
Encrypted database; Query; Information exposing; Strategy;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In order to improve database security, and to avoid information exposing of access control strategy, data item was used as the encrypted principle, applying its property of basic granularity to strengthen the database security. Some solved method was given in the database currently. A new query algorithm was used to acquire improved encrypted data. The proposed algorithm uses average-value as principle to conceal the clear statement sequence. For field encryption, the information exposing was avoided by interference factor. A kind of information exposure of encrypted database was given in limited value area. The simulation results proved that the database security of modified method is higher than other method, and modified method has shorter response time.
引用
收藏
页码:252 / 255
页数:4
相关论文
共 50 条
  • [31] A Method of Query over Encrypted Data in Database
    Liu, Lianzhong
    Gai, Jingfen
    [J]. 2009 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND TECHNOLOGY, VOL I, PROCEEDINGS, 2009, : 23 - 27
  • [32] THE KEY MANAGEMENT OF THE ENCRYPTED DATABASE BASED ON XML
    Zhang, Yong
    Zhang, Hui
    Niu, Xia-Mu
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2009, 5 (07): : 1919 - 1926
  • [33] The database, the network and the digital community: the new dynamics of information processing
    Worlock, DR
    [J]. ELECTRONIC LIBRARY, 1997, 15 (05): : 383 - 388
  • [34] Fingerprint information database system based on image processing technology
    Cai, Zhao
    Lin, Miao Xiang
    Xu Dawei
    [J]. PROCEEDINGS OF THE 2018 3RD INTERNATIONAL WORKSHOP ON MATERIALS ENGINEERING AND COMPUTER SCIENCES (IWMECS 2018), 2018, 78 : 250 - 254
  • [35] Efficient key updates in encrypted database systems
    Hacigümüs, H
    Mehrotra, S
    [J]. SECURE DATA MANAGEMENT, PROCEEDINGS, 2005, 3674 : 1 - 15
  • [36] A Survey on Querying Encrypted Data for Database as a Service
    Ravan, Rama Roshan
    Idris, Norbik Bashah
    Mehrabani, Zahra
    [J]. 2013 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2013, : 14 - 18
  • [37] Efficient Parallel Summation on Encrypted Database System
    Horio, Kentaro
    Kawashima, Hideyuki
    Tatebe, Osamu
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON BIG DATA AND SMART COMPUTING (BIGCOMP), 2017, : 178 - 185
  • [38] Image search scheme over encrypted database
    Ye, Jun
    Xu, Zheng
    Ding, Yong
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 87 : 251 - 258
  • [39] Encrypted Signal Processing for Privacy Protection
    Lagendijk, R. L.
    Erkin, Zekeriya
    Barni, Mauro
    [J]. IEEE SIGNAL PROCESSING MAGAZINE, 2013, 30 (01) : 82 - 105
  • [40] IMAGE ANALYSIS AND PROCESSING IN THE ENCRYPTED DOMAIN
    Puteaux, Pauline
    [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP), 2019, : 3020 - 3022