Information Processing for Encrypted Database

被引:0
|
作者
Sun, Ruxia [1 ]
Yin, Chunyong [1 ]
机构
[1] Nanjing Univ Informat Sci Technol, Dept Comp Sci & Technol, Nanjing 210044, Peoples R China
关键词
Encrypted database; Query; Information exposing; Strategy;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In order to improve database security, and to avoid information exposing of access control strategy, data item was used as the encrypted principle, applying its property of basic granularity to strengthen the database security. Some solved method was given in the database currently. A new query algorithm was used to acquire improved encrypted data. The proposed algorithm uses average-value as principle to conceal the clear statement sequence. For field encryption, the information exposing was avoided by interference factor. A kind of information exposure of encrypted database was given in limited value area. The simulation results proved that the database security of modified method is higher than other method, and modified method has shorter response time.
引用
收藏
页码:252 / 255
页数:4
相关论文
共 50 条
  • [41] Multivariate Lattices for Encrypted Image Processing
    Pedrouzo-Ulloa, Alberto
    Ramon Troncoso-Pastoriza, Juan
    Perez-Gonzalez, Fernando
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING (ICASSP), 2015, : 1707 - 1711
  • [42] Processing Encrypted Floating Point Signals
    Franz, Martin
    Katzenbeisser, Stefan
    [J]. MM&SEC 11: PROCEEDINGS OF THE 2011 ACM SIGMM MULTIMEDIA AND SECURITY WORKSHOP, 2011, : 103 - 108
  • [43] Acoustic metaholograms for encrypted information transmission
    Fan, Xudong
    Zhu, Yifan
    Li, Ning
    Weng, Chunsheng
    Assouar, Badreddine
    [J]. PHYSICAL REVIEW APPLIED, 2023, 20 (04)
  • [44] Securely Sharing Encrypted Medical Information
    Gupta, Arnab Deb
    Polyakov, Yuriy
    Rohloff, Kurt
    Ryan, Gerard
    [J]. 2016 IEEE FIRST INTERNATIONAL CONFERENCE ON CONNECTED HEALTH: APPLICATIONS, SYSTEMS AND ENGINEERING TECHNOLOGIES (CHASE), 2016, : 330 - 331
  • [45] A Study on Batch Verification Scheme in Outsourced Encrypted Database
    Giau Ho Kim
    Manh Tran Cong
    Minh Nguyen Hieu
    [J]. SOICT 2019: PROCEEDINGS OF THE TENTH INTERNATIONAL SYMPOSIUM ON INFORMATION AND COMMUNICATION TECHNOLOGY, 2019, : 502 - 507
  • [46] Fast query over encrypted character data in database
    Wang, ZF
    Dai, J
    Wang, W
    Shi, BL
    [J]. COMPUTATIONAL AND INFORMATION SCIENCE, PROCEEDINGS, 2004, 3314 : 1027 - 1033
  • [47] Database Organization for More Effective Information Processing in Automatic Optical Inspection
    Feofanov A.N.
    Amachiev L.A.
    [J]. Russian Engineering Research, 2019, 39 (11) : 909 - 912
  • [49] Distributed and Independent Access to Quantum Encrypted Cloud Database
    Vidya, K.
    Devika, D.
    [J]. 2014 SIXTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, 2014, : 61 - 65
  • [50] VRS-DB: Computation Exploration on Encrypted Database
    Rauthan, Jitendra Singh
    Vaisla, Kunwar Singh
    [J]. PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON BIG DATA AND COMPUTATIONAL INTELLIGENCE (ICBDCI), 2019,