A Method of Query over Encrypted Data in Database

被引:3
|
作者
Liu, Lianzhong [1 ]
Gai, Jingfen [1 ]
机构
[1] Beijing Univ Aeronaut & Astronaut, Key Lab Beijing Network Technol, Sch Engn & Comp Sci, Beijing 100083, Peoples R China
关键词
query; encrypted data; Database; security;
D O I
10.1109/ICCET.2009.173
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The encryption mechanism is an effective way to protect the sensitive data in database from various attacks. When the data is encrypted, the query performance degrades greatly. How to query encrypted data efficiently becomes a challenge. In this paper, a scheme to support query over encrypted data is proposed. Firstly, we extend two-phase framework to complete query, constructing different indexes for different data types. A new method to construct Bucket index for numeric data is proposed and bloom filter compression algorithm is used for the character string, which will be saved in database as a numeric data. We analyzed the false positive probability of bloom filter to get optimal parameters. Experiment results show the performance of our scheme has improved.
引用
收藏
页码:23 / 27
页数:5
相关论文
共 50 条
  • [1] Fast query over encrypted character data in database
    Wang, ZF
    Dai, J
    Wang, W
    Shi, BL
    [J]. COMPUTATIONAL AND INFORMATION SCIENCE, PROCEEDINGS, 2004, 3314 : 1027 - 1033
  • [2] A novel approach for query over encrypted data in database
    Al-Saraireh, Jaafer
    [J]. International Journal of Information and Computer Security, 2019, 11 (06) : 621 - 636
  • [3] Storage and query over encrypted character and numerical data in database
    Wang, ZF
    Wang, W
    Shi, BL
    [J]. FIFTH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - PROCEEDINGS, 2005, : 77 - 81
  • [4] Query Execution over Encrypted Database
    Kumar, Raju Ranjan
    Hussain, Muzzammil
    [J]. 2015 SECOND INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING AND COMMUNICATION ENGINEERING ICACCE 2015, 2015, : 459 - 464
  • [5] A New Query Integrity Verification Method for Encrypted Data in Database Outsourcing
    Jang, Miyoung
    Yoon, Min
    Song, Youngho
    Chang, Jae-Woo
    [J]. Advanced Multimedia and Ubiquitous Engineering: Future Information Technology, 2015, 352 : 67 - 72
  • [6] A k-NN Query Method Over Encrypted Data
    Zhang, Zhiqiang
    Xin, Lijie
    Xie, Xiaoqin
    Pan, Haiwei
    [J]. PROCEEDINGS OF THE 2018 IEEE 22ND INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN ((CSCWD)), 2018, : 164 - 171
  • [7] Parallel query execution over encrypted data in database-as-a-service (DaaS)
    Awais Ahmad
    Mudassar Ahmad
    Muhammad Asif Habib
    Shahzad Sarwar
    Junaid Chaudhry
    Muhammad Ahsan Latif
    Saadat Hanif Dar
    Muhammad Shahid
    [J]. The Journal of Supercomputing, 2019, 75 : 2269 - 2288
  • [8] Parallel query execution over encrypted data in database-as-a-service (DaaS)
    Ahmad, Awais
    Ahmad, Mudassar
    Habib, Muhammad Asif
    Sarwar, Shahzad
    Chaudhry, Junaid
    Latif, Muhammad Ahsan
    Dar, Saadat Hanif
    Shahid, Muhammad
    [J]. JOURNAL OF SUPERCOMPUTING, 2019, 75 (04): : 2269 - 2288
  • [9] On query execution over encrypted data
    Baby, Tinu
    Cherukuri, Aswani Kumar
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (02) : 321 - 331
  • [10] A method of bucket index over encrypted character data in database
    Zhang, Yong
    Li, Wei-xin
    Niu, Xia-mu
    [J]. 2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL 1, PROCEEDINGS, 2007, : 186 - +