A Query Conversion Scheme for Encrypted Cloud Databases

被引:0
|
作者
Xian, Hequn [1 ]
Li, Jing [1 ]
Lu, Xiuqing [1 ]
机构
[1] Qingdao Univ, Coll Informat Engn, Qingdao 266071, Peoples R China
关键词
query conversion; cloud databases; SQL gateway;
D O I
10.1109/ITA.2013.40
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Encryption is an effective way of protecting sensitive data that have been outsourced in the cloud computing environment. But it is computationally expensive for the database management system to carry out SQL queries against the encrypted data. A query conversion scheme is presented which converts traditional database queries to encryption specific versions so that the queries can be directly executed on the cloud server. This scheme dramatically increases the efficiency of query processing in encrypted cloud databases, and it provides high transparency for end users by introducing a SQL gateway to the user applications and the cloud server.
引用
收藏
页码:147 / 150
页数:4
相关论文
共 50 条
  • [1] Facilitating Secure Query Processing on Encrypted Databases on the Cloud
    Ben Omran, Osama M.
    Panda, Brajendra
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON SMART CLOUD (SMARTCLOUD), 2016, : 307 - 312
  • [2] Secure and Efficient Query Processing Technique for Encrypted Databases in Cloud
    Almakdi, Sultan
    Panda, Brajendra
    [J]. 2019 2ND INTERNATIONAL CONFERENCE ON DATA INTELLIGENCE AND SECURITY (ICDIS 2019), 2019, : 120 - 127
  • [3] A Novel Data Deduplication Scheme for Encrypted Cloud Databases
    Li, Jung-Shian
    Liu, I-Hsien
    Lee, Chao-Yuan
    Li, Chu-Fen
    Liu, Chuan-Gang
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2020, 21 (04): : 1115 - 1125
  • [4] Access control enforcement on query-aware encrypted cloud databases
    Ferretti, Luca
    Colajanni, Michele
    Marchetti, Mirco
    [J]. 2013 IEEE FIFTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), VOL 2, 2013, : 717 - 722
  • [5] Clustering-based Query Result Authenticaion for Encrypted Databases in Cloud
    Jang, Miyoung
    Yoon, Min
    Youn, Deulnyeok
    Chang, Jae-Woo
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2014 IEEE 6TH INTL SYMP ON CYBERSPACE SAFETY AND SECURITY, 2014 IEEE 11TH INTL CONF ON EMBEDDED SOFTWARE AND SYST (HPCC,CSS,ICESS), 2014, : 1076 - 1082
  • [6] An Effective Encrypted Scheme Over Outsourcing Data for Query on Cloud Platform
    Tang, Jianchao
    Fu, Shaojing
    Xu, Ming
    [J]. IEEE ACCESS, 2019, 7 : 66242 - 66250
  • [7] Secure search scheme for encrypted data in the VANET cloud with random query trapdoor
    Hegde, Nayana
    Manvi, Sunilkumar S.
    Lallie, Harjinder Singh
    [J]. INFORMATION SECURITY JOURNAL, 2023, 32 (05): : 383 - 400
  • [8] Efficient and Verifiable Range Query Scheme for Encrypted Geographical Information in Untrusted Cloud Environments
    Mei, Zhuolin
    Zeng, Jing
    Zhang, Caicai
    Yao, Shimao
    Zhang, Shunli
    Wang, Haibin
    Li, Hongbo
    Shi, Jiaoli
    [J]. ISPRS INTERNATIONAL JOURNAL OF GEO-INFORMATION, 2024, 13 (08)
  • [9] SecEQP: A Secure and Efficient Scheme for SkNN Query Problem over Encrypted Geodata on Cloud
    Lei, Xinyu
    Liu, Alex X.
    Li, Rui
    Tu, Guan-Hua
    [J]. 2019 IEEE 35TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2019), 2019, : 662 - 673
  • [10] A NOVEL MODEL FOR QUERY OVER ENCRYPTED XML DATABASES
    Liu, Nian
    Zhou, Yajian
    Niu, Xinxin
    Yang, Yixian
    [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON NETWORK INFRASTRUCTURE AND DIGITAL CONTENT, PROCEEDINGS, 2009, : 986 - 990