A Survey on Querying Encrypted Data for Database as a Service

被引:2
|
作者
Ravan, Rama Roshan [1 ]
Idris, Norbik Bashah [1 ]
Mehrabani, Zahra [2 ]
机构
[1] Univ Teknol Malaysia, Adv Informat Sch, Kuala Lumpur, Malaysia
[2] UCTI Univ, Asian Pacific Univ, Kuala Lumpur, Malaysia
关键词
Privacy; DbaaS; Database Security; Database Outsourcing; Encrypted Database; Query on Encrypted Data;
D O I
10.1109/CyberC.2013.12
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
using database encryption to protect data in some situations where access control is not solely enough is inevitable. Database encryption provides an additional layer of protection to conventional access control techniques. It prevents unauthorized users, including intruders breaking into a network, from viewing the sensitive data. As a result data keeps protected even in the incident that database is successfully attacked or stolen. However, data encryption and decryption process result in database performance degradation. In the situation where all the information is stored in encrypted form, one cannot make the selection on the database content any more. Data should be decrypted first, so an unwilling tradeoff between the security and the performance is normally forced. The appropriate approaches to increase the performance are methods to deal directly with the encrypted data without firstly decrypting them. This paper while introduce some methods for searching on encrypted data, provides a comparison study between current methods in terms of performance and security.
引用
收藏
页码:14 / 18
页数:5
相关论文
共 50 条
  • [1] A survey on querying encrypted XML documents for databases as a service
    Unay, Ozan
    Gundem, Taflan I.
    [J]. SIGMOD RECORD, 2008, 37 (01) : 12 - 20
  • [2] Querying Encrypted Data
    Arasu, Arvind
    Eguro, Ken
    Kaushik, Raghav
    Ramamurthy, Ravi
    [J]. SIGMOD'14: PROCEEDINGS OF THE 2014 ACM SIGMOD INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA, 2014, : 1259 - 1261
  • [3] Querying Encrypted Data
    Arasu, Arvind
    Eguro, Ken
    Kaushik, Raghav
    Ramamurthy, Ravi
    [J]. 2013 IEEE 29TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE), 2013, : 1262 - 1263
  • [4] Querying Encrypted OLAP Data
    Cuzzocrea, Alfredo
    Grasso, Giorgio Mario
    [J]. 2017 IEEE 41ST ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), VOL 2, 2017, : 161 - 163
  • [5] Security issues in querying encrypted data
    Kantarcioglu, M
    Clifton, C
    [J]. DATA AND APPLICATIONS SECURITY XIX, PROCEEDINGS, 2005, 3654 : 325 - 337
  • [6] An Improved Algorithm for Querying Encrypted Data in the Cloud
    Shastri, Samraddhi
    Kresman, Ray
    Lee, Jong Kwan
    [J]. 2015 FIFTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT2015), 2015, : 653 - 656
  • [7] Encrypted database integrity in database service provider model
    Hacigümüs, H
    Iyer, B
    Mehrotra, S
    [J]. CERTIFICATION AND SECURITY IN E-SERVICES: FROM E-GOVERNMENT TO E-BUSINESS, 2003, 127 : 165 - 174
  • [8] Design and analysis of querying encrypted data in relational databases
    Canim, Mustafa
    Kantarcioglu, Murat
    [J]. DATA AND APPLICATIONS SECURITY XXI, PROCEEDINGS, 2007, 4602 : 177 - +
  • [9] Parallel query execution over encrypted data in database-as-a-service (DaaS)
    Awais Ahmad
    Mudassar Ahmad
    Muhammad Asif Habib
    Shahzad Sarwar
    Junaid Chaudhry
    Muhammad Ahsan Latif
    Saadat Hanif Dar
    Muhammad Shahid
    [J]. The Journal of Supercomputing, 2019, 75 : 2269 - 2288
  • [10] Parallel query execution over encrypted data in database-as-a-service (DaaS)
    Ahmad, Awais
    Ahmad, Mudassar
    Habib, Muhammad Asif
    Sarwar, Shahzad
    Chaudhry, Junaid
    Latif, Muhammad Ahsan
    Dar, Saadat Hanif
    Shahid, Muhammad
    [J]. JOURNAL OF SUPERCOMPUTING, 2019, 75 (04): : 2269 - 2288