Performance evaluation on encrypted - non encrypted database fields containing IoT data

被引:1
|
作者
Asiminidis, Christodoulos [1 ]
Georgiadis, Ioannis [1 ]
Syndoukas, Dimitrios [2 ]
Kokkonis, George [2 ]
Kontogiannis, Sotirios [1 ]
机构
[1] Univ Ioannina, Dept Math, Lab Team Distributed Microcomp Syst, Ioannina, Greece
[2] Techn Edu Inst Western Macedonia, Dept Business Adm, Grevena, Greece
关键词
Database encryption; Big data; IoT; performance evaluation;
D O I
10.1145/3331076.3331097
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Encrypted data transmitted from secure wireless channels as part of Internet of Things (IoT) infrastructures are mainly stored in database tables using plaintext records. As IoT data content confidence in supportive A.I. actions radically increases, the selection and use of database encryption is essential in terms of data integrity safety as well as IoT operations or decisions validity and non repudiation. Taking into account the amount of stored IoT data, data filtering and processing overhead needed for aptly decision making, it is essential for a developer to seriously take into account encryption-decryption queries overheads for big IoT data processing tasks, as well as extra time delays on encryption-decryption operations, since these translate into idle or receiving states energy expenditures at the wireless IoT motes.
引用
收藏
页码:329 / 330
页数:2
相关论文
共 50 条
  • [1] A Method of Query over Encrypted Data in Database
    Liu, Lianzhong
    Gai, Jingfen
    [J]. 2009 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND TECHNOLOGY, VOL I, PROCEEDINGS, 2009, : 23 - 27
  • [2] A Survey on Querying Encrypted Data for Database as a Service
    Ravan, Rama Roshan
    Idris, Norbik Bashah
    Mehrabani, Zahra
    [J]. 2013 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2013, : 14 - 18
  • [3] Performance Evaluation of Encryption Techniques and Uploading of Encrypted Data in Cloud
    Sreenivas, V.
    Narasimham, C.
    Subrahmanyam, K.
    Yellamma, P.
    [J]. 2013 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND NETWORKING TECHNOLOGIES (ICCCNT), 2013,
  • [4] Computing over encrypted spatial data generated by IoT
    Suresh V. Limkar
    Rakesh Kumar Jha
    [J]. Telecommunication Systems, 2019, 70 : 193 - 229
  • [5] Computing over encrypted spatial data generated by IoT
    Limkar, Suresh V.
    Jha, Rakesh Kumar
    [J]. TELECOMMUNICATION SYSTEMS, 2019, 70 (02) : 193 - 229
  • [6] Secure Sharing of Partially Homomorphic Encrypted IoT Data
    Shafagh, Hossein
    Hithnawi, Anwar
    Burkhalter, Lukas
    Fischli, Pascal
    Duquennoy, Simon
    [J]. PROCEEDINGS OF THE 15TH ACM CONFERENCE ON EMBEDDED NETWORKED SENSOR SYSTEMS (SENSYS'17), 2017,
  • [7] Fast query over encrypted character data in database
    Wang, ZF
    Dai, J
    Wang, W
    Shi, BL
    [J]. COMPUTATIONAL AND INFORMATION SCIENCE, PROCEEDINGS, 2004, 3314 : 1027 - 1033
  • [8] A novel approach for query over encrypted data in database
    Al-Saraireh, Jaafer
    [J]. International Journal of Information and Computer Security, 2019, 11 (06) : 621 - 636
  • [9] Efficient cryptanalysis of an encrypted database supporting data interoperability
    Shi, Gongyu
    Wang, Geng
    Sun, Shi-Feng
    Gu, Dawu
    [J]. VLDB JOURNAL, 2024, 33 (05): : 1357 - 1375
  • [10] Yugala: Blockchain based Encrypted Cloud Storage for IoT Data
    Gochhayat, Sarada Prasad
    Bandara, Eranga
    Shetty, Sachin
    Foytik, Peter
    [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN (BLOCKCHAIN 2019), 2019, : 483 - 489