On query execution over encrypted data

被引:3
|
作者
Baby, Tinu [1 ]
Cherukuri, Aswani Kumar [1 ]
机构
[1] VIT Univ, Sch Informat Technol & Engn, Vellore 632014, Tamil Nadu, India
关键词
cloud computing; encryption; query translation; reachability matrix;
D O I
10.1002/sec.982
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To ensure the confidentiality of the encrypted data in a database-as-a-service model, the sensitive data need to be encrypted. When this encrypted data are queried, complete record has to be decrypted to fetch the actual results. This paper is concentrating on improving the performance of different query operations, that is, non-aggregate, aggregate, and user-defined query operations on encrypted data. The performance of these query operations over the encrypted data is compared with that of the available methods in terms of the execution time, and it is found that the efficiency of the proposed approach is better than that of the traditional approach. Effectiveness of different types of non-aggregate query operations is identified in terms of filter ratio and false ratio. The analysis has shown that the filter ratio increases and the false ratio decreases with increase in size of sensitive string and the reachability matrix generated for non-aggregate attribute. Copyright (c) 2014 John Wiley & Sons, Ltd.
引用
收藏
页码:321 / 331
页数:11
相关论文
共 50 条
  • [1] Query Execution over Encrypted Database
    Kumar, Raju Ranjan
    Hussain, Muzzammil
    [J]. 2015 SECOND INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING AND COMMUNICATION ENGINEERING ICACCE 2015, 2015, : 459 - 464
  • [2] Parallel query execution over encrypted data in database-as-a-service (DaaS)
    Awais Ahmad
    Mudassar Ahmad
    Muhammad Asif Habib
    Shahzad Sarwar
    Junaid Chaudhry
    Muhammad Ahsan Latif
    Saadat Hanif Dar
    Muhammad Shahid
    [J]. The Journal of Supercomputing, 2019, 75 : 2269 - 2288
  • [3] Parallel query execution over encrypted data in database-as-a-service (DaaS)
    Ahmad, Awais
    Ahmad, Mudassar
    Habib, Muhammad Asif
    Sarwar, Shahzad
    Chaudhry, Junaid
    Latif, Muhammad Ahsan
    Dar, Saadat Hanif
    Shahid, Muhammad
    [J]. JOURNAL OF SUPERCOMPUTING, 2019, 75 (04): : 2269 - 2288
  • [4] On query result integrity over encrypted data
    Esiner, Ertem
    Datta, Anwitaman
    [J]. INFORMATION PROCESSING LETTERS, 2017, 122 : 34 - 39
  • [5] Expressive query over outsourced encrypted data
    Yang, Yang
    Liu, Ximeng
    Deng, Robert
    [J]. INFORMATION SCIENCES, 2018, 442 : 33 - 53
  • [6] A Method of Query over Encrypted Data in Database
    Liu, Lianzhong
    Gai, Jingfen
    [J]. 2009 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND TECHNOLOGY, VOL I, PROCEEDINGS, 2009, : 23 - 27
  • [7] Private Conjunctive Query over Encrypted Data
    Saha, Tushar Kanti
    Koshiba, Takeshi
    [J]. PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2017, 2017, 10239 : 149 - 164
  • [8] Distributed Query Evaluation over Encrypted Data
    di Vimercati, Sabrina De Capitani
    Foresti, Sara
    Jajodia, Sushil
    Livraga, Giovanni
    Paraboschi, Stefano
    Samarati, Pierangela
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXXV, 2021, 12840 : 96 - 114
  • [9] Fast query over encrypted character data in database
    Wang, ZF
    Dai, J
    Wang, W
    Shi, BL
    [J]. COMPUTATIONAL AND INFORMATION SCIENCE, PROCEEDINGS, 2004, 3314 : 1027 - 1033
  • [10] A novel approach for query over encrypted data in database
    Al-Saraireh, Jaafer
    [J]. International Journal of Information and Computer Security, 2019, 11 (06): : 621 - 636