On query execution over encrypted data

被引:3
|
作者
Baby, Tinu [1 ]
Cherukuri, Aswani Kumar [1 ]
机构
[1] VIT Univ, Sch Informat Technol & Engn, Vellore 632014, Tamil Nadu, India
关键词
cloud computing; encryption; query translation; reachability matrix;
D O I
10.1002/sec.982
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To ensure the confidentiality of the encrypted data in a database-as-a-service model, the sensitive data need to be encrypted. When this encrypted data are queried, complete record has to be decrypted to fetch the actual results. This paper is concentrating on improving the performance of different query operations, that is, non-aggregate, aggregate, and user-defined query operations on encrypted data. The performance of these query operations over the encrypted data is compared with that of the available methods in terms of the execution time, and it is found that the efficiency of the proposed approach is better than that of the traditional approach. Effectiveness of different types of non-aggregate query operations is identified in terms of filter ratio and false ratio. The analysis has shown that the filter ratio increases and the false ratio decreases with increase in size of sensitive string and the reachability matrix generated for non-aggregate attribute. Copyright (c) 2014 John Wiley & Sons, Ltd.
引用
收藏
页码:321 / 331
页数:11
相关论文
共 50 条
  • [41] Searchable Encrypted String for Query Support on Different Encrypted Data Types
    Azizi, Shahrzad
    Mohammadpur, Davud
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (10): : 4198 - 4213
  • [42] Privacy-preserving ranked neighbor query over encrypted graph data in the cloud
    Zhu, Hong
    Wu, Bin
    Xie, Meiyi
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3167 - 3177
  • [43] Privacy-Preserving Complex Query Evaluation over Semantically Secure Encrypted Data
    Samanthula, Bharath Kumar
    Jiang, Wei
    Bertino, Elisa
    [J]. COMPUTER SECURITY - ESORICS 2014, PT I, 2014, 8712 : 400 - 418
  • [44] Efficient and Privacy-Preserving Edit Distance Query over Encrypted Genomic Data
    Zheng, Yandong
    Lu, Rongxing
    Shao, Jun
    Zhang, Yonggang
    Zhu, Hui
    [J]. 2019 11TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP), 2019,
  • [45] Efficient and Privacy-Preserving Spatial Keyword Similarity Query Over Encrypted Data
    Zhang, Songnian
    Ray, Suprio
    Lu, Rongxing
    Guan, Yunguo
    Zheng, Yandong
    Shao, Jun
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (05) : 3770 - 3786
  • [46] Secure k-Nearest Neighbor Query over Encrypted Data in Outsourced Environments
    Elmehdwi, Yousef
    Samanthula, Bharath K.
    Jiang, Wei
    [J]. 2014 IEEE 30TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE), 2014, : 664 - 675
  • [47] PRkNN: Efficient and Privacy-Preserving Reverse kNN Query Over Encrypted Data
    Zheng, Yandong
    Lu, Rongxing
    Zhang, Songnian
    Guan, Yunguo
    Wang, Fengwei
    Shao, Jun
    Zhu, Hui
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (05) : 4387 - 4402
  • [48] Enabling secure and efficient kNN query processing over encrypted spatial data in the cloud
    Cheng, Xiang
    Su, Sen
    Teng, Yiping
    Xiao, Ke
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (17) : 3205 - 3218
  • [49] Time-Restricted, Verifiable, and Efficient Query Processing Over Encrypted Data on Cloud
    Li, Meng
    Gao, Jianbo
    Zhu, Liehuang
    Zhang, Zijian
    Lal, Chhagan
    Conti, Mauro
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2024, 17 (03) : 1239 - 1251
  • [50] Efficient Privacy-Preserving Spatial Range Query Over Outsourced Encrypted Data
    Miao, Yinbin
    Yang, Yutao
    Li, Xinghua
    Liu, Zhiquan
    Li, Hongwei
    Choo, Kim-Kwang Raymond
    Deng, Robert H. H.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 3921 - 3933