A novel approach for query over encrypted data in database

被引:0
作者
Al-Saraireh J. [1 ]
机构
[1] Princess Sumaya University for Technology, Amman
关键词
Database; Encryption; Hash value; Secure data; Security; SQL;
D O I
10.1504/IJICS.2019.103083
中图分类号
学科分类号
摘要
Database management is considered an essential component of many information systems to store data. Some database system contains secure data; these data are protected by using encryption techniques. The query performance is affected by encryption techniques. Therefore; should be a balance between the security and performance. A new technique in this research work has been proposed to enhance the query performance over the encrypted fields in a database system. This technique is based on producing a unique hash value for each secure data and transforms the SQL query into an appropriate formula to be executed over the hash value fields. The proposed approach has eliminated any statistical relationship between encrypted and hash value fields. The time of execution encryption/decryption is reduced to enhance the performance of the query over encrypted secure data in the proposed technique. A set of experiments are carried out, and the results indicate that the performance of SQL-query is enhanced by reducing the average response time to 14 compared with others related approaches. Copyright © 2019 Inderscience Enterprises Ltd.
引用
收藏
页码:621 / 636
页数:15
相关论文
共 26 条
[1]  
Alhanjouri M., Al Derawi A.M., A new method of query over encrypted data in database using hash map, International Journal of Computer Applications, 41, 4, pp. 975-8887, (2012)
[2]  
Ali A., Mazhar Afzal D., Database security: Threats and solutions, International Journal of Engineering Inventions, 6, 2, pp. 2278-7461, (2017)
[3]  
Al-Saraireh J., An efficient approach for query processing over encrypted database, Journal of Computer Science, 13, 10, pp. 548-557, (2017)
[4]  
Alsirhani A., Bodorik P., Sampalli S., Improving database security in cloud computing by fragmentation of data, International Conference on Computer and Applications (ICCA), pp. 43-49, (2017)
[5]  
Arasu A., Et al., Querying encrypted data, Proceedings of the 2014 ACM SIGMOD International Conference on Management of Data - SIGMOD '14, pp. 1259-1261, (2014)
[6]  
Guo C., Et al., Fine-grained database field search using attribute-based encryption for e-healthcare clouds, Journal of Medical Systems, 40, 11, pp. 235-242, (2016)
[7]  
Hacigumus H., Et al., Executing SQL over encrypted data in the database-service-provider model, Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data - SIGMOD '02, pp. 216-227, (2002)
[8]  
Hacigumus H., Iyer B., Mehrotra S., Efficient execution of aggregation queries over encrypted relational databases, Database Systems for Advances Applications, 9th International Conference, pp. 125-136, (2004)
[9]  
Hore B., Mehrotra S., Tsudik G., A privacy-preserving index for range queries, Proceedings of the Thirtieth International Conference on Very Large Data Bases, 30, pp. 720-731, (2004)
[10]  
Li J., Omiecinski E.R., Efficiency and security trade-off in supporting range queries on encrypted databases, Proceedings of the 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, pp. 69-83, (2005)