Secure query processing and optimization in cloud environment: a review

被引:0
作者
Divya, V. L. [1 ]
Job, P. A. [2 ]
Preetha, Mathew K. [1 ]
机构
[1] Cochin Univ, Coll Engn Kuttanadu, Dept Comp Sci, Pulincunnu 688504, Kerala, India
[2] Cochin Univ, Coll Engn Kuttanadu, Dept Mech Engn, Pulincunnu, Kerala, India
来源
INFORMATION SECURITY JOURNAL | 2024年 / 33卷 / 02期
关键词
Cloud computing; deterministic query optimization; query optimization; query plan; query processing; DATA REPLICATION; SCHEME; AVAILABILITY; INTEGRITY; STRATEGY; PRIVACY; SYSTEM;
D O I
10.1080/19393555.2023.2270976
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is trusted and used by millions of users around the world. Therefore, it becomes essential to offer trusted and efficient services to its users. Query processing and query optimization are the major components to provide optimal query plans for users through different steps. So far, the mathematical evaluation including algebraic transformation and selectivity estimation models are performed to improve the security while optimization and processing of query. Meanwhile, they have several equivalence rules to have various logical form. That problem was stated by single query processing at a time, but they are not efficient for dynamic operation of cloud since they are slower. Hence, this paper presents a review of improvement made to the processing and optimization of queries with the security enhancement in the past 8 years neglecting the tedious mathematical procedures. Along with the query processing techniques, the quantitative analysis of those techniques is provided in the paper based on deterministic and non-deterministic query processing techniques. As a result, it is found that when utilizing multiple query processing techniques, the host system may get loaded and struck, while the adaptive model works better by providing the process to host system based on its processing capability.
引用
收藏
页码:172 / 191
页数:20
相关论文
共 89 条
[1]   Enhanced query processing over semantic cache for cloud based relational databases [J].
Ahmad, Munir ;
Qadir, Muhammad Abdul ;
Rahman, Atta ;
Zagrouba, Rachid ;
Alhaidari, Fahd ;
Ali, Tariq ;
Zahid, Farzana .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 14 (5) :5853-5871
[2]  
Alarabi S., 2018, 2018 21 SAUDI COMPUT, P1
[3]   Deep Learning Based Homomorphic Secure Search-Able Encryption for Keyword Search in Blockchain Healthcare System: A Novel Approach to Cryptography [J].
Ali, Aitizaz ;
Pasha, Muhammad Fermi ;
Ali, Jehad ;
Fang, Ong Huey ;
Masud, Mehedi ;
Jurcut, Anca Delia ;
Alzain, Mohammed A. .
SENSORS, 2022, 22 (02)
[4]   CLOUD QUERY PROCESSING ANALYSIS: ENCRYPTION AND DECRYPTION [J].
Ali, Zainalabideen ;
Aman, Azana Hafizah Binti Mohd ;
Hassan, Rosilah .
3C TECNOLOGIA, 2019, (SI) :65-75
[5]   Secure and Efficient Query Processing Technique for Encrypted Databases in Cloud [J].
Almakdi, Sultan ;
Panda, Brajendra .
2019 2ND INTERNATIONAL CONFERENCE ON DATA INTELLIGENCE AND SECURITY (ICDIS 2019), 2019, :120-127
[6]  
Alrahhal MS, 2018, INT J ADV COMPUT SC, V9, P52
[7]  
Amer S., 2021, ADV SECURITY NETWORK, P449
[8]  
AROCKIAM L, 2014, 2014 INT C COMPUTER, P1
[9]   An automatic clustering technique for query plan recommendation [J].
Azhir, Elham ;
Navimipour, Nima Jafari ;
Hosseinzadeh, Mehdi ;
Sharifi, Arash ;
Darwesh, Aso .
INFORMATION SCIENCES, 2021, 545 :620-632
[10]   Deterministic and non-deterministic query optimization techniques in the cloud computing [J].
Azhir, Elham ;
Navimipour, Nima Jafari ;
Hosseinzadeh, Mehdi ;
Sharifi, Arash ;
Darwesh, Aso .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (17)