Secure and Efficient Query Processing Technique for Encrypted Databases in Cloud

被引:3
作者
Almakdi, Sultan [1 ]
Panda, Brajendra [1 ]
机构
[1] Univ Arkansas, Dept Comp Sci & Comp Engn, Fayetteville, AR 72701 USA
来源
2019 2ND INTERNATIONAL CONFERENCE ON DATA INTELLIGENCE AND SECURITY (ICDIS 2019) | 2019年
关键词
Cloud Databases; Encrypted Data; Bit Vectors; Domain Value Matrix; Query Processing;
D O I
10.1109/ICDIS.2019.00026
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is an attractive environment for both organizations and individual users, as it provides scalable computing and storage services at an affordable price. However, privacy and confidentiality are two challenges that trouble most users. Data encryption, using a powerful encryption algorithm such as the Advanced Encryption Standard (AES), is one solution that can allay users' concerns, but other challenges with searching over encrypted data have arisen. Researchers have proposed many different schemes to execute Standard Query Language (SQL) queries over encrypted data by encrypting the data with more than one encryption algorithm. However, other researchers have proposed systems based on the fragmentation of encrypted data. In this paper, we propose bit vector-based model (BVM), a secure database system that works as an intermediary between users and the cloud provider. In BVM, before the encryption and outsourcing processes, the query manager (QM) takes each record from the main table, parses it, builds a bit vector for it, and stores it. The BV stores bits, zero and one, and its length equals the total number of sub-columns for all sensitive columns. BVM aims to reduce the range of retrieved encrypted records that are related to a user's query from the cloud. In our model, the cloud provider cannot deduce information from the encrypted data nor can infer which encryption algorithm was used to encrypt data. We implement BVM and run different experiments to compare our model with the methods in which data are not encrypted in the cloud. Our evaluation shows that BVM reduces the range of the retrieved encrypted records from the cloud to less than 35 percent of encrypted records. As a result, our model avoids unnecessary decryption processes that affect delay times.
引用
收藏
页码:120 / 127
页数:8
相关论文
共 19 条
[1]  
Alsirhani Amjad Peter, 2017, COMP APPL ICCA 2017
[2]  
[Anonymous], 2002, P 2002 ACM SIGMOD IN
[3]   TrustedDB: A Trusted Hardware-Based Database with Privacy and Data Confidentiality [J].
Bajaj, Sumeet ;
Sion, Radu .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2014, 26 (03) :752-765
[4]  
Bouganim Luc, 2002, P 28 INT C VER LARG
[5]  
Chauhan S. S., 2018, J PARALLEL DISTRIBUT
[6]   Secure multidimensional range queries over outsourced data [J].
Hore, Bijit ;
Mehrotra, Sharad ;
Canim, Mustafa ;
Kantarcioglu, Murat .
VLDB JOURNAL, 2012, 21 (03) :333-358
[7]  
Hore Bijit, 2004, P 30 INT C VER LARG, V30
[8]   T-Broker: A Trust-Aware Service Brokering Scheme for Multiple Cloud Collaborative Services [J].
Li, Xiaoyong ;
Ma, Huadong ;
Zhou, Feng ;
Yao, Wenbin .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (07) :1402-1415
[9]  
Liu Chuanyi, 2017, COMP NETW COMM ICNC
[10]  
Mehrotra, 2010, U.S. Patent, Patent No. [7 685 437, 7685437]