A Bucket ID Transformation scheme for efficient database encryption

被引:0
|
作者
Lee, Dong Hyeok [1 ]
Lee, Seung Min [1 ]
Nam, Taek Yong [1 ]
Song, You Jin [2 ]
机构
[1] ETRI, 138 Gajeongno, Taejon, South Korea
[2] Dongguk Univ, Gyeongju, South Korea
来源
2008 THE INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING | 2008年
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Encryption is a well established technology for protecting sensitive data. Unfortunately, the integration of existing encryption techniques with database systems causes undesirable performance degradation. We propose the bucket ID transformation that supports range queries without exposing the order of plaintext. The Bucket ID Transformation is performed by modulo arithmetic or pseudo-random number generation. This method is more powerful than previous order preserving methods and is expected to handle data more efficiently than other methods. Experiment results show that our scheme outperforms other method in encryption and query speed.
引用
收藏
页码:93 / +
页数:2
相关论文
共 50 条
  • [1] Efficient Database Encryption Scheme for Database-as-a-Service Environment
    Joo, Hankyu
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (05): : 195 - 203
  • [2] Efficient ID-based broadcast encryption scheme - Comments
    Chien, Hung-Yu
    IEEE TRANSACTIONS ON BROADCASTING, 2007, 53 (04) : 809 - 810
  • [3] A secure database encryption scheme
    Sesay, S
    Yang, ZK
    Chen, JW
    Xu, D
    CCNC: 2005 2ND IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, 2005, : 49 - 53
  • [4] A study for method of construct encryption scheme of data management to Secure Data using bucket ID in Cloud Computing Environment
    Song, You-Jin
    Cha, Jaesang
    Kang, Jang-Mook
    INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2012, 15 (03): : 1053 - 1064
  • [5] A proposal of efficient scheme of key management using ID-based encryption and biometrics
    Izumi, Akitoshi
    Ueshige, Yoshifumi
    Sakurai, Kouichi
    MUE: 2007 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND UBIQUITOUS ENGINEERING, PROCEEDINGS, 2007, : 29 - +
  • [6] An Efficient Data Protection Scheme Based on Hierarchical ID-Based Encryption for MQTT
    Fan, Chun-I
    Shie, Cheng-Han
    Tseng, Yi-Fan
    Huang, Hui-Chun
    ACM TRANSACTIONS ON SENSOR NETWORKS, 2023, 19 (03)
  • [7] ID-based Encryption Scheme with Revocation
    Othman, Hafizul Azrie
    Ismail, Eddie Shahril
    4TH INTERNATIONAL CONFERENCE ON MATHEMATICAL SCIENCES (ICMS4): MATHEMATICAL SCIENCES: CHAMPIONING THE WAY IN A PROBLEM BASED AND DATA DRIVEN SOCIETY, 2017, 1830
  • [8] Semantic encryption transformation scheme
    Thompson, W
    Yasinsac, A
    McDonald, T
    PARALLEL AND DISTRIBUTED COMPUTING SYSTEMS, 2004, : 516 - 521
  • [9] Efficient hybrid encryption from ID-based encryption
    Masayuki Abe
    Yang Cui
    Hideki Imai
    Eike Kiltz
    Designs, Codes and Cryptography, 2010, 54 : 205 - 240
  • [10] Efficient hybrid encryption from ID-based encryption
    Abe, Masayuki
    Cui, Yang
    Imai, Hideki
    Kiltz, Eike
    DESIGNS CODES AND CRYPTOGRAPHY, 2010, 54 (03) : 205 - 240