A Bucket ID Transformation scheme for efficient database encryption

被引:0
作者
Lee, Dong Hyeok [1 ]
Lee, Seung Min [1 ]
Nam, Taek Yong [1 ]
Song, You Jin [2 ]
机构
[1] ETRI, 138 Gajeongno, Taejon, South Korea
[2] Dongguk Univ, Gyeongju, South Korea
来源
2008 THE INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING | 2008年
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Encryption is a well established technology for protecting sensitive data. Unfortunately, the integration of existing encryption techniques with database systems causes undesirable performance degradation. We propose the bucket ID transformation that supports range queries without exposing the order of plaintext. The Bucket ID Transformation is performed by modulo arithmetic or pseudo-random number generation. This method is more powerful than previous order preserving methods and is expected to handle data more efficiently than other methods. Experiment results show that our scheme outperforms other method in encryption and query speed.
引用
收藏
页码:93 / +
页数:2
相关论文
共 50 条
[21]   An ID-based Broadcast Encryption Scheme for Collaborative Design [J].
Zhang, Ya-ling ;
Zhang, Jing ;
Zhang, Yi-kun .
NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, :699-702
[22]   An efficient encryption scheme for MPEG video [J].
Cheong, IK ;
Huang, YC ;
Tung, YS ;
Ke, SR ;
Chen, WC .
ICCE: 2005 INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS, DIGEST OF TECHNICAL PAPERS, 2005, :61-62
[23]   An efficient and secure spatial encryption scheme [J].
Qi, Cheng-Jie ;
Dong, Xiao-Lei .
Shanghai Jiaotong Daxue Xuebao/Journal of Shanghai Jiaotong University, 2012, 46 (09) :1361-1365
[24]   An efficient chaotic image encryption scheme [J].
Khan, Majid ;
Shah, Tariq .
NEURAL COMPUTING & APPLICATIONS, 2015, 26 (05) :1137-1148
[25]   An Efficient Scheme for Joint Compression and Encryption [J].
Qiu, Lirong ;
Yu, Yang .
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2014, 17 (5-6) :539-548
[26]   A Memory Efficient Network Encryption Scheme [J].
El-Fotouh, Mohamed Abo ;
Diepold, Klaus .
E-BUSINESS AND TELECOMMUNICATIONS, 2009, 48 :153-165
[27]   An efficient fully homomorphic encryption scheme [J].
El-Yahyaoui, Ahmed ;
El Kettani, Mohamed Dafir Ech-Cherif .
International Journal of Network Security, 2019, 21 (01) :91-99
[28]   A database encryption scheme for enhanced security and easy sharing [J].
Chen, Gang ;
Chen, Ke ;
Dong, Jinxiang .
2006 10TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, PROCEEDINGS, VOLS 1 AND 2, 2006, :995-1000
[29]   Analysis of a database and index encryption scheme -: Problems and fixes [J].
Kuehn, Ulrich .
SECURE DATA MANAGEMENT, 2006, 4165 :146-159
[30]   A Generic Scheme of plaintext-checkable database encryption [J].
Ma, Sha ;
Mu, Yi ;
Susilo, Willy .
INFORMATION SCIENCES, 2018, 429 :88-101