A Bucket ID Transformation scheme for efficient database encryption

被引:0
作者
Lee, Dong Hyeok [1 ]
Lee, Seung Min [1 ]
Nam, Taek Yong [1 ]
Song, You Jin [2 ]
机构
[1] ETRI, 138 Gajeongno, Taejon, South Korea
[2] Dongguk Univ, Gyeongju, South Korea
来源
2008 THE INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING | 2008年
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Encryption is a well established technology for protecting sensitive data. Unfortunately, the integration of existing encryption techniques with database systems causes undesirable performance degradation. We propose the bucket ID transformation that supports range queries without exposing the order of plaintext. The Bucket ID Transformation is performed by modulo arithmetic or pseudo-random number generation. This method is more powerful than previous order preserving methods and is expected to handle data more efficiently than other methods. Experiment results show that our scheme outperforms other method in encryption and query speed.
引用
收藏
页码:93 / +
页数:2
相关论文
共 50 条
[31]   A New Lightweight Database Encryption Scheme Transparent to Applications [J].
Liu, Lianzhong ;
Gai, Jingfen .
2008 6TH IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS, VOLS 1-3, 2008, :114-119
[32]   Efficient searchable ID-based encryption with a designated server [J].
Tsu-Yang Wu ;
Tung-Tso Tsai ;
Yuh-Min Tseng .
annals of telecommunications - annales des télécommunications, 2014, 69 :391-402
[33]   Efficient Revocable ID-Based Encryption with a Public Channel [J].
Tseng, Yuh-Min ;
Tsai, Tung-Tso .
COMPUTER JOURNAL, 2012, 55 (04) :475-486
[34]   Efficient searchable ID-based encryption with a designated server [J].
Wu, Tsu-Yang ;
Tsai, Tung-Tso ;
Tseng, Yuh-Min .
ANNALS OF TELECOMMUNICATIONS, 2014, 69 (7-8) :391-402
[35]   An enhanced ID-based multi-decrypters encryption scheme [J].
Yuan, Wei ;
Hu, Liang ;
Li, Hongtu ;
Chu, Jianfeng .
International Review on Computers and Software, 2012, 7 (07) :3409-3413
[36]   Self-enforcing ID-based broadcast encryption scheme [J].
Ministry of Education Key Lab. of Computer Networks and Info. Security, Xidian Univ., Xi'an710071, China .
Sichuan Daxue Xuebao (Gongcheng Kexue Ban), 2007, 3 (133-135)
[37]   Lightweight, dynamic and efficient image encryption scheme [J].
Hassan Noura ;
Ali Chehab ;
Mohamad Noura ;
Raphaël Couturier ;
Mohammad M. Mansour .
Multimedia Tools and Applications, 2019, 78 :16527-16561
[38]   An Efficient Scheme of Authenticated Encryption with Associated Data [J].
Zhang, Shaolan ;
Xing, Guobo ;
Yang, Yixian .
2010 CHINESE CONTROL AND DECISION CONFERENCE, VOLS 1-5, 2010, :4217-+
[39]   An efficient RSA public key encryption scheme [J].
Aboud, Sattar J. ;
AL-Fayoumi, Mohammad A. ;
Al-Fayoumi, Mustafa ;
Jabbar, Haidar S. .
PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, 2008, :127-+
[40]   An efficient image encryption scheme for healthcare applications [J].
Parsa Sarosh ;
Shabir A. Parah ;
G. Mohiuddin Bhat .
Multimedia Tools and Applications, 2022, 81 :7253-7270