A Bucket ID Transformation scheme for efficient database encryption

被引:0
作者
Lee, Dong Hyeok [1 ]
Lee, Seung Min [1 ]
Nam, Taek Yong [1 ]
Song, You Jin [2 ]
机构
[1] ETRI, 138 Gajeongno, Taejon, South Korea
[2] Dongguk Univ, Gyeongju, South Korea
来源
2008 THE INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING | 2008年
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Encryption is a well established technology for protecting sensitive data. Unfortunately, the integration of existing encryption techniques with database systems causes undesirable performance degradation. We propose the bucket ID transformation that supports range queries without exposing the order of plaintext. The Bucket ID Transformation is performed by modulo arithmetic or pseudo-random number generation. This method is more powerful than previous order preserving methods and is expected to handle data more efficiently than other methods. Experiment results show that our scheme outperforms other method in encryption and query speed.
引用
收藏
页码:93 / +
页数:2
相关论文
共 50 条
[41]   Lightweight, dynamic and efficient image encryption scheme [J].
Noura, Hassan ;
Chehab, Ali ;
Noura, Mohamad ;
Couturier, Raphael ;
Mansour, Mohammad M. .
MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (12) :16527-16561
[42]   An efficient hybrid chaotic image encryption scheme [J].
Asim, M. ;
Jeoti, V. .
NEW TECHNOLOGIES, MOBILITY AND SECURITY, 2007, :471-480
[43]   Efficient Chaotic Encryption Scheme with OFB Mode [J].
Noura, Hassan ;
Guyeux, Christophe ;
Chehab, Ali ;
Mansour, Mohammad ;
Couturier, Raphael .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2019, 29 (05)
[44]   An efficient image encryption scheme for healthcare applications [J].
Sarosh, Parsa ;
Parah, Shabir A. ;
Bhat, G. Mohiuddin .
MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (05) :7253-7270
[45]   A secure and efficient fingerprint images encryption scheme [J].
Zhao, Song ;
Li, Hengjian ;
Yan, Xu .
PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, :2803-+
[46]   A lightweight and efficient encryption scheme based on LFSR [J].
Wu, Guangfu ;
Wang, Keke ;
Zhang, Jinjun ;
He, Jiguang .
INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2018, 10 (03) :225-232
[47]   An efficient traitor tracing scheme for broadcast encryption [J].
Yoshida, M ;
Fujiwara, T .
2000 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2000, :463-463
[48]   An efficient conjunctive keyword searchable encryption scheme [J].
Wang, Shang-Ping ;
Liu, Li-Jun ;
Zhang, Ya-Ling .
Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2013, 35 (09) :2266-2271
[49]   An efficient incomparable public key encryption scheme [J].
Lee, Hyang-Sook ;
Lim, Seongan .
INFORMATION SCIENCES, 2011, 181 (14) :3066-3072
[50]   Efficient certificateless searchable encryption scheme with verifiability [J].
Cui X. ;
Tian Y. ;
Zhang Q. .
Tongxin Xuebao/Journal on Communications, 2023, 44 (08) :61-77