A Solution for Privacy-Preserving Data Manipulation and Query on NoSQL Database

被引:7
作者
Guo Yubin [1 ]
Zhang Liankuan [2 ]
Lin Fengren [1 ]
Li Ximing [1 ]
机构
[1] South China Agr Univ, Coll Informat, Guangzhou 510640, Guangdong, Peoples R China
[2] South China Agr Univ, Coll Sci, Guangzhou 510640, Guangdong, Peoples R China
基金
美国国家科学基金会;
关键词
NoSQL; cloud data management; privacy preserving;
D O I
10.4304/jcp.8.6.1427-1432
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Privacy of data owners and query users is vital in modern clouding data management. Many researches have been done on cloud security, but most of them are focused on the privacy of data owners or of query users separately. How to protect the privacy of the data owners and users simultaneously is a great challenge. In this paper, a solution of data storage and query protocol based on classical homomorphic encryption scheme is given to preserve privacy of both data owners and query users. Our main efforts are put on NoSQL database which is less structural than relational database. Storage and indexing structure on NoSQL database, query protocol are proposed, and algorithms for updating and querying are also given. To implement our solution, Berkley DB, an excellent storage solution for NoSQL database is chosen and data are encrypted/decrypted using Elgamal and Paillier encryption system, using basic Java package. Experiments are done under different parameters in order to achieve better efficiency.
引用
收藏
页码:1427 / 1432
页数:6
相关论文
共 13 条
  • [1] Agrawal R., 2004, P SIGMOID 04, P563, DOI DOI 10.1145/1007568.1007632
  • [2] Dertouzos M.L., 1978, FOUND SECURE COMPUT, P169
  • [3] Ge T., 2007, P 33 INT C VER LARG, P519
  • [4] Hacigumus H, 2004, LECT NOTES COMPUT SC, V2973, P125
  • [5] Haipeng Chen, 2011, Journal of Software, V6, P1329, DOI 10.4304/jsw.6.7.1329-1336
  • [6] Hu HB, 2011, PROC INT CONF DATA, P601, DOI 10.1109/ICDE.2011.5767862
  • [7] Hu HB, 2009, PROC INT CONF DATA, P1120, DOI 10.1109/ICDE.2009.106
  • [8] Technical Perspective A First Glimpse of Cryptography's Holy Grail
    Micciancio, Daniele
    [J]. COMMUNICATIONS OF THE ACM, 2010, 53 (03) : 96 - 96
  • [9] Mousa Ayman, 2012, QUERY PROCESSING PER, P280
  • [10] Mykletun E, 2006, LECT NOTES COMPUT SC, V4127, P89