Security of encrypted database in the cloud

  • Authors

    • Yousif H.Sulaiman Al-Maarif University College
    2018-11-05
    https://doi.org/10.14419/ijet.v7i4.25519
  • Query Encryption, Database Encryption, Cloud Computing, Hierarchical Index.
  • Existing encryption techniques ensure or safeness, either effectiveness, but not both. most circuits even show the order of cipher tupelos , that allow opponents to accurately estimate the plain text values. This paper present -tree, hierarchic cipher index, which can be safely located in a cloud and effectively distorted. It is based on the arrangement, which was designed for cipher requests using the encryption method Ðsymmetrical scalar produce handling encryption (ASPE).

     

     

  • References

      1. [1] Michael Armbrust, Armando Fox, Rean Griffith, Anthony D. Joseph, Randy Katz, Andy Konwinski, Gunho Lee, David Patterson, Ariel Rabkin, Ion Stoica, and Matei Zaharia. A view of cloud computing. Commun. ACM, 53(4):50–58, April 2010. https://doi.org/10.1145/1721654.1721672.

        [2] Alexandra Boldyreva, Nathan Chenette, Younho Lee, and Adam O’Neill. Order-preserving symmetric encryption. In EUROCRYPT, pages 224–241, 2009. https://doi.org/10.1007/978-3-642-01001-9_13.

        [3] Bijit Hore, Sharad Mehrotra, Mustafa Canim, and Murat Kantarcioglu. Secure multidimensional range queries over outsourced data. The VLDB Journal, 21:333–358, 2012. https://doi.org/10.1007/s00778-011-0245-7.

        [4] Yanbin Lu. Privacy-preserving logarithmic-time search on encrypted data in cloud. In NDSS, 2012.

        [5] Man, Lung Yiu, Gabriel Ghinita, Christian S. Jensen, and Panos Kalnis. Outsourcing search services on private spatial data. In ICDE, Р. 1140–1143, 2009.

        [6] H.A. David and H.N. Nagaraja. Order Statistics, Third Edition. Wiley, New York, 2003. https://doi.org/10.1002/0471722162.

        [7] Jonathan Katz, Amit Sahai, and Brent Waters. Predicate encryption sup-porting disjunctions, polynomial equations, and inner products. In Proceed-ings of the theory and applications of cryptographic techniques 27th annual international conference on Advances in cryptology, EUROCRYPT’08, Р. 146–162, 2008.

        [8] Ming Li, Shucheng Yu, Ning Cao, and Wenjing Lou. Authorized private keyword search over encrypted data in cloud computing. In ICDCS, Р. 383–392, 2011.

        [9] Emily Shen, Elaine Shi, and Brent Waters. Predicate privacy in encryption systems. In TCC, Р. 457–473, 2009.

        [10] Wai Kit Wong, David Wai-lok Cheung, Ben Kao, and Nikos Mamoulis. Secure knn computation on encrypted databases. In Proceedings of the 35th SIGMOD international conference on Management of data, SIGMOD ’09, Р. 139– 152, 2009.

  • Downloads

  • How to Cite

    H.Sulaiman, Y. (2018). Security of encrypted database in the cloud. International Journal of Engineering & Technology, 7(4), 4984-4990. https://doi.org/10.14419/ijet.v7i4.25519