Security of encrypted database in the cloud

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    Existing encryption techniques ensure or safeness, either effectiveness, but not both. most circuits even show the order of cipher tupelos , that allow opponents to accurately estimate the plain text values. This paper present -tree, hierarchic cipher index, which can be safely located in a cloud and effectively distorted. It is based on the arrangement, which was designed for cipher requests using the encryption method Аsymmetrical scalar produce handling encryption (ASPE).

     

     


  • Keywords


    Query Encryption; Database Encryption; Cloud Computing; Hierarchical Index.

  • References


      1. [1] Michael Armbrust, Armando Fox, Rean Griffith, Anthony D. Joseph, Randy Katz, Andy Konwinski, Gunho Lee, David Patterson, Ariel Rabkin, Ion Stoica, and Matei Zaharia. A view of cloud computing. Commun. ACM, 53(4):50–58, April 2010. https://doi.org/10.1145/1721654.1721672.

        [2] Alexandra Boldyreva, Nathan Chenette, Younho Lee, and Adam O’Neill. Order-preserving symmetric encryption. In EUROCRYPT, pages 224–241, 2009. https://doi.org/10.1007/978-3-642-01001-9_13.

        [3] Bijit Hore, Sharad Mehrotra, Mustafa Canim, and Murat Kantarcioglu. Secure multidimensional range queries over outsourced data. The VLDB Journal, 21:333–358, 2012. https://doi.org/10.1007/s00778-011-0245-7.

        [4] Yanbin Lu. Privacy-preserving logarithmic-time search on encrypted data in cloud. In NDSS, 2012.

        [5] Man, Lung Yiu, Gabriel Ghinita, Christian S. Jensen, and Panos Kalnis. Outsourcing search services on private spatial data. In ICDE, Р. 1140–1143, 2009.

        [6] H.A. David and H.N. Nagaraja. Order Statistics, Third Edition. Wiley, New York, 2003. https://doi.org/10.1002/0471722162.

        [7] Jonathan Katz, Amit Sahai, and Brent Waters. Predicate encryption sup-porting disjunctions, polynomial equations, and inner products. In Proceed-ings of the theory and applications of cryptographic techniques 27th annual international conference on Advances in cryptology, EUROCRYPT’08, Р. 146–162, 2008.

        [8] Ming Li, Shucheng Yu, Ning Cao, and Wenjing Lou. Authorized private keyword search over encrypted data in cloud computing. In ICDCS, Р. 383–392, 2011.

        [9] Emily Shen, Elaine Shi, and Brent Waters. Predicate privacy in encryption systems. In TCC, Р. 457–473, 2009.

        [10] Wai Kit Wong, David Wai-lok Cheung, Ben Kao, and Nikos Mamoulis. Secure knn computation on encrypted databases. In Proceedings of the 35th SIGMOD international conference on Management of data, SIGMOD ’09, Р. 139– 152, 2009.


 

View

Download

Article ID: 25519
 
DOI: 10.14419/ijet.v7i4.25519




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.