A performance test of query operation on encrypted database


Autoria(s): Kim, Ji Hong; Sahama, Tony; Kim, Sung Yong
Contribuinte(s)

Jung, H.K

Data(s)

2013

Resumo

Database security techniques are available widely. Among those techniques, the encryption method is a well-certified and established technology for protecting sensitive data. However, once encrypted, the data can no longer be easily queried. The performance of the database depends on how to encrypt the sensitive data, and an approach for searching and retrieval efficiencies that are implemented. In this paper we analyze the database queries and the data properties and propose a suitable mechanism to query the encrypted database. We proposed and analyzed the new database encryption algorithm using the Bloom Filter with the bucket index method. Finally, we demonstrated the superiority of the proposed algorithm through several experiments that should be useful for database encryption related research and application activities.

Identificador

http://eprints.qut.edu.au/60707/

Publicador

Springer

Relação

http://link.springer.com/chapter/10.1007/978-94-007-6516-0_89

Kim, Ji Hong, Sahama, Tony, & Kim, Sung Yong (2013) A performance test of query operation on encrypted database. In Jung, H.K (Ed.) Future Information Communication Technology and Applications Lecture Notes in Electrical Engineering, Springer, Shenyang, China, pp. 801-810.

Fonte

Information Security Institute; Science & Engineering Faculty

Palavras-Chave #080000 INFORMATION AND COMPUTING SCIENCES #Bloom Filter #Bucket Index #Database #Encrypted database
Tipo

Conference Paper