Browse > Article

Technique of Range Query in Encrypted Database  

Kim, Cheon-Shik (Major in Digital Madia Engineering, Anyang University)
Kim, Hyoung-Joong (Graduate School of Information Management and Security, Korea University)
Hong, You-Sik (Dept. of Computer Science, Sangji University)
Publication Information
Abstract
Recently, protection of personal information is getting more important. Many countries have legislated about the protection of personal information. Now, the protection of relevant personal information is required not for a simple image of enterprises but law obligation. Most databases in enterprises used to store customers' names, addresses and credit card numbers with no exceptions. The personal information about a person is sensitive, and this asset is strategic. Therefore, most enterprises make an effort to preserve personal information safely. If someone, however, hacks password information of DBMS manager, no one can trust this system. Therefore, encryption is required based in order to protect data in the database. Because of database encryption, however, it is the problem of database performance in terms of computation time and the limited SQL query. Thus, we proposed an efficient query method to solve the problem of encrypted data in this paper.
Keywords
encryption; data; database; query; AES;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Z. Wang, J. Dai, W. Wang, and B. Shi, Fast Query Over Encrypted Character Data in Database, Communications in Information and Systems, Vol. 4, No. 4, pp. 289-300, 2004   DOI
2 UCI, http://archive.ics.uci.edu/ml/index.html
3 E. Damiani, S. De C. Vimercati, S. Jajodia, S. Paraboschi, and P. Samarati. Balancing confidentiality and efficiency in untrusted relational dbmss. In CCS, 2003
4 D. X. Song, D. Wagner, and A. Perrig. Practical techniques for searches on encrypted data. IEEE Symposium on Security and Privacy, pp. 44-55, 2000
5 H. Hacigumus, B. R. Iyer, C. Li, and S.d Mehrotra. Executing SQL over encrypted data in the database-service-provider model. In SIGMOD, 2002
6 H. Hacigumus, B. R. Iyer, and S. Mehrotra. Efficient execution of aggregation queries over encrypted relational databases. In DASFAA, 2004
7 Yigit. sdbm - substitute dbm. In http://search.cpan.org/src/NWCLARK/perl-5.8.4/ext/SDBM_File/sdbm/
8 디지털 타입즈, http://www.dt.co.kr/contents.htm?article_no=2006031302019922601028
9 B. Iyer, S. Mehrotra, E. Mykletun, G. Tsudik, and Y. Wu. A framework for efficient storage security in RDBMS. Lecture Notes in Computer Science, vol. 2992, pp. 147-164, 2004
10 Wikipedia,http://en.wikipedia.org/wiki/Advanced_Encryption_Standard(169)
11 H. Hacigumus, B. R. Iyer, and S. Mehrotra. Providing database as a service. In ICDE, 2002
12 Z. Yang, S. Zhong, and R. N. Wright, Privacy-Preserving Queries on Encrypted Data, Proceedings of the 11th European Symposium On Research In Computer Security, 2006
13 R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu. Order preserving encryption for numeric data. In SIGMOD, 2004
14 R. Mogull, "When and How to Use Database Encryption," Gartner, 6 Feb 2004
15 G. Ozsoyoglu, D. Singer, and S. Chung. Anti-tamper databases: Querying encrypted databases. In Proc. of the 17th Annual IFIP WG 11.3 Working Conference on Database and Applications Security, 2003