Browse > Article
http://dx.doi.org/10.6109/jkiice.2012.16.5.939

The Secure Algorithm on the Sensitive data using Bloom filter and bucket method  

Yu, Choun-Young (세명대학교 정보통신학부)
Kim, Ji-Hong (세명대학교 정보통신학부)
Abstract
Recently privacy breaches has been an social issues. If we should encrypt the sensitive information in order to protect the database, the leakage of the personal sensitive data will be reduced for sure. In this paper, we analyzed the existing protection algorithms to protect the personal sensitive data and proposed the combined method using the bucket index method and the bloom filters. Bucket index method applied on tuples data encryption method is the most widely used algorithm. But this method has the disadvantages of the data exposure because of the bucket index value presented. So we proposed the combined data encryption method using bucket index and the bloom filter. Features of the proposed scheme are the improved search performance of data as well as the protection of the data exposure.
Keywords
database; encrypt; decrypt; false positive;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Hakan Hacigὓmὓs, Bala Iyer, and Shrad Mehrotra, "Providing database as a service", In Proc, of the 18th International Conference on Data Engineering, San Jose, California, USA, IEEE Computer Society, pp.21-28, 2002.
2 Hakan Hacigὓmὓs, Bala Iyer, Chen Li, and Shrad Mehrotra, "Executing SQL over encrypted data in the database service provider model", In Proc. of the ACM SIGMOD, pp.216-227, 2002.
3 Hakan Hacigumus, Bala Iyer, and Shrad Mehrotra, "Efficient exeurtion of aggregation queries over encrypted relational databases", In Lee, J., li, J. Wudhang, K., and Lee, D., Eds., Proc. of the 9th International Conference on Database Systems for Advanced Applications, Volume 2973 of Lecture Notes in Computer Science, Jeju Island, Korea, Springer, pp.123-132, 2004.
4 Aggarwal, Gagan and Bawa, Mayank and Ganesan, Prasanna, "Two can keep a secret: a distributed architecture for secure database services", In Proc. of the Second Biannual Conference on Innovative Data Systems Research (CIDR 2005), Asilomar, CA, pp. 34-42, 2005.
5 Andrei Broder, Michael Mitzenmacher, "Network Applications of Bloom Filters:", A Survey. Internet Math. Volume 1, Number 4, pp,89-95, 2003.