Browse > Article
http://dx.doi.org/10.13089/JKIISC.2013.23.6.1259

A Study on the Secure Database Controlled Under Cloud Environment  

Kim, SungYong (Semyung University)
Kim, Ji-Hong (Semyung University)
Abstract
Nowadays, the databases are getting larger and larger. As the company has difficulty in managing the database, they want to outsource the database to the cloud system. In this case the database security is more important because their database is managed by the cloud service provider. Among database security techniques, the encryption method is a well-certified and established technology for protecting sensitive data. However, once encrypted, the data can no longer be easily queried. The performance of the database depends on how to encrypt the sensitive data, and on the approach for searching, and the retrieval efficiency that is implemented. In this paper we propose the new suitable mechanism to encrypt the database and lookup process on the encrypted database under control of the cloud service provider. This database encryption algorithm uses the bloom filter with the variable keyword based index. Finally, we demonstrate that the proposed algorithm should be useful for database encryption related research and application activities.
Keywords
Bloom Filter; Bucket Index; Encrypted Database; Cloud;
Citations & Related Records
연도 인용수 순위
  • Reference
1 A. Broder and M. Mitzemacher, "Network Applications of Bloom Filters : A Survey," Internet Mathematics Vol.1, No.4, pp 485-509, 2003.
2 S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, P. Samarati, "Privacy of Outsourced Data," IFIP Vol.320, pp 174-187, 2007.
3 H. Hacigumus, B. Iyer, C. Li, and S. Mehrotra, "Executing SQL over encrypted data in the database service provider model," In Proc. of the ACM SIGMOD, pp 216-227, 2002,
4 H. Hacigumus, B. Iyer, and S. Mehrotra, "Efficient execution of aggregation queries over encrypted relational databases," LNCS 2973, pp 125-136, 2004.
5 R. Agrawal, J. Kiernan, R. Srikant, Y. Xu, "Order preserving Encryption for numerical Data," Proc. of the ACM SIGMOD, pp 564-574, 2004.
6 L. Bouganim, Y. Guo, "Database Encryption," Springer (Ed.),1-9, 2009.
7 E. Damiani, S. DeCapitani di Vimercati, S. Jajordia, "Balancing confidentiality and efficiency in untrusted relational DBMS," Proc. of the 10th ACM (CCS03), 93-102, 2003.