Browse > Article
http://dx.doi.org/10.5762/KAIS.2010.11.5.1653

The Implementation of the Index Search System in a Encrypted Data-base  

Shin, Seung-Soo (Dept. of Information Security, College of Information & Communication, Tongmyong University)
Han, Kun-Hee (Division of Information & Communication Engineering, Baekseok University)
Publication Information
Journal of the Korea Academia-Industrial cooperation Society / v.11, no.5, 2010 , pp. 1653-1660 More about this Journal
Abstract
The user information stored in database have been leaked frequently. To protect information against malevolent manager on the inside or outside aggressor, it is one of the most efficient way to encrypt information and store to database. It is better to destruct information than not to use encrypted information stored in database. The encrypted database search system is developed variously, and used widely in many fields. In this paper, we implemented the scheme that can search encrypted document without exposing user's information to the untrusted server in mobile device. We compared and analyzed the result embodied with DES, AES, and ARIA based on symmetric key by searching time.
Keywords
Database; Index; Pseudo-random permutation functions; Pseudo-random functionsDes; Aes; ARIA;
Citations & Related Records
연도 인용수 순위
  • Reference
1 노건태, 정익래, 이동훈, 변진욱, "암호화된 데이터에서의 연산 기술 분류 및 최근 동향 연구", 한국정보과학회 학술발표논문집, 2008.
2 조상록,"하나로텔.옥션 개인정보 유출사건, 집단분쟁 조정 개시", http://www.itdaily.kr/news/articleView.html?idxno=16119 , IT데일리, 2008.
3 정미경, 송희정, 신승수, 한군희, "암호화된 DB에서 대칭키 기반 검색기법 구현", 한국산학기술학회 춘계학술대회발표논문, 2009.   과학기술학회마을
4 Byunghee Lee, yunho Lee, Seokhyang Cho, Seungjoo Kim, Dongho Won, "A Study on the Keyword Search on Encrypted Data using Symmetric Key Encryption," 한국정보보호학회 정보보호학술대회논문집, 2006.   과학기술학회마을
5 민관겸용 블록 암호 ARIA 알고리즘 명세서, 2004.
6 김선영, 서재우, 이필중, "검색 가능 암호 기술의 연구 동향", 한국정보보호학회, 2009.
7 D. Song, D. Wagner, and A. Perrig, "Practical techniques for searches on encrypted data," In Proceedings of IEEE Symposium on Security and Privacy, pp. 44-55. IEEE, May 2000.
8 Y. C. Chang and M. Mitzenmacher, "Privacy preserving keyword seaches on remote encrypted data," Cryptology ePrint Archive, Report 2004/051, Feb 2004.
9 P. Golle, J. Staddon, B. Waters, "Secure Conjunctive Keyword Search over Encrypted Data," Proc. of the 2004 Applied Cryptography and Network Security Conference, 2004.
10 이동훈, "계층적 그룹 DB에서 암호화 기법을 이용한 효율적인 검색 시스템의 설계 및 구현", 정보통신산업진흥원, 2006.