We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

A New Method of Query over Encrypted Data in Database using Hash Map

by Mohammed Alhanjouri, Ayman M. Al Derawi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 41 - Number 4
Year of Publication: 2012
Authors: Mohammed Alhanjouri, Ayman M. Al Derawi
10.5120/5533-7580

Mohammed Alhanjouri, Ayman M. Al Derawi . A New Method of Query over Encrypted Data in Database using Hash Map. International Journal of Computer Applications. 41, 4 ( March 2012), 46-51. DOI=10.5120/5533-7580

@article{ 10.5120/5533-7580,
author = { Mohammed Alhanjouri, Ayman M. Al Derawi },
title = { A New Method of Query over Encrypted Data in Database using Hash Map },
journal = { International Journal of Computer Applications },
issue_date = { March 2012 },
volume = { 41 },
number = { 4 },
month = { March },
year = { 2012 },
issn = { 0975-8887 },
pages = { 46-51 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume41/number4/5533-7580/ },
doi = { 10.5120/5533-7580 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:28:47.413939+05:30
%A Mohammed Alhanjouri
%A Ayman M. Al Derawi
%T A New Method of Query over Encrypted Data in Database using Hash Map
%J International Journal of Computer Applications
%@ 0975-8887
%V 41
%N 4
%P 46-51
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Critical business data in databases is an attractive target for attack. Therefore, ensuring the confidentiality, privacy and integrity of data is a major issue for the security of database systems. High secure data in databases is protected by encryption. When the data is encrypted, query performance decreases. In our paper we propose a new mechanism to query the encrypted data beside make a tradeoff between the performance and the security. Our mechanism will work over many data-types. We implement our work as a layer above the DBMS; this makes our method compatible with any DBMS. Our method based on replacing the select conditions on the encrypted data with another condition which is faster. The new way must have no security weak that is can't show an aspect for the plain data. The results of the experiments validate our approach.

References
  1. Erez Shmueli, Ronen Vaisenberg, Yuval Elovici and Chanan Glezer, "Database Encryption – An Overview of Contemporary Challenges and Design Considerations" SIGMOD Record, September 2009 (Vol. 38, No. 3)
  2. Dawn Xiaodong Song, David Wagner, and Adrian Perring. Practical Techniques for Searches on Encrypted Data, IEEE Symposium on Security and Privacy, 2000, pp. 44-55.
  3. H. Hacigumus , Bala Iyer and Sharad Mehrotra, "Providing Database as a Service", Data Engineering, 2002. Proceedings. 18th International Conference
  4. H. Hacigumus, B. Iyer, C. Li and S. Mehrotra, "Executing SQL over encrypted data in the database service provider model," In ACM SIGMOD Conference, 2002, pp. 216-227.
  5. H. Hacigumus, B. Iyer, and S. Mehrotra. "Efficient execution of aggregation queries over encrypted relational databases". In the proceedings of Database Systems for Advanced Applications (DASFAA), 2004, pp. 125-136
  6. B. Hore, S. Mehrotra and G. Tsudik. "A Privacy-Preserving Index for Range Queries". In Proceedings of the 30th VLDB Conference, 2004, pp. 720–731.
  7. Z. Wang, J. Dai, W. Wang and B. L. Shi, "Fast Query over Encrypted Character Data in Database". Communications In Information and Systems, 2004, pp. 289-300
  8. Zheng-Fei Wang, Wei Wang and Bai-Le Shi , "Storage and Query over Encrypted Character and Numerical Data in Database", Computer and Information Technology, 2005. CIT 2005. The Fifth International Conference
  9. H. Zhu, J. Cheng and R. Jin, "Execution Query over Encrypted Character Strings in Databases," Frontier of Computer Science and Technology, 2007, pp. 90-97
  10. H. APark, D. Lee, J. Zhan and G. Blosser, "Efficient Keyword Index Search over Encrypted Documents of Groups" ISI 2008, June 17-20
  11. Yu Han, Zhao Liang Niu Xiamu, "Research on a new method for database encryption and cipher index". Acta Electronica Sinica, No. 12A 2005
  12. Z. Wang, A. Tang and W. Wang, "Fast Query over Encrypted Data Based on b+ Tree", International Conference on Apperceiving Computing and Intelligence Analysis (ICACIA), 23-25 Oct. 2009.
  13. Wikipedia, the free encyclopedia that anyone can edit "http://en. wikipedia. org/wiki/Hash_table" , an article on Hash table
  14. Bertino, E. ; Sandhu, R. , "Database security – concepts, approaches and challenges", IEEETransactions on Dependable and Secure Computing, VOL. 2, NO. 1, JANUARY-MARCH 2005
  15. S. Sesay, Z. Yang, J. Chen and D. Xu, "A secure Database Encryption Scheme". Consumer Communications and Networking Conference (CCNC), 2005, pp. 49-53
  16. W. Baohua, M. Xiniang and L. Danning, "A Formal Mutilevel Database Security Model", IEEE International Conference on Computational Intelligence and Security, 13-17 Dec. 2008.
  17. Y. Zhang, W. Li and X. Niu, "A Method of Bucket Index over Encrypted Character Data in Database". Intelligent Information Hiding and Multimedia Signal Processing, 2007, pp. 186-189
  18. Michael Mitzenmacher , "Compressed Bloom Filters", IEEE/ACM Transactions on Networking, VOL. 10, NO. 5, October 2002
  19. Jehoshua Bruck , Jie Gao and Anxiao (Andrew) Jiang, "Weighted Bloom Filter" ISIT 2006, Seattle, USA, July 9 14, 2006
  20. Yasuhiro Ohtaki, "Partial Disclosure of Searchable Encrypted Data with Support for Boolean Queries, Availability, Reliability and Security", 2008. ARES 08. Third International Conference
  21. Yong Zhang, Wei-xin Li and Xia-Mu Niu, "A Secure Cipher Index Over Encrypted Character Data in Database", Proceedings of the Seventh International Conference on Machine Learning and Cybernetics, Kunming, 12-15 July 2008
  22. Lianzhong Liu and Jingfen Gai, "Bloom Filter Based Index for Query over Encrypted Character Strings in Database", 2009 World Congress on Computer Science and Information Engineering
  23. Yong Soon KIM and Eui Kyeong Hong, "Considerations of Extending SQL on Encrypted Data in UniSQL", Advanced Communication Technology, The 9th International Conference on 12-14 Feb. 2007
  24. Tingjian Ge and Stan Zdonik, "Fast, Secure Encryption for Indexing in a Column-Oriented DBMS", Data Engineering, 2007. ICDE 2007. IEEE 23rd International Conference
  25. Premchand B. Ambhore,B. B. Meshram and V. B. Waghmare "A Implementation of Object Oriented Database Security", Software Engineering Research, Management & Applications, 2007. SERA 2007. 5th ACIS International Conference
  26. Yu Chen and Wesley W. Chu, Fellow "Protection of Database Security via Collaborative Inference Detection", IEEE Transactions on Knowledge and Data Engineering, VOL. 20, NO. 8, August 2008
  27. Zhu Yangqing, Yu Hui and Li Hua, "Design of A New Web Database Security Model", 2009 Second International Symposium on Electronic Commerce and Security
  28. Sohail IMRAN and Irfan Hyder, "Security Issues in Databases", 2009 Second International Conference on Future Information Technology and Management Engineering
  29. Xu Ruzhi, Guo jian and Deng Liwu, "A Database Security Gateway to the Detection of SQL Attacks", 2010 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE)
  30. http://www. cecs. csulb. edu/~monge/classes/share/B+TreeIndexes. html.
Index Terms

Computer Science
Information Sciences

Keywords

Encryption Hash Map Querying Over Encrypted Data Index