Abstract

Recently, database users have begun to use cloud database services to outsource their databases. The reason for this is the high computation speed and the huge storage capacity that cloud owners provide at low prices. However, despite the attractiveness of the cloud computing environment to database users, privacy issues remain a cause for concern for database owners since data access is out of their control. Encryption is the only way of assuaging users’ fears surrounding data privacy, but executing Structured Query Language (SQL) queries over encrypted data is a challenging task, especially if the data are encrypted by a randomized encryption algorithm. Many researchers have addressed the privacy issues by encrypting the data using deterministic, onion layer, or homomorphic encryption. Nevertheless, even with these systems, the encrypted data can still be subjected to attack. In this research, we first propose an indexing scheme to encode the original table’s tuples into bit vectors (BVs) prior to the encryption. The resulting index is then used to narrow the range of retrieved encrypted records from the cloud to a small set of records that are candidates for the user’s query. Based on the indexing scheme, we then design a system to execute SQL queries over the encrypted data. The data are encrypted by a single randomized encryption algorithm, namely the Advanced Encryption Standard-Cipher-Block Chaining (AES-CBC). In the proposed scheme, we store the index values (BVs) at user’s side, and we extend the system to support most of relational algebra operators, such as select, join, etc. Implementation and evaluation of the proposed system reveals that it is practical and efficient at reducing both the computation and space overhead when compared with state-of-the-art systems like CryptDB.

Highlights

  • In the contemporary electronic era, both individuals and organizations need scalable data storage and high-performance computing units to process and store their data

  • Executing Structured Query Language (SQL) queries over encrypted data is challenging, especially if a randomized encryption algorithm, like Advanced Encryption Standard-Cipher-Block Chaining (AES-CBC), is used for the encryption

  • We first introduce the query manager (QM), a trusted server, which works as an intermediate between the cloud server and user(s) and performs all the crypto processes

Read more

Summary

Introduction

In the contemporary electronic era, both individuals and organizations need scalable data storage and high-performance computing units to process and store their data. Only large organizations/companies have been able to own such units, as they were not affordable for most individuals and small companies. With the rise of cloud computing, this problem has been solved, as users can rent storage and computational units as needed at an affordable price. Most cloud providers provide databases as a service, which allow individual users and companies to outsource their data and access them at any time, from any location. Given that privacy breaches are one of the most common threats in the cloud computing environment, many people have expressed concerns about privacy when outsourcing sensitive data. Untrustworthy cloud service providers might steal personal customer information, such as email addresses, mailing addresses, and phone numbers, and sell that information to third parties, who can use it to send irritating advertisements to users via email, mail, and telephone

Objectives
Methods
Findings
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.