Skip to main content

Secure Query Processing Over Encrypted Database Through CryptDB

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 709))

Abstract

Cloud computing has changed the world of technology business by providing more flexible services over the Internet. DaaS is a service, where the organization can store their data at the heavy server at remote sites of the service provider and do their transaction seamlessly and without much effort. But this has raised new security issues from both client and server side. In this paper, we have addressed both the issues separately to secure the data at server side by encrypting data using CryptDB and secure it from client-side queries and data are encrypted using cipher technique. We use asymmetric key encryption mechanism for confidentiality and a digital signature for authentication.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Kumar, R.R., Hussain, M.: Query execution over encrypted database. In: 2015 Second International Conference on Advances in Computing and Communication Engineering (ICACCE). IEEE (2015)

    Google Scholar 

  2. Ravan, R.R., Idris, N.B., Mehrabani, Z.: A survey on querying encrypted data for database as a service. In: the Proceedings of IEEE International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), Oct 2013

    Google Scholar 

  3. Wu, Z.D., Xu, G.D., Yu, Z., Yi, X., Chen, E.H., Zhang, Y.C.: Executing SQL Queries Over Encrypted Character Strings in the Database-As-Service Model, vol. 35, pp. 332–348. Elsevier, Nov 2012

    Google Scholar 

  4. Popa, R.A. et al.: CryptDB: protecting confidentiality with encrypted query processing. In: Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles. ACM (2011)

    Google Scholar 

  5. Popa, R.A., Zeldovich, N., Balakrishnan, H.: CryptDB: a Practical Encrypted Relational DBMS (2011)

    Google Scholar 

  6. Xiao, L., Yen, I.-L.: Security analysis for order preserving encryption schemes. In: 2012 46th Annual Conference on Information Sciences and Systems (CISS). IEEE (2012)

    Google Scholar 

  7. Arasu, A., et al.: Querying encrypted data. In: Proceedings of the 2014 ACM SIGMOD international conference on Management of data. ACM (2014)

    Google Scholar 

  8. Hacigumus, H., Iyer, B., Li, C., Mehrotra, S.: Executing SQL over encrypted data in the database service provider model. In: the Proceedings of ACM SIGMOD International Conference on Management of Data, June 2002

    Google Scholar 

  9. Wang, Z.-F., Wang, W., Shi, B.-L.: Storage and query over encrypted character and numerical data in database. In: The Fifth International Conference on Computer and Information Technology (CIT’05). IEEE (2005)

    Google Scholar 

  10. Boldyreva, A., et al.: Order-preserving symmetric encryption. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, Berlin, Heidelberg (2009)

    Google Scholar 

  11. Ryan, Mark D.: Cloud computing security: the scientific challenge, and a survey of solutions. J Syst Softw 86(9), 2263–2268 (2013)

    Article  Google Scholar 

  12. Skiba, M., et al.: Bachelor Thesis Analysis of Encrypted Databases with CryptDB

    Google Scholar 

  13. Popa, R.A., Li, F.H., Zeldovich, N.: An ideal- security protocol for order-preserving encoding. In: the Proceedings of 34th IEEE Symposium on Security and Privacy (IEEE S&P/Oakland), May 2013

    Google Scholar 

  14. Liu, L., Gai, J.: A method of query over encrypted data in database. In: the Proceedings of 09th IEEE International Conference on Computer Engineering and Technology, Jan 2009

    Google Scholar 

  15. Arasu, A., Eguro, K., Kaushik, R., Ramamurthy, R.: Querying encrypted data. In: the Proceedings of 29th IEEE International conference on Data Engineering (ICDE), Apr 2013

    Google Scholar 

  16. Liu, L., Gai, J.: A method of query over encrypted data in database. In: International Conference on Computer Engineering and Technology, 2009. ICCET’09, vol. 1. IEEE (2009)

    Google Scholar 

  17. Hacıgümüş, H., Iyer, B., Mehrotra, S.: Query optimization in encrypted database systems. In: International Conference on Database Systems for Advanced Applications. Springer, Berlin, Heidelberg (2005)

    Google Scholar 

  18. Hacigumus, V.H., Iyer, B.R., Mehrotra, S.: Query optimization in encrypted database systems. US Patent No. 7,685,437. 23 Mar 2010

    Google Scholar 

  19. Smart, N.P., Vercauteren, F.: Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes. International Workshop on Public Key Cryptography. Springer, Berlin, Heidelberg (2010)

    Google Scholar 

  20. Ge, T., Zdonik, S.: Fast, secure encryption for indexing in a column-oriented DBMS. In: 2007 IEEE 23rd International Conference on Data Engineering. IEEE (2007)

    Google Scholar 

  21. Bao, F., et al.: Private query on encrypted data in multi-user settings. In: International Conference on Information Security Practice and Experience. Springer, Berlin, Heidelberg (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Muzzammil Hussain .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kumar, A., Hussain, M. (2018). Secure Query Processing Over Encrypted Database Through CryptDB. In: Sa, P., Bakshi, S., Hatzilygeroudis, I., Sahoo, M. (eds) Recent Findings in Intelligent Computing Techniques . Advances in Intelligent Systems and Computing, vol 709. Springer, Singapore. https://doi.org/10.1007/978-981-10-8633-5_31

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-8633-5_31

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-8632-8

  • Online ISBN: 978-981-10-8633-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics