Abstract
Cloud computing has changed the world of technology business by providing more flexible services over the Internet. DaaS is a service, where the organization can store their data at the heavy server at remote sites of the service provider and do their transaction seamlessly and without much effort. But this has raised new security issues from both client and server side. In this paper, we have addressed both the issues separately to secure the data at server side by encrypting data using CryptDB and secure it from client-side queries and data are encrypted using cipher technique. We use asymmetric key encryption mechanism for confidentiality and a digital signature for authentication.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Kumar, R.R., Hussain, M.: Query execution over encrypted database. In: 2015 Second International Conference on Advances in Computing and Communication Engineering (ICACCE). IEEE (2015)
Ravan, R.R., Idris, N.B., Mehrabani, Z.: A survey on querying encrypted data for database as a service. In: the Proceedings of IEEE International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), Oct 2013
Wu, Z.D., Xu, G.D., Yu, Z., Yi, X., Chen, E.H., Zhang, Y.C.: Executing SQL Queries Over Encrypted Character Strings in the Database-As-Service Model, vol. 35, pp. 332–348. Elsevier, Nov 2012
Popa, R.A. et al.: CryptDB: protecting confidentiality with encrypted query processing. In: Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles. ACM (2011)
Popa, R.A., Zeldovich, N., Balakrishnan, H.: CryptDB: a Practical Encrypted Relational DBMS (2011)
Xiao, L., Yen, I.-L.: Security analysis for order preserving encryption schemes. In: 2012 46th Annual Conference on Information Sciences and Systems (CISS). IEEE (2012)
Arasu, A., et al.: Querying encrypted data. In: Proceedings of the 2014 ACM SIGMOD international conference on Management of data. ACM (2014)
Hacigumus, H., Iyer, B., Li, C., Mehrotra, S.: Executing SQL over encrypted data in the database service provider model. In: the Proceedings of ACM SIGMOD International Conference on Management of Data, June 2002
Wang, Z.-F., Wang, W., Shi, B.-L.: Storage and query over encrypted character and numerical data in database. In: The Fifth International Conference on Computer and Information Technology (CIT’05). IEEE (2005)
Boldyreva, A., et al.: Order-preserving symmetric encryption. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, Berlin, Heidelberg (2009)
Ryan, Mark D.: Cloud computing security: the scientific challenge, and a survey of solutions. J Syst Softw 86(9), 2263–2268 (2013)
Skiba, M., et al.: Bachelor Thesis Analysis of Encrypted Databases with CryptDB
Popa, R.A., Li, F.H., Zeldovich, N.: An ideal- security protocol for order-preserving encoding. In: the Proceedings of 34th IEEE Symposium on Security and Privacy (IEEE S&P/Oakland), May 2013
Liu, L., Gai, J.: A method of query over encrypted data in database. In: the Proceedings of 09th IEEE International Conference on Computer Engineering and Technology, Jan 2009
Arasu, A., Eguro, K., Kaushik, R., Ramamurthy, R.: Querying encrypted data. In: the Proceedings of 29th IEEE International conference on Data Engineering (ICDE), Apr 2013
Liu, L., Gai, J.: A method of query over encrypted data in database. In: International Conference on Computer Engineering and Technology, 2009. ICCET’09, vol. 1. IEEE (2009)
Hacıgümüş, H., Iyer, B., Mehrotra, S.: Query optimization in encrypted database systems. In: International Conference on Database Systems for Advanced Applications. Springer, Berlin, Heidelberg (2005)
Hacigumus, V.H., Iyer, B.R., Mehrotra, S.: Query optimization in encrypted database systems. US Patent No. 7,685,437. 23 Mar 2010
Smart, N.P., Vercauteren, F.: Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes. International Workshop on Public Key Cryptography. Springer, Berlin, Heidelberg (2010)
Ge, T., Zdonik, S.: Fast, secure encryption for indexing in a column-oriented DBMS. In: 2007 IEEE 23rd International Conference on Data Engineering. IEEE (2007)
Bao, F., et al.: Private query on encrypted data in multi-user settings. In: International Conference on Information Security Practice and Experience. Springer, Berlin, Heidelberg (2008)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Kumar, A., Hussain, M. (2018). Secure Query Processing Over Encrypted Database Through CryptDB. In: Sa, P., Bakshi, S., Hatzilygeroudis, I., Sahoo, M. (eds) Recent Findings in Intelligent Computing Techniques . Advances in Intelligent Systems and Computing, vol 709. Springer, Singapore. https://doi.org/10.1007/978-981-10-8633-5_31
Download citation
DOI: https://doi.org/10.1007/978-981-10-8633-5_31
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-8632-8
Online ISBN: 978-981-10-8633-5
eBook Packages: EngineeringEngineering (R0)