Analysing Algorithms for Querying Encrypted Database

Abstract

With the invent of cloud computing, database outsourcing has emerged as a new platform. After the introduction of Database-as-a-Service (DAS) model organizations are outsourcing management of their data to third party cloud service providers. A cloud database runs on a cloud computing platform, such as Amazon EC2, GoGrid, Salesforce and Rackspace. Secret and sensitive information contained in the database may be captured and leaked by a curious cloud database vendor. To protect data integrity and confidentiality database need to be encrypted before being outsourced to the cloud. Various bucketization techniques are used for executing queries on an encrypted database on a cloud. This paper is an extension of the work done by researchers. Query Optimal Bucketization (QOB) algorithm divides the server data into buckets subject to an optimality constraint. Query Based Bucketization (QBB) algorithm uses the prior information of query distribution to bucketize the server data. In this paper an improved algorithm based on QBB was proposed to reduce the total number False-Positives received while querying the encrypted database.

Authors and Affiliations

Mohmad Ibraheem, Mr. Jasbir Singh

Keywords

Related Articles

Survey on Security Challenges, Controls and Defensive Mechanisms for Mobile Devices

Mobile communication has become a significant business tool nowadays. Mobile devices are the main platform for the users to transfer and exchange various information for communication. These devices are variably used fo...

Secured Transaction Using Secured Image

he Image processing is manipulating the image to provide a high quality of it.To improve the security in internet banking. The internet banking system has login using password and user id which can be captured in intern...

A Review Paper on Strength and Durability Study of Concrete by Using Rice Husk Ash and Coconut Fiber

Performance enhancement of non-engineered infra-structural systems in rural areas with locally available materials has become necessary in current day technology, mainly to counter unanticipated loads like Earthquake. I...

slugSynthesis and Characterization of Aurum Enroxin

In this paper we shall study synthesis and I-R studies of new drug AurumEnroxin which is formed when Enrofloxacin is treated with Auric chloride in acidic medium.

Secure and Authorized De-duplication Model in Hybrid Cloud Implementation by Using Multi- Layered Cryptosystem

de-duplication is a standout amongst imperative information layering systems for eliminating copy duplicates for repeat decimal data, and need been generally utilized within cloud capacity to decrease the measure of sto...

Download PDF file
  • EP ID EP24754
  • DOI -
  • Views 391
  • Downloads 16

How To Cite

Mohmad Ibraheem, Mr. Jasbir Singh (2017). Analysing Algorithms for Querying Encrypted Database. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 5(6), -. https://europub.co.uk/articles/-A-24754