Analysing Algorithms for Querying Encrypted Database
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 6
Abstract
With the invent of cloud computing, database outsourcing has emerged as a new platform. After the introduction of Database-as-a-Service (DAS) model organizations are outsourcing management of their data to third party cloud service providers. A cloud database runs on a cloud computing platform, such as Amazon EC2, GoGrid, Salesforce and Rackspace. Secret and sensitive information contained in the database may be captured and leaked by a curious cloud database vendor. To protect data integrity and confidentiality database need to be encrypted before being outsourced to the cloud. Various bucketization techniques are used for executing queries on an encrypted database on a cloud. This paper is an extension of the work done by researchers. Query Optimal Bucketization (QOB) algorithm divides the server data into buckets subject to an optimality constraint. Query Based Bucketization (QBB) algorithm uses the prior information of query distribution to bucketize the server data. In this paper an improved algorithm based on QBB was proposed to reduce the total number False-Positives received while querying the encrypted database.
Authors and Affiliations
Mohmad Ibraheem, Mr. Jasbir Singh
Recent Review on Trending Routing Protocols for Data Transmission
the route creation is done by inter-connecting the most adjacent nodes. Routing is the main issue in wireless network. The whole data delivery depends upon this because if the selected route is not appropriate or effici...
Improved Insulation Design Scheme for 145kv Current Transformer with the Help of Electric Field Analysis through Finite Element Method
This paper proposes a new Capacitive graded bushing configuration for 145kV Live Tank Current Transformer which has lowest possible maximum electrical stress in it. Capacitive graded bushing breakdown is one of the majo...
To Study Traffic Parameters on National Highway
This paper is an attempt to study the basic problem of estimating traffic volume at road, but only a few hours and few days (peak period) of survey instead of hole year of survey. For all aspects of planning and designi...
Border Security System for Indian Fishermen Using Antenna and Wave Propagation
The above security system uses a microwave antenna operating at a particular frequency band which has been specially allocated for this security purpose. A receiver antenna operating at the same frequency will be receiv...
Chromatic Prime Number for Circular Embedded Graph of the Tensor Product Graph
The Chromatic number of tensor product (G ⊗ H) of G and H has vertex set V(G) and V(H). In this paper, we introduced chromatic prime number on circular embedded graph of tensor product.