Analysing Algorithms for Querying Encrypted Database

Abstract

With the invent of cloud computing, database outsourcing has emerged as a new platform. After the introduction of Database-as-a-Service (DAS) model organizations are outsourcing management of their data to third party cloud service providers. A cloud database runs on a cloud computing platform, such as Amazon EC2, GoGrid, Salesforce and Rackspace. Secret and sensitive information contained in the database may be captured and leaked by a curious cloud database vendor. To protect data integrity and confidentiality database need to be encrypted before being outsourced to the cloud. Various bucketization techniques are used for executing queries on an encrypted database on a cloud. This paper is an extension of the work done by researchers. Query Optimal Bucketization (QOB) algorithm divides the server data into buckets subject to an optimality constraint. Query Based Bucketization (QBB) algorithm uses the prior information of query distribution to bucketize the server data. In this paper an improved algorithm based on QBB was proposed to reduce the total number False-Positives received while querying the encrypted database.

Authors and Affiliations

Mohmad Ibraheem, Mr. Jasbir Singh

Keywords

Related Articles

Recent Review on Trending Routing Protocols for Data Transmission

the route creation is done by inter-connecting the most adjacent nodes. Routing is the main issue in wireless network. The whole data delivery depends upon this because if the selected route is not appropriate or effici...

Improved Insulation Design Scheme for 145kv Current Transformer with the Help of Electric Field Analysis through Finite Element Method

This paper proposes a new Capacitive graded bushing configuration for 145kV Live Tank Current Transformer which has lowest possible maximum electrical stress in it. Capacitive graded bushing breakdown is one of the majo...

To Study Traffic Parameters on National Highway

This paper is an attempt to study the basic problem of estimating traffic volume at road, but only a few hours and few days (peak period) of survey instead of hole year of survey. For all aspects of planning and designi...

Border Security System for Indian Fishermen Using Antenna and Wave Propagation

The above security system uses a microwave antenna operating at a particular frequency band which has been specially allocated for this security purpose. A receiver antenna operating at the same frequency will be receiv...

Chromatic Prime Number for Circular Embedded Graph of the Tensor Product Graph

The Chromatic number of tensor product (G ⊗ H) of G and H has vertex set V(G) and V(H). In this paper, we introduced chromatic prime number on circular embedded graph of tensor product.

Download PDF file
  • EP ID EP24754
  • DOI -
  • Views 371
  • Downloads 16

How To Cite

Mohmad Ibraheem, Mr. Jasbir Singh (2017). Analysing Algorithms for Querying Encrypted Database. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 5(6), -. https://europub.co.uk/articles/-A-24754