Path: Top -> Journal -> Jurnal Internasional -> Journal -> Computer
A Technique for Handling Range and Fuzzy Match Queries on Encrypted Data
A Technique for Handling Range and Fuzzy Match Queries on Encrypted Data
2010Journal from gdlhub / 2017-08-14 11:52:32
Oleh : Shaukat Ali, Azhar Rauf, Huma Javed , IAJIT
Dibuat : 2012-06-23, dengan 1 file
Keyword : Database security, encryption, performance.
Subjek : A Technique for Handling Range and Fuzzy Match Queries on Encrypted Data
Url : http://www.ccis2k.org/iajit/PDF/vol.10,no.3/8-3022.pdf
Sumber pengambilan dokumen : Internet
Data is an important asset of todays dynamically operating organizations and their businesses. Data is usually
stored in databases. An important issue for IT professionals is to secure such data from unauthorized access and intruders.
For protecting business centric data, many levels of security are used. Among these levels, data encryption is the final layer of
security. Although encryption makes it difficult to breach this level of security, but it has a potential disadvantage of
performance degradation, particularly for those queries which require operations on encrypted data. This work proposes to
allow users to query over the encrypted column directly without decrypting it. This improves the performance of the SELECT
query. In this technique the query retrieves only those records fulfilling the users search criteria and the data will be
decrypted on the fly. The proposed algorithm handles range, fuzzy match, and exact match type queries. It has no false
positive hits. From experimental findings the algorithm has shown greater efficiency than the state of art technique.
Data is an important asset of todays dynamically operating organizations and their businesses. Data is usually
stored in databases. An important issue for IT professionals is to secure such data from unauthorized access and intruders.
For protecting business centric data, many levels of security are used. Among these levels, data encryption is the final layer of
security. Although encryption makes it difficult to breach this level of security, but it has a potential disadvantage of
performance degradation, particularly for those queries which require operations on encrypted data. This work proposes to
allow users to query over the encrypted column directly without decrypting it. This improves the performance of the SELECT
query. In this technique the query retrieves only those records fulfilling the users search criteria and the data will be
decrypted on the fly. The proposed algorithm handles range, fuzzy match, and exact match type queries. It has no false
positive hits. From experimental findings the algorithm has shown greater efficiency than the state of art technique.
Beri Komentar ?#(0) | Bookmark
Properti | Nilai Properti |
---|---|
ID Publisher | gdlhub |
Organisasi | IAJIT |
Nama Kontak | Herti Yani, S.Kom |
Alamat | Jln. Jenderal Sudirman |
Kota | Jambi |
Daerah | Jambi |
Negara | Indonesia |
Telepon | 0741-35095 |
Fax | 0741-35093 |
E-mail Administrator | elibrarystikom@gmail.com |
E-mail CKO | elibrarystikom@gmail.com |
Print ...
Kontributor...
- , Editor: fachruddin
Download...
Download hanya untuk member.
23
File : 23.14.PDF
(489951 bytes)