Path: Top -> Journal -> Jurnal Internasional -> Journal -> Computer

A Technique for Handling Range and Fuzzy Match Queries on Encrypted Data

A Technique for Handling Range and Fuzzy Match Queries on Encrypted Data

2010
Journal from gdlhub / 2017-08-14 11:52:32
Oleh : Shaukat Ali, Azhar Rauf, Huma Javed , IAJIT
Dibuat : 2012-06-23, dengan 1 file

Keyword : Database security, encryption, performance.
Subjek : A Technique for Handling Range and Fuzzy Match Queries on Encrypted Data
Url : http://www.ccis2k.org/iajit/PDF/vol.10,no.3/8-3022.pdf
Sumber pengambilan dokumen : Internet

Data is an important asset of today’s dynamically operating organizations and their businesses. Data is usually


stored in databases. An important issue for IT professionals is to secure such data from unauthorized access and intruders.


For protecting business centric data, many levels of security are used. Among these levels, data encryption is the final layer of


security. Although encryption makes it difficult to breach this level of security, but it has a potential disadvantage of


performance degradation, particularly for those queries which require operations on encrypted data. This work proposes to


allow users to query over the encrypted column directly without decrypting it. This improves the performance of the SELECT


query. In this technique the query retrieves only those records fulfilling the user’s search criteria and the data will be


decrypted on the fly. The proposed algorithm handles range, fuzzy match, and exact match type queries. It has no “false


positive hits”. From experimental findings the algorithm has shown greater efficiency than the state of art technique.

Deskripsi Alternatif :

Data is an important asset of today’s dynamically operating organizations and their businesses. Data is usually


stored in databases. An important issue for IT professionals is to secure such data from unauthorized access and intruders.


For protecting business centric data, many levels of security are used. Among these levels, data encryption is the final layer of


security. Although encryption makes it difficult to breach this level of security, but it has a potential disadvantage of


performance degradation, particularly for those queries which require operations on encrypted data. This work proposes to


allow users to query over the encrypted column directly without decrypting it. This improves the performance of the SELECT


query. In this technique the query retrieves only those records fulfilling the user’s search criteria and the data will be


decrypted on the fly. The proposed algorithm handles range, fuzzy match, and exact match type queries. It has no “false


positive hits”. From experimental findings the algorithm has shown greater efficiency than the state of art technique.

Beri Komentar ?#(0) | Bookmark

PropertiNilai Properti
ID Publishergdlhub
OrganisasiIAJIT
Nama KontakHerti Yani, S.Kom
AlamatJln. Jenderal Sudirman
KotaJambi
DaerahJambi
NegaraIndonesia
Telepon0741-35095
Fax0741-35093
E-mail Administratorelibrarystikom@gmail.com
E-mail CKOelibrarystikom@gmail.com

Print ...

Kontributor...

  • , Editor: fachruddin

Download...

  • Download hanya untuk member.

    23
    Download Image
    File : 23.14.PDF

    (489951 bytes)