Research Article

A New Method of Query over Encrypted Data in Database using Hash Map

by  Mohammed Alhanjouri, Ayman M. Al Derawi
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 41 - Issue 4
Published: March 2012
Authors: Mohammed Alhanjouri, Ayman M. Al Derawi
10.5120/5533-7580
PDF

Mohammed Alhanjouri, Ayman M. Al Derawi . A New Method of Query over Encrypted Data in Database using Hash Map. International Journal of Computer Applications. 41, 4 (March 2012), 46-51. DOI=10.5120/5533-7580

                        @article{ 10.5120/5533-7580,
                        author  = { Mohammed Alhanjouri,Ayman M. Al Derawi },
                        title   = { A New Method of Query over Encrypted Data in Database using Hash Map },
                        journal = { International Journal of Computer Applications },
                        year    = { 2012 },
                        volume  = { 41 },
                        number  = { 4 },
                        pages   = { 46-51 },
                        doi     = { 10.5120/5533-7580 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2012
                        %A Mohammed Alhanjouri
                        %A Ayman M. Al Derawi
                        %T A New Method of Query over Encrypted Data in Database using Hash Map%T 
                        %J International Journal of Computer Applications
                        %V 41
                        %N 4
                        %P 46-51
                        %R 10.5120/5533-7580
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

Critical business data in databases is an attractive target for attack. Therefore, ensuring the confidentiality, privacy and integrity of data is a major issue for the security of database systems. High secure data in databases is protected by encryption. When the data is encrypted, query performance decreases. In our paper we propose a new mechanism to query the encrypted data beside make a tradeoff between the performance and the security. Our mechanism will work over many data-types. We implement our work as a layer above the DBMS; this makes our method compatible with any DBMS. Our method based on replacing the select conditions on the encrypted data with another condition which is faster. The new way must have no security weak that is can't show an aspect for the plain data. The results of the experiments validate our approach.

References
  • Erez Shmueli, Ronen Vaisenberg, Yuval Elovici and Chanan Glezer, "Database Encryption – An Overview of Contemporary Challenges and Design Considerations" SIGMOD Record, September 2009 (Vol. 38, No. 3)
  • Dawn Xiaodong Song, David Wagner, and Adrian Perring. Practical Techniques for Searches on Encrypted Data, IEEE Symposium on Security and Privacy, 2000, pp. 44-55.
  • H. Hacigumus , Bala Iyer and Sharad Mehrotra, "Providing Database as a Service", Data Engineering, 2002. Proceedings. 18th International Conference
  • H. Hacigumus, B. Iyer, C. Li and S. Mehrotra, "Executing SQL over encrypted data in the database service provider model," In ACM SIGMOD Conference, 2002, pp. 216-227.
  • H. Hacigumus, B. Iyer, and S. Mehrotra. "Efficient execution of aggregation queries over encrypted relational databases". In the proceedings of Database Systems for Advanced Applications (DASFAA), 2004, pp. 125-136
  • B. Hore, S. Mehrotra and G. Tsudik. "A Privacy-Preserving Index for Range Queries". In Proceedings of the 30th VLDB Conference, 2004, pp. 720–731.
  • Z. Wang, J. Dai, W. Wang and B. L. Shi, "Fast Query over Encrypted Character Data in Database". Communications In Information and Systems, 2004, pp. 289-300
  • Zheng-Fei Wang, Wei Wang and Bai-Le Shi , "Storage and Query over Encrypted Character and Numerical Data in Database", Computer and Information Technology, 2005. CIT 2005. The Fifth International Conference
  • H. Zhu, J. Cheng and R. Jin, "Execution Query over Encrypted Character Strings in Databases," Frontier of Computer Science and Technology, 2007, pp. 90-97
  • H. APark, D. Lee, J. Zhan and G. Blosser, "Efficient Keyword Index Search over Encrypted Documents of Groups" ISI 2008, June 17-20
  • Yu Han, Zhao Liang Niu Xiamu, "Research on a new method for database encryption and cipher index". Acta Electronica Sinica, No. 12A 2005
  • Z. Wang, A. Tang and W. Wang, "Fast Query over Encrypted Data Based on b+ Tree", International Conference on Apperceiving Computing and Intelligence Analysis (ICACIA), 23-25 Oct. 2009.
  • Wikipedia, the free encyclopedia that anyone can edit "http://en. wikipedia. org/wiki/Hash_table" , an article on Hash table
  • Bertino, E. ; Sandhu, R. , "Database security – concepts, approaches and challenges", IEEETransactions on Dependable and Secure Computing, VOL. 2, NO. 1, JANUARY-MARCH 2005
  • S. Sesay, Z. Yang, J. Chen and D. Xu, "A secure Database Encryption Scheme". Consumer Communications and Networking Conference (CCNC), 2005, pp. 49-53
  • W. Baohua, M. Xiniang and L. Danning, "A Formal Mutilevel Database Security Model", IEEE International Conference on Computational Intelligence and Security, 13-17 Dec. 2008.
  • Y. Zhang, W. Li and X. Niu, "A Method of Bucket Index over Encrypted Character Data in Database". Intelligent Information Hiding and Multimedia Signal Processing, 2007, pp. 186-189
  • Michael Mitzenmacher , "Compressed Bloom Filters", IEEE/ACM Transactions on Networking, VOL. 10, NO. 5, October 2002
  • Jehoshua Bruck , Jie Gao and Anxiao (Andrew) Jiang, "Weighted Bloom Filter" ISIT 2006, Seattle, USA, July 9 14, 2006
  • Yasuhiro Ohtaki, "Partial Disclosure of Searchable Encrypted Data with Support for Boolean Queries, Availability, Reliability and Security", 2008. ARES 08. Third International Conference
  • Yong Zhang, Wei-xin Li and Xia-Mu Niu, "A Secure Cipher Index Over Encrypted Character Data in Database", Proceedings of the Seventh International Conference on Machine Learning and Cybernetics, Kunming, 12-15 July 2008
  • Lianzhong Liu and Jingfen Gai, "Bloom Filter Based Index for Query over Encrypted Character Strings in Database", 2009 World Congress on Computer Science and Information Engineering
  • Yong Soon KIM and Eui Kyeong Hong, "Considerations of Extending SQL on Encrypted Data in UniSQL", Advanced Communication Technology, The 9th International Conference on 12-14 Feb. 2007
  • Tingjian Ge and Stan Zdonik, "Fast, Secure Encryption for Indexing in a Column-Oriented DBMS", Data Engineering, 2007. ICDE 2007. IEEE 23rd International Conference
  • Premchand B. Ambhore,B. B. Meshram and V. B. Waghmare "A Implementation of Object Oriented Database Security", Software Engineering Research, Management & Applications, 2007. SERA 2007. 5th ACIS International Conference
  • Yu Chen and Wesley W. Chu, Fellow "Protection of Database Security via Collaborative Inference Detection", IEEE Transactions on Knowledge and Data Engineering, VOL. 20, NO. 8, August 2008
  • Zhu Yangqing, Yu Hui and Li Hua, "Design of A New Web Database Security Model", 2009 Second International Symposium on Electronic Commerce and Security
  • Sohail IMRAN and Irfan Hyder, "Security Issues in Databases", 2009 Second International Conference on Future Information Technology and Management Engineering
  • Xu Ruzhi, Guo jian and Deng Liwu, "A Database Security Gateway to the Detection of SQL Attacks", 2010 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE)
  • http://www. cecs. csulb. edu/~monge/classes/share/B+TreeIndexes. html.
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Encryption Hash Map Querying Over Encrypted Data Index

Powered by PhDFocusTM