Executing SQL queries over encrypted character strings in the Database-As-Service model

نویسندگان

  • Zongda Wu
  • Guandong Xu
  • Yu Zong
  • Xun Yi
  • Enhong Chen
  • Yanchun Zhang
چکیده

Rapid advances in the networking technologies have prompted the emergence of the ‘‘software as service’’ model for enterprise computing, moreover, which is becoming one of the key industries quickly. ‘‘Database as service’’ model provides users power to store, modify and retrieve data from anywhere in the world, as long as they have access to the Internet, thus, being increasingly popular in current enterprise data management systems. However, this model introduces several challenges, an essential issue being how to implement SQL queries over encrypted data efficiently. To ensure data security, this model generally encrypts sensitive data at the trusted client’s site, before storing them into the non-trusted database service provider’s site, which, unfortunately, results in that SQL queries cannot be executed over the encrypted data immediately at the database service provider. In this paper we only focus on how to query encrypted character strings efficiently. Our strategy is that when storing character strings to the database service provider, we not only store the encrypted character strings themselves, but also generate some characteristic index values for these character strings, and store them in an additional field; and when querying the encrypted character strings, we first execute a coarse query over the characteristic index fields at the database service provider, in order to filter out most of tuples not related to the querying conditions, and then, we decrypt the rest tuples and execute a refined query over them again at the client site. In our strategy, we define an n-phase reachability matrix for a character string and use it as the characteristic index values, and based on such a definition, we present some theorems to split a SQL query into its server-side representation and client-side representation for partitioning the computation of a query across the client and the server and thus improving query performance. Finally, experimental results validate the functionality and effectiveness of our

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Aggregation Queries in the Database-As-a-Service Model

In the Database-As-a-Service (DAS) model, clients store their database contents at servers belonging to potentially untrusted service providers. To maintain data confidentiality, clients need to outsource their data to servers in encrypted form. At the same time, clients must still be able to execute queries over encrypted data. One prominent and fairly effective technique for executing SQL-sty...

متن کامل

Potential Security Holes in Hacıgümüş’ Scheme of Executing SQL over Encrypted Data

Hacıgümüş, Iyer, Li and Mehrotra proposed the first scheme of executing SQL over encrypted data in the database-service-provider model. However, they did not address the security strength of the scheme over different attack models. While Hacıgümüş’ scheme looks secure in a general setting, this paper attempts to explore any plausible attacks against this scheme in specific environments. We pres...

متن کامل

CryptDB: A Practical Encrypted Relational DBMS

CryptDB is a DBMS that provides provable and practical privacy in the face of a compromised database server or curious database administrators. CryptDB works by executing SQL queries over encrypted data. At its core are three novel ideas: an SQL-aware encryption strategy that maps SQL operations to encryption schemes, adjustable query-based encryption which allows CryptDB to adjust the encrypti...

متن کامل

L-EncDB: A lightweight framework for privacy-preserving data queries in cloud computing

With the advent of cloud computing, individuals and organizations have become interested in moving their databases from local to remote cloud servers. However, data owners and cloud service providers are not in the same trusted domain in practice. For the protection of data privacy, sensitive data usually have to be encrypted before outsourcing, which makes effective database utilization a very...

متن کامل

Qincloud: an Agent-based System for Quering Encrypted Data in Cloud Databases

With the rapid growth of technology, cloud computing become more and more popular. Many organizations have been attracted by the variety of services that have been offered by the clouds in form of resources and applications. Database system is one of the most widely used systems in industry. Cloud providers offer database-as-a-service to attract more clients to use their services. However, exec...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Knowl.-Based Syst.

دوره 35  شماره 

صفحات  -

تاریخ انتشار 2012