Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








1,400 Hits in 6.4 sec

Two-Cloud Secure Database for Numeric-Related SQL Range Queries with Privacy Preserving

Kanad Kartey, Harshil Somia, Vivek Madawat, Pallavi Mathur, B Student
International Research Journal of Engineering and Technology (IRJET)   unpublished
The SQL Queries require a few secure database scheme for its undeniable working, yet this at long last prompts privacy spillage to the cloud server.  ...  For numerical range inquiry (>, <, and so forth.) these neglect to give adequate security insurance.  ...  ACKNOWLEDGEMENT The authors would like to thank the publishers, researchers for making their resources available and teachers for their guidance.  ... 
fatcat:rmmwc7547jdbhftynqpyhcrfui

TWO CLOUD SECURE DATABASE FOR NUMERIC RANGE SQL QUERIES WITH PRIVACY PRESERVING

2018 International Journal of Computing Communications and Networking  
In this paper, we propose two-cloud architecture for secure database, with a series of intersection protocols that provide privacy preservation to various numeric-related range queries.  ...  In order to provide sufficient functionality for SQL queries, many secure database schemes have been proposed. However, such schemes are vulnerable to privacy leakage to cloud server.  ...  PROPOSED SYSTEM: This paper presents two-cloud architecture for secure database, with a series of intersection protocols that provide privacy preservation to various numeric-related range queries.  ... 
doi:10.30534/ijccn/2018/39722018 fatcat:m2t3hg34bbdsrpjf3kpypfd4rq

Two-Cloud Design for Secure Database to give Protection Conservation to different Numeric-Related Range Queries

Yeshwanth Rao Bhandayker
2019 International Journal for Research in Applied Science and Engineering Technology  
In this paper, we recommend a two-cloud layout for safe database, with a development of convergence conventions that give protection conservation to different numeric-related range questions.  ...  So regarding offer sufficient effectiveness to SQL questions, lots of safe and secure database strategies have been recommended.  ...  Crypt uses a collection of cryptographic tools to attain these security capability. Especially, order preserving security is used to realize numeric related range query processes.  ... 
doi:10.22214/ijraset.2019.5494 fatcat:r5bd6wowzvdlpostx5txqw7swq

QSDB: An Encrypted Database Model for Privacy-Preserving in Cloud Computing

2018 KSII Transactions on Internet and Information Systems  
In this paper, we present a secure and practical system over encrypted cloud data, called QSDB (queryable and secure database), which simultaneously supports SQL query operations.  ...  With the advent of database-as-a-service (DAAS) and cloud computing, more and more data owners are motivated to outsource their data to cloud database in consideration of convenience and cost.  ...  There are also some other related privacy-preserving methods proposed to ensure security in database [21] [22] [23] . Databases as service.  ... 
doi:10.3837/tiis.2018.07.021 fatcat:b27rgdixzffmvlras2oxaclfme

Implementation of Secure Homomorphic Encryption on Cloud Database using Two-cloud Architecture

Nivedita W. Wasankar
2018 International Journal for Research in Applied Science and Engineering Technology  
In this paper, we propose a two-cloud architecture for secure database that provide privacy preservation to various queries.  ...  Similarly, increased number of queries will release more information to the cloud server. The various researchers have done numerous work for these issues.  ...  For numeric range queries like between, <, >, OR, AND cloud B fetches data greater than 0 from cloud A database to cloud B and then fire range queries on decrypted data.  ... 
doi:10.22214/ijraset.2018.4438 fatcat:jptte62icjdudk2ckk3eec7g24

L-EncDB: A lightweight framework for privacy-preserving data queries in cloud computing

Jin Li, Zheli Liu, Xiaofeng Chen, Fatos Xhafa, Xiao Tan, Duncan S. Wong
2015 Knowledge-Based Systems  
) to support SQL-based operations including advanced fuzzy and range queries.  ...  In this paper, a novel FPE scheme with the method of "multiradix modular addition" is proposed to support the L-EncDB lightweight framework for privacy-preserving outsourced database.  ...  There are also some other related privacy-preserving methods proposed for the security in database [21] [22] [23] 14] .  ... 
doi:10.1016/j.knosys.2014.04.010 fatcat:fuo7dir67fg7va2fsm3qkzvske

Privacy Preserving for Numeric Data Query in Cloud Computing

B. Spandana et al., B. Spandana et al.,
2018 International Journal of Computer Science Engineering and Information Technology Research  
We have proposed two cloud engineering for secure database, with a progression of crossing point conventions that give protection safeguarding to different numeric related range questions.  ...  Be that as it may, such plans are defenseless against protection spillage to cloud server. For numerical range request (>, <, etcetra) these disregard to give sufficient security protection.  ...  asked for as numeric related SQL inquiries in whatever remains of the paper.  ... 
doi:10.24247/ijcseitroct20183 fatcat:ouzyzenuingdfgoxpy36axixke

Security with Privacy - A Research Agenda

Elisa Bertino, Bharath Kumar Samanthula
2014 Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing  
We propose our initial approaches to address two important PE applications: (i) privacy-preserving data management and (ii) privacy-preserving data analysis under the cloud environment.  ...  Cloud computing is a key technology for storing, managing and analyzing big data.  ...  For example, if the cloud wants to compare two integers given their encrypted values, it can utilize the existing secure comparison solutions to compare the two encrypted values in a privacy-preserving  ... 
doi:10.4108/icst.collaboratecom.2014.257687 dblp:conf/colcom/BertinoS14 fatcat:phyvc6g7tjgmld6vxtkzgvwy2q

A Novel Secure Scheme for Supporting Complex SQL Queries over Encrypted Databases in Cloud Computing

Guoxiu Liu, Geng Yang, Huaqun Wang, Yang Xiang, Hua Dai
2018 Security and Communication Networks  
With the advance of database-as-a-service (DaaS) and cloud computing, increasingly more data owners are motivated to outsource their data to cloud database for great convenience and economic savings.  ...  It is suitable for large batch complex SQL queries over encrypted data in cloud environment.  ...  The data owners can query their data from cloud database. Then, the cloud database should execute SQL queries over the encrypted data.  ... 
doi:10.1155/2018/7383514 fatcat:hpmdtj37dncovott6wzfoeb2de

uFETCH: A Unified Searchable Encryption Scheme and Its SaaS-Native to Make DBMS Privacy-Preserving

Shen-Ming Chung, Ming-Der Shieh, Tzi-Cker Chiueh, Chia-Chia Liu, Chia-Heng Tu
2020 IEEE Access  
to make database management system (DBMS) privacy-preserving.  ...  To demonstrate how uFETCH can bring up simpler designs, a security agent is exemplified to work with off-the-shelf DBMS while making it privacy-preserving.  ...  With the merit of SaaS-native to make off-the-shelf DBMS privacy-preserving, uFETCH brings the following contributions to advocate cloud security and privacy. [7] .  ... 
doi:10.1109/access.2020.2994598 fatcat:hsn4mkgikrcf5axnxroygiitaa

T-DB: Toward Fully Functional Transparent Encrypted Databases in DBaaS Framework [article]

Xiaofei Wang National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences, Beijing, P.R. China, School of Electronic and Information Engineering, Beihang University, Beijing, P.R. China)
2017 arXiv   pre-print
A database owner outsources an encrypted database to a cloud platform, needing only to store the secret keys for encryption and an empty table header for the database; the database users can make almost  ...  all types of queries on the encrypted database as usual; and the cloud can process ciphertext queries as if the database were not encrypted.  ...  The order-preservation and the additivity are preserved for the field as well. 3) Field in equality, range and aggregation query.  ... 
arXiv:1708.08191v1 fatcat:q6cj3dy7mbaffj7mzql3vwhcma

Query encrypted databases practically

Dongxi Liu, Shenlu Wang
2012 Proceedings of the 2012 ACM conference on Computer and communications security - CCS '12  
The cloud database services are attractive for managing outsourced databases. However, the data security and privacy is a big concern hampering the acceptance of cloud database services.  ...  In this demo paper, we demonstrate that aggregate SQL queries with range conditions can be performed efficiently over encrypted databases, without decrypting the databases first, by using our new homomorphic  ...  INTRODUCTION Cloud database services, such as Amazon Relational Database Service (RDS) and Microsoft SQL Azure, are attractive for enterprises to outsource their databases.  ... 
doi:10.1145/2382196.2382321 dblp:conf/ccs/LiuW12 fatcat:2bzr7y2davaa5np5p32fucctay

The modeling of privacy preserving and statistically analysable database (PPSADB) system

Hyun-A Park
2018 International Journal of Advanced Computer Research  
In result, our system can satisfy privacy requirements and simultaneously provide almost all kinds of SQL queries and arithmetic operations for medical research.  ...  The modelling for privacy preserving and statistically analysable database (PPSADB) system was proposed as a solution for this bilateral feature of health information.  ...  Related works As related works, two research areas are addressed; the aggregated SQL queries on encrypted data and PPDM.  ... 
doi:10.19101/ijacr.2018.838017 fatcat:oxjfdzu5vvh3jhntm3h7dkohdi

Enforcing Privacy in Cloud Databases [article]

Somayeh Sobati Moghadam, Gérald Gavin
2017 arXiv   pre-print
aim at making databases secure in a cloud environment, and discuss current pitfalls and related research challenges.  ...  However, most data are sensitive to some extent, and data privacy remains one of the top concerns to DBaaS users, for obvious legal and competitive reasons.In this paper, we survey the mechanisms that  ...  Wang et al. propose a framework for secure and efficient query processing of relational data in the cloud that allows exact match and range queries, as well as updates [71] .  ... 
arXiv:1708.09171v1 fatcat:stvwiwy3b5bo5gdxmxcv3w46pm

Efficient Keyword Query in Encrypted Cloud Databases

He-qun XIAN, Shu-guang ZHANG, Man ZHANG, Jun-zheng XIANG, Min LI
2017 DEStech Transactions on Engineering and Technology Research  
Encryption is an efficient way of protecting database security. Traditional keyword based queries cannot be executed directly over encrypted databases.  ...  Finally, we make an extension of the current SQL in our system by creating user-defined functions and CRL assemblies. The prototype of our design is implemented on a SQL Server database.  ...  Most queries for character data involve precise match conditions or fuzzy match conditions, while queries for numerical data often include quantity and range conditions.  ... 
doi:10.12783/dtetr/eeta2017/7761 fatcat:5lxnicgrnrdvvjlcu7ynz4elqu
« Previous Showing results 1 — 15 out of 1,400 results