A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Two-Cloud Secure Database for Numeric-Related SQL Range Queries with Privacy Preserving
International Research Journal of Engineering and Technology (IRJET)
unpublished
The SQL Queries require a few secure database scheme for its undeniable working, yet this at long last prompts privacy spillage to the cloud server. ...
For numerical range inquiry (>, <, and so forth.) these neglect to give adequate security insurance. ...
ACKNOWLEDGEMENT The authors would like to thank the publishers, researchers for making their resources available and teachers for their guidance. ...
fatcat:rmmwc7547jdbhftynqpyhcrfui
TWO CLOUD SECURE DATABASE FOR NUMERIC RANGE SQL QUERIES WITH PRIVACY PRESERVING
2018
International Journal of Computing Communications and Networking
In this paper, we propose two-cloud architecture for secure database, with a series of intersection protocols that provide privacy preservation to various numeric-related range queries. ...
In order to provide sufficient functionality for SQL queries, many secure database schemes have been proposed. However, such schemes are vulnerable to privacy leakage to cloud server. ...
PROPOSED SYSTEM: This paper presents two-cloud architecture for secure database, with a series of intersection protocols that provide privacy preservation to various numeric-related range queries. ...
doi:10.30534/ijccn/2018/39722018
fatcat:m2t3hg34bbdsrpjf3kpypfd4rq
Two-Cloud Design for Secure Database to give Protection Conservation to different Numeric-Related Range Queries
2019
International Journal for Research in Applied Science and Engineering Technology
In this paper, we recommend a two-cloud layout for safe database, with a development of convergence conventions that give protection conservation to different numeric-related range questions. ...
So regarding offer sufficient effectiveness to SQL questions, lots of safe and secure database strategies have been recommended. ...
Crypt uses a collection of cryptographic tools to attain these security capability. Especially, order preserving security is used to realize numeric related range query processes. ...
doi:10.22214/ijraset.2019.5494
fatcat:r5bd6wowzvdlpostx5txqw7swq
QSDB: An Encrypted Database Model for Privacy-Preserving in Cloud Computing
2018
KSII Transactions on Internet and Information Systems
In this paper, we present a secure and practical system over encrypted cloud data, called QSDB (queryable and secure database), which simultaneously supports SQL query operations. ...
With the advent of database-as-a-service (DAAS) and cloud computing, more and more data owners are motivated to outsource their data to cloud database in consideration of convenience and cost. ...
There are also some other related privacy-preserving methods proposed to ensure security in database [21] [22] [23] . Databases as service. ...
doi:10.3837/tiis.2018.07.021
fatcat:b27rgdixzffmvlras2oxaclfme
Implementation of Secure Homomorphic Encryption on Cloud Database using Two-cloud Architecture
2018
International Journal for Research in Applied Science and Engineering Technology
In this paper, we propose a two-cloud architecture for secure database that provide privacy preservation to various queries. ...
Similarly, increased number of queries will release more information to the cloud server. The various researchers have done numerous work for these issues. ...
For numeric range queries like between, <, >, OR, AND cloud B fetches data greater than 0 from cloud A database to cloud B and then fire range queries on decrypted data. ...
doi:10.22214/ijraset.2018.4438
fatcat:jptte62icjdudk2ckk3eec7g24
L-EncDB: A lightweight framework for privacy-preserving data queries in cloud computing
2015
Knowledge-Based Systems
) to support SQL-based operations including advanced fuzzy and range queries. ...
In this paper, a novel FPE scheme with the method of "multiradix modular addition" is proposed to support the L-EncDB lightweight framework for privacy-preserving outsourced database. ...
There are also some other related privacy-preserving methods proposed for the security in database [21] [22] [23] 14] . ...
doi:10.1016/j.knosys.2014.04.010
fatcat:fuo7dir67fg7va2fsm3qkzvske
Privacy Preserving for Numeric Data Query in Cloud Computing
2018
International Journal of Computer Science Engineering and Information Technology Research
We have proposed two cloud engineering for secure database, with a progression of crossing point conventions that give protection safeguarding to different numeric related range questions. ...
Be that as it may, such plans are defenseless against protection spillage to cloud server. For numerical range request (>, <, etcetra) these disregard to give sufficient security protection. ...
asked for as numeric related SQL inquiries in whatever remains of the paper. ...
doi:10.24247/ijcseitroct20183
fatcat:ouzyzenuingdfgoxpy36axixke
Security with Privacy - A Research Agenda
2014
Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing
We propose our initial approaches to address two important PE applications: (i) privacy-preserving data management and (ii) privacy-preserving data analysis under the cloud environment. ...
Cloud computing is a key technology for storing, managing and analyzing big data. ...
For example, if the cloud wants to compare two integers given their encrypted values, it can utilize the existing secure comparison solutions to compare the two encrypted values in a privacy-preserving ...
doi:10.4108/icst.collaboratecom.2014.257687
dblp:conf/colcom/BertinoS14
fatcat:phyvc6g7tjgmld6vxtkzgvwy2q
A Novel Secure Scheme for Supporting Complex SQL Queries over Encrypted Databases in Cloud Computing
2018
Security and Communication Networks
With the advance of database-as-a-service (DaaS) and cloud computing, increasingly more data owners are motivated to outsource their data to cloud database for great convenience and economic savings. ...
It is suitable for large batch complex SQL queries over encrypted data in cloud environment. ...
The data owners can query their data from cloud database. Then, the cloud database should execute SQL queries over the encrypted data. ...
doi:10.1155/2018/7383514
fatcat:hpmdtj37dncovott6wzfoeb2de
uFETCH: A Unified Searchable Encryption Scheme and Its SaaS-Native to Make DBMS Privacy-Preserving
2020
IEEE Access
to make database management system (DBMS) privacy-preserving. ...
To demonstrate how uFETCH can bring up simpler designs, a security agent is exemplified to work with off-the-shelf DBMS while making it privacy-preserving. ...
With the merit of SaaS-native to make off-the-shelf DBMS privacy-preserving, uFETCH brings the following contributions to advocate cloud security and privacy. [7] . ...
doi:10.1109/access.2020.2994598
fatcat:hsn4mkgikrcf5axnxroygiitaa
T-DB: Toward Fully Functional Transparent Encrypted Databases in DBaaS Framework
[article]
2017
arXiv
pre-print
A database owner outsources an encrypted database to a cloud platform, needing only to store the secret keys for encryption and an empty table header for the database; the database users can make almost ...
all types of queries on the encrypted database as usual; and the cloud can process ciphertext queries as if the database were not encrypted. ...
The order-preservation and the additivity are preserved for the field as well. 3) Field in equality, range and aggregation query. ...
arXiv:1708.08191v1
fatcat:q6cj3dy7mbaffj7mzql3vwhcma
Query encrypted databases practically
2012
Proceedings of the 2012 ACM conference on Computer and communications security - CCS '12
The cloud database services are attractive for managing outsourced databases. However, the data security and privacy is a big concern hampering the acceptance of cloud database services. ...
In this demo paper, we demonstrate that aggregate SQL queries with range conditions can be performed efficiently over encrypted databases, without decrypting the databases first, by using our new homomorphic ...
INTRODUCTION Cloud database services, such as Amazon Relational Database Service (RDS) and Microsoft SQL Azure, are attractive for enterprises to outsource their databases. ...
doi:10.1145/2382196.2382321
dblp:conf/ccs/LiuW12
fatcat:2bzr7y2davaa5np5p32fucctay
The modeling of privacy preserving and statistically analysable database (PPSADB) system
2018
International Journal of Advanced Computer Research
In result, our system can satisfy privacy requirements and simultaneously provide almost all kinds of SQL queries and arithmetic operations for medical research. ...
The modelling for privacy preserving and statistically analysable database (PPSADB) system was proposed as a solution for this bilateral feature of health information. ...
Related works As related works, two research areas are addressed; the aggregated SQL queries on encrypted data and PPDM. ...
doi:10.19101/ijacr.2018.838017
fatcat:oxjfdzu5vvh3jhntm3h7dkohdi
Enforcing Privacy in Cloud Databases
[article]
2017
arXiv
pre-print
aim at making databases secure in a cloud environment, and discuss current pitfalls and related research challenges. ...
However, most data are sensitive to some extent, and data privacy remains one of the top concerns to DBaaS users, for obvious legal and competitive reasons.In this paper, we survey the mechanisms that ...
Wang et al. propose a framework for secure and efficient query processing of relational data in the cloud that allows exact match and range queries, as well as updates [71] . ...
arXiv:1708.09171v1
fatcat:stvwiwy3b5bo5gdxmxcv3w46pm
Efficient Keyword Query in Encrypted Cloud Databases
2017
DEStech Transactions on Engineering and Technology Research
Encryption is an efficient way of protecting database security. Traditional keyword based queries cannot be executed directly over encrypted databases. ...
Finally, we make an extension of the current SQL in our system by creating user-defined functions and CRL assemblies. The prototype of our design is implemented on a SQL Server database. ...
Most queries for character data involve precise match conditions or fuzzy match conditions, while queries for numerical data often include quantity and range conditions. ...
doi:10.12783/dtetr/eeta2017/7761
fatcat:5lxnicgrnrdvvjlcu7ynz4elqu
« Previous
Showing results 1 — 15 out of 1,400 results