Table scan technique for querying over an encrypted database

المؤلفون المشاركون

Rahmah, Abd al-Munim S.
Muhammad, Sahib Diya

المصدر

Journal of Baghdad College of Economic Sciences University

العدد

المجلد 2019، العدد 59 (30 سبتمبر/أيلول 2019)، ص ص. 1-18، 18ص.

الناشر

كلية بغداد للعلوم الاقتصادية الجامعة

تاريخ النشر

2019-09-30

دولة النشر

العراق

عدد الصفحات

18

التخصصات الرئيسية

الاقتصاد و التجارة

الملخص EN

The growth of data and the increase in the size of databases have led to difficulties for administrators in maintaining the confidentiality of data and protecting them from outside attackers.

Encryption is necessary in protecting data in databases, but it has caused another problem in processing the required encrypted data and retrieving them from databases.

In traditional encryption methods, the entire or a part of the database is retrieved and decrypted to detect user-requested data.

This process is time consuming and does not prevent exposure by the administrator or external attacker.

s This work recommends a technique to address the drawbacks of traditional methods for encrypted database systems.

The technique processes structural query language (SQL) queries over encrypted data in a remote database without decrypting all of the data, and data decryption is performed only at the proxy site.

This technique is a new means of querying using the table scan mechanism by uses two steps, Distribution the encrypted tables and Generate indexes fields.

This method is used when the number of the matching records is a large into the total number of records or when the table is The growth of data and the increase in the size of databases have led to difficulties for administrators in maintaining the confidentiality of data and protecting them from outside attackers.

Encryption is necessary in protecting data in databases, but it has caused another problem in processing the required encrypted data and retrieving them from databases.

In traditional encryption methods, the entire or a part of the database is retrieved and decrypted to detect user-requested data.

This process is time consuming and does not prevent exposure by the administrator or external attacker.

s This work recommends a technique to address the drawbacks of traditional methods for encrypted database systems.

The technique processes structural query language (SQL) queries over encrypted data in a remote database without decrypting all of the data, and data decryption is performed only at the proxy site.

This technique is a new means of querying using the table scan mechanism by uses two steps, Distribution the encrypted tables and Generate indexes fields.

This method is used when the number of the matching records is a large into the total number of records or when the table is small

نمط استشهاد جمعية علماء النفس الأمريكية (APA)

Muhammad, Sahib Diya& Rahmah, Abd al-Munim S.. 2019. Table scan technique for querying over an encrypted database. Journal of Baghdad College of Economic Sciences University،Vol. 2019, no. 59, pp.1-18.
https://search.emarefa.net/detail/BIM-1220256

نمط استشهاد الجمعية الأمريكية للغات الحديثة (MLA)

Muhammad, Sahib Diya& Rahmah, Abd al-Munim S.. Table scan technique for querying over an encrypted database. Journal of Baghdad College of Economic Sciences University No. 59 (2019), pp.1-18.
https://search.emarefa.net/detail/BIM-1220256

نمط استشهاد الجمعية الطبية الأمريكية (AMA)

Muhammad, Sahib Diya& Rahmah, Abd al-Munim S.. Table scan technique for querying over an encrypted database. Journal of Baghdad College of Economic Sciences University. 2019. Vol. 2019, no. 59, pp.1-18.
https://search.emarefa.net/detail/BIM-1220256

نوع البيانات

مقالات

لغة النص

الإنجليزية

الملاحظات

-

رقم السجل

BIM-1220256