Table scan technique for querying over an encrypted database
المؤلفون المشاركون
Rahmah, Abd al-Munim S.
Muhammad, Sahib Diya
المصدر
Journal of Baghdad College of Economic Sciences University
العدد
المجلد 2019، العدد 59 (30 سبتمبر/أيلول 2019)، ص ص. 1-18، 18ص.
الناشر
كلية بغداد للعلوم الاقتصادية الجامعة
تاريخ النشر
2019-09-30
دولة النشر
العراق
عدد الصفحات
18
التخصصات الرئيسية
الملخص EN
The growth of data and the increase in the size of databases have led to difficulties for administrators in maintaining the confidentiality of data and protecting them from outside attackers.
Encryption is necessary in protecting data in databases, but it has caused another problem in processing the required encrypted data and retrieving them from databases.
In traditional encryption methods, the entire or a part of the database is retrieved and decrypted to detect user-requested data.
This process is time consuming and does not prevent exposure by the administrator or external attacker.
s This work recommends a technique to address the drawbacks of traditional methods for encrypted database systems.
The technique processes structural query language (SQL) queries over encrypted data in a remote database without decrypting all of the data, and data decryption is performed only at the proxy site.
This technique is a new means of querying using the table scan mechanism by uses two steps, Distribution the encrypted tables and Generate indexes fields.
This method is used when the number of the matching records is a large into the total number of records or when the table is The growth of data and the increase in the size of databases have led to difficulties for administrators in maintaining the confidentiality of data and protecting them from outside attackers.
Encryption is necessary in protecting data in databases, but it has caused another problem in processing the required encrypted data and retrieving them from databases.
In traditional encryption methods, the entire or a part of the database is retrieved and decrypted to detect user-requested data.
This process is time consuming and does not prevent exposure by the administrator or external attacker.
s This work recommends a technique to address the drawbacks of traditional methods for encrypted database systems.
The technique processes structural query language (SQL) queries over encrypted data in a remote database without decrypting all of the data, and data decryption is performed only at the proxy site.
This technique is a new means of querying using the table scan mechanism by uses two steps, Distribution the encrypted tables and Generate indexes fields.
This method is used when the number of the matching records is a large into the total number of records or when the table is small
نمط استشهاد جمعية علماء النفس الأمريكية (APA)
Muhammad, Sahib Diya& Rahmah, Abd al-Munim S.. 2019. Table scan technique for querying over an encrypted database. Journal of Baghdad College of Economic Sciences University،Vol. 2019, no. 59, pp.1-18.
https://search.emarefa.net/detail/BIM-1220256
نمط استشهاد الجمعية الأمريكية للغات الحديثة (MLA)
Muhammad, Sahib Diya& Rahmah, Abd al-Munim S.. Table scan technique for querying over an encrypted database. Journal of Baghdad College of Economic Sciences University No. 59 (2019), pp.1-18.
https://search.emarefa.net/detail/BIM-1220256
نمط استشهاد الجمعية الطبية الأمريكية (AMA)
Muhammad, Sahib Diya& Rahmah, Abd al-Munim S.. Table scan technique for querying over an encrypted database. Journal of Baghdad College of Economic Sciences University. 2019. Vol. 2019, no. 59, pp.1-18.
https://search.emarefa.net/detail/BIM-1220256
نوع البيانات
مقالات
لغة النص
الإنجليزية
الملاحظات
-
رقم السجل
BIM-1220256
قاعدة معامل التأثير والاستشهادات المرجعية العربي "ارسيف Arcif"
أضخم قاعدة بيانات عربية للاستشهادات المرجعية للمجلات العلمية المحكمة الصادرة في العالم العربي
تقوم هذه الخدمة بالتحقق من التشابه أو الانتحال في الأبحاث والمقالات العلمية والأطروحات الجامعية والكتب والأبحاث باللغة العربية، وتحديد درجة التشابه أو أصالة الأعمال البحثية وحماية ملكيتها الفكرية. تعرف اكثر