Table scan technique for querying over an encrypted database

Joint Authors

Rahmah, Abd al-Munim S.
Muhammad, Sahib Diya

Source

Journal of Baghdad College of Economic Sciences University

Issue

Vol. 2019, Issue 59 (30 Sep. 2019), pp.1-18, 18 p.

Publisher

Baghdad College of Economic Sciences University

Publication Date

2019-09-30

Country of Publication

Iraq

No. of Pages

18

Main Subjects

Economy and Commerce

Abstract EN

The growth of data and the increase in the size of databases have led to difficulties for administrators in maintaining the confidentiality of data and protecting them from outside attackers.

Encryption is necessary in protecting data in databases, but it has caused another problem in processing the required encrypted data and retrieving them from databases.

In traditional encryption methods, the entire or a part of the database is retrieved and decrypted to detect user-requested data.

This process is time consuming and does not prevent exposure by the administrator or external attacker.

s This work recommends a technique to address the drawbacks of traditional methods for encrypted database systems.

The technique processes structural query language (SQL) queries over encrypted data in a remote database without decrypting all of the data, and data decryption is performed only at the proxy site.

This technique is a new means of querying using the table scan mechanism by uses two steps, Distribution the encrypted tables and Generate indexes fields.

This method is used when the number of the matching records is a large into the total number of records or when the table is The growth of data and the increase in the size of databases have led to difficulties for administrators in maintaining the confidentiality of data and protecting them from outside attackers.

Encryption is necessary in protecting data in databases, but it has caused another problem in processing the required encrypted data and retrieving them from databases.

In traditional encryption methods, the entire or a part of the database is retrieved and decrypted to detect user-requested data.

This process is time consuming and does not prevent exposure by the administrator or external attacker.

s This work recommends a technique to address the drawbacks of traditional methods for encrypted database systems.

The technique processes structural query language (SQL) queries over encrypted data in a remote database without decrypting all of the data, and data decryption is performed only at the proxy site.

This technique is a new means of querying using the table scan mechanism by uses two steps, Distribution the encrypted tables and Generate indexes fields.

This method is used when the number of the matching records is a large into the total number of records or when the table is small

American Psychological Association (APA)

Muhammad, Sahib Diya& Rahmah, Abd al-Munim S.. 2019. Table scan technique for querying over an encrypted database. Journal of Baghdad College of Economic Sciences University،Vol. 2019, no. 59, pp.1-18.
https://search.emarefa.net/detail/BIM-1220256

Modern Language Association (MLA)

Muhammad, Sahib Diya& Rahmah, Abd al-Munim S.. Table scan technique for querying over an encrypted database. Journal of Baghdad College of Economic Sciences University No. 59 (2019), pp.1-18.
https://search.emarefa.net/detail/BIM-1220256

American Medical Association (AMA)

Muhammad, Sahib Diya& Rahmah, Abd al-Munim S.. Table scan technique for querying over an encrypted database. Journal of Baghdad College of Economic Sciences University. 2019. Vol. 2019, no. 59, pp.1-18.
https://search.emarefa.net/detail/BIM-1220256

Data Type

Journal Articles

Language

English

Notes

-

Record ID

BIM-1220256