Table scan technique for querying over an encrypted database
Joint Authors
Rahmah, Abd al-Munim S.
Muhammad, Sahib Diya
Source
Journal of Baghdad College of Economic Sciences University
Issue
Vol. 2019, Issue 59 (30 Sep. 2019), pp.1-18, 18 p.
Publisher
Baghdad College of Economic Sciences University
Publication Date
2019-09-30
Country of Publication
Iraq
No. of Pages
18
Main Subjects
Abstract EN
The growth of data and the increase in the size of databases have led to difficulties for administrators in maintaining the confidentiality of data and protecting them from outside attackers.
Encryption is necessary in protecting data in databases, but it has caused another problem in processing the required encrypted data and retrieving them from databases.
In traditional encryption methods, the entire or a part of the database is retrieved and decrypted to detect user-requested data.
This process is time consuming and does not prevent exposure by the administrator or external attacker.
s This work recommends a technique to address the drawbacks of traditional methods for encrypted database systems.
The technique processes structural query language (SQL) queries over encrypted data in a remote database without decrypting all of the data, and data decryption is performed only at the proxy site.
This technique is a new means of querying using the table scan mechanism by uses two steps, Distribution the encrypted tables and Generate indexes fields.
This method is used when the number of the matching records is a large into the total number of records or when the table is The growth of data and the increase in the size of databases have led to difficulties for administrators in maintaining the confidentiality of data and protecting them from outside attackers.
Encryption is necessary in protecting data in databases, but it has caused another problem in processing the required encrypted data and retrieving them from databases.
In traditional encryption methods, the entire or a part of the database is retrieved and decrypted to detect user-requested data.
This process is time consuming and does not prevent exposure by the administrator or external attacker.
s This work recommends a technique to address the drawbacks of traditional methods for encrypted database systems.
The technique processes structural query language (SQL) queries over encrypted data in a remote database without decrypting all of the data, and data decryption is performed only at the proxy site.
This technique is a new means of querying using the table scan mechanism by uses two steps, Distribution the encrypted tables and Generate indexes fields.
This method is used when the number of the matching records is a large into the total number of records or when the table is small
American Psychological Association (APA)
Muhammad, Sahib Diya& Rahmah, Abd al-Munim S.. 2019. Table scan technique for querying over an encrypted database. Journal of Baghdad College of Economic Sciences University،Vol. 2019, no. 59, pp.1-18.
https://search.emarefa.net/detail/BIM-1220256
Modern Language Association (MLA)
Muhammad, Sahib Diya& Rahmah, Abd al-Munim S.. Table scan technique for querying over an encrypted database. Journal of Baghdad College of Economic Sciences University No. 59 (2019), pp.1-18.
https://search.emarefa.net/detail/BIM-1220256
American Medical Association (AMA)
Muhammad, Sahib Diya& Rahmah, Abd al-Munim S.. Table scan technique for querying over an encrypted database. Journal of Baghdad College of Economic Sciences University. 2019. Vol. 2019, no. 59, pp.1-18.
https://search.emarefa.net/detail/BIM-1220256
Data Type
Journal Articles
Language
English
Notes
-
Record ID
BIM-1220256